International Journals of Management, IT & Engineering (IJMIE) is a refereed research journal which aims to promote the links between engineering and management. The journal focuses on issues related to the development and implementation of new methodologies and technologies, which improve the operational objectives of an organization. These include, among others, product development, human resources management, project management, logistics, production management, e-commerce, quality management, financial planning, risk management, decision support systems, General Management, Banking, Insurance, Economics, IT, Computer Science, Cyber Security and emerging trends in allied subjects. Thus, the journal provides a forum for researchers and practitioners for the publication of innovative scholarly research, which contributes to the adoption of a new holistic managerial approach that ensures a technologically, economically, socially and ecologically acceptable deployment of new technologies in business practice.
Finding Bad Code Smells with Neural Network Models IJECEIAES
Code smell refers to any symptom introduced in design or implementation phases in the source code of a program. Such a code smell can potentially cause deeper and serious problems during software maintenance. The existing approaches to detect bad smells use detection rules or standards using a combination of different object-oriented metrics. Although a variety of software detection tools have been developed, they still have limitations and constraints in their capabilities. In this paper, a code smell detection system is presented with the neural network model that delivers the relationship between bad smells and object-oriented metrics by taking a corpus of Java projects as experimental dataset. The most well-known objectoriented metrics are considered to identify the presence of bad smells. The code smell detection system uses the twenty Java projects which are shared by many users in the GitHub repositories. The dataset of these Java projects is partitioned into mutually exclusive training and test sets. The training dataset is used to learn the network model which will predict smelly classes in this study. The optimized network model will be chosen to be evaluated on the test dataset. The experimental results show when the modelis highly trained with more dataset, the prediction outcomes are improved more and more. In addition, the accuracy of the model increases when it performs with higher epochs and many hidden layers.
Not Only Statements: The Role of Textual Analysis in Software QualityRocco Oliveto
My keynote at the 2012 Workshop on Mining Unstructured Data (co-located with the 10th Working Conference on Reverse Engineering - WCRE'12). Kingston, Ontario, Canada. October 17th, 2012.
The document discusses peer-to-peer evolutionary computation (P2P EC) as a parallel solution for hard optimization problems. It aims to find empirical evidence of the viability of the P2P EC paradigm. The model uses a fine-grained parallel evolutionary algorithm with a peer-to-peer protocol as the underlying population structure. Three test cases are analyzed to evaluate the scalability and fault tolerance of the approach.
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGcscpconf
In recent years, Evolutionary clustering is an evolving research area in data mining. The evolution diagnosis of any homogeneous as well as heterogeneous network will provide an overall view about the network. Applications of evolutionary clustering includes, analyzing, the social networks, information networks, about their structure, properties and behaviors. In this paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous information network and experimental results were produced to show how consistency and quality of cluster changes according to the priors
Influence of priors over multityped object in evolutionary clusteringcsandit
In recent years, Evolutionary clustering is an evolving research area in data mining. The
evolution diagnosis of any homogeneous as well as heterogeneous network will provide an
overall view about the network. Applications of evolutionary clustering includes, analyzing, the
social networks, information networks, about their structure, properties and behaviors. In this
paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous
information network and experimental results were produced to show how consistency and
quality of cluster changes according to the priors.
WSN performance based on node placement by genetic algorithm at smart home en...TELKOMNIKA JOURNAL
Wireless sensor connectivity is one of several factors that determines the communication reliability of each node. The placement of the node depends on the area that covered by wireless coverage area, so the node placement should be optimally placed. But the other aspect is the sensor coverage area. Sensor coverage area sometimes could be different with wireless sensor coverage area. Based on that situation, it needs to optimize that situation. Genetic Algorithm is an algorithm that utilizes a heuristic approach that uses biological mechanism evolution. It used to evolution the best position of Sensor Node based on Wireless and Sensor coverage area. After the position of each node generated by Genetic Algorithm, it still needs to evaluate the wireless sensor node performance. The performance indicates that the genetic algorithm can be used to determine sensor node placement in the smart home environment. The smart home environment used to monitor event at the house such as wildfire. In this research used Quality of Services (QoS) to measure wireless sensor performance. The experimental testing scenario will be used to place several nodes that generated. The QoS performed systems reliability that produced based on 3, 4 and 5 testing nodes, the minimum and maximum of each: delay is 6.21 and 8.74 milliseconds, jitter is 0.11 and 1.59 Hz and throughput is 68.83 and 90.49 bps. Based on ETSI classification, the performance of sensor node placement is Good and acceptable in real-time systems.
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
This document discusses the use of machine learning and deep learning methods for cybersecurity and network intrusion detection. It provides an overview of various algorithms including convolutional neural networks, support vector machines, k-nearest neighbors, decision trees, deep belief networks, and recurrent neural networks. For each algorithm, it describes the basic process and provides an example of its application to intrusion detection. It also includes a literature review summarizing research on applying these methods to intrusion detection using various datasets and evaluating their accuracy. Finally, it compares the results, limitations, and opportunities for future enhancements in using machine learning for cybersecurity.
Understanding Software Cohesion Metrics:Experimental Assessment of Conceptua...Bruno C. da Silva
This document summarizes the research presented in Bruno Carreiro da Silva's doctoral thesis. The research involved four studies that compared conceptual and structural measures of software module cohesion. The first study found the measures capture different aspects of cohesion. The second study found developers primarily consider a module's responsibilities when assessing cohesion. The third study found a correlation between higher conceptual cohesion and lower change-proneness in certain systems. Overall, the research aimed to better understand conceptual cohesion and its relationship to structural cohesion and change-proneness.
Finding Bad Code Smells with Neural Network Models IJECEIAES
Code smell refers to any symptom introduced in design or implementation phases in the source code of a program. Such a code smell can potentially cause deeper and serious problems during software maintenance. The existing approaches to detect bad smells use detection rules or standards using a combination of different object-oriented metrics. Although a variety of software detection tools have been developed, they still have limitations and constraints in their capabilities. In this paper, a code smell detection system is presented with the neural network model that delivers the relationship between bad smells and object-oriented metrics by taking a corpus of Java projects as experimental dataset. The most well-known objectoriented metrics are considered to identify the presence of bad smells. The code smell detection system uses the twenty Java projects which are shared by many users in the GitHub repositories. The dataset of these Java projects is partitioned into mutually exclusive training and test sets. The training dataset is used to learn the network model which will predict smelly classes in this study. The optimized network model will be chosen to be evaluated on the test dataset. The experimental results show when the modelis highly trained with more dataset, the prediction outcomes are improved more and more. In addition, the accuracy of the model increases when it performs with higher epochs and many hidden layers.
Not Only Statements: The Role of Textual Analysis in Software QualityRocco Oliveto
My keynote at the 2012 Workshop on Mining Unstructured Data (co-located with the 10th Working Conference on Reverse Engineering - WCRE'12). Kingston, Ontario, Canada. October 17th, 2012.
The document discusses peer-to-peer evolutionary computation (P2P EC) as a parallel solution for hard optimization problems. It aims to find empirical evidence of the viability of the P2P EC paradigm. The model uses a fine-grained parallel evolutionary algorithm with a peer-to-peer protocol as the underlying population structure. Three test cases are analyzed to evaluate the scalability and fault tolerance of the approach.
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGcscpconf
In recent years, Evolutionary clustering is an evolving research area in data mining. The evolution diagnosis of any homogeneous as well as heterogeneous network will provide an overall view about the network. Applications of evolutionary clustering includes, analyzing, the social networks, information networks, about their structure, properties and behaviors. In this paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous information network and experimental results were produced to show how consistency and quality of cluster changes according to the priors
Influence of priors over multityped object in evolutionary clusteringcsandit
In recent years, Evolutionary clustering is an evolving research area in data mining. The
evolution diagnosis of any homogeneous as well as heterogeneous network will provide an
overall view about the network. Applications of evolutionary clustering includes, analyzing, the
social networks, information networks, about their structure, properties and behaviors. In this
paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous
information network and experimental results were produced to show how consistency and
quality of cluster changes according to the priors.
WSN performance based on node placement by genetic algorithm at smart home en...TELKOMNIKA JOURNAL
Wireless sensor connectivity is one of several factors that determines the communication reliability of each node. The placement of the node depends on the area that covered by wireless coverage area, so the node placement should be optimally placed. But the other aspect is the sensor coverage area. Sensor coverage area sometimes could be different with wireless sensor coverage area. Based on that situation, it needs to optimize that situation. Genetic Algorithm is an algorithm that utilizes a heuristic approach that uses biological mechanism evolution. It used to evolution the best position of Sensor Node based on Wireless and Sensor coverage area. After the position of each node generated by Genetic Algorithm, it still needs to evaluate the wireless sensor node performance. The performance indicates that the genetic algorithm can be used to determine sensor node placement in the smart home environment. The smart home environment used to monitor event at the house such as wildfire. In this research used Quality of Services (QoS) to measure wireless sensor performance. The experimental testing scenario will be used to place several nodes that generated. The QoS performed systems reliability that produced based on 3, 4 and 5 testing nodes, the minimum and maximum of each: delay is 6.21 and 8.74 milliseconds, jitter is 0.11 and 1.59 Hz and throughput is 68.83 and 90.49 bps. Based on ETSI classification, the performance of sensor node placement is Good and acceptable in real-time systems.
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
This document discusses the use of machine learning and deep learning methods for cybersecurity and network intrusion detection. It provides an overview of various algorithms including convolutional neural networks, support vector machines, k-nearest neighbors, decision trees, deep belief networks, and recurrent neural networks. For each algorithm, it describes the basic process and provides an example of its application to intrusion detection. It also includes a literature review summarizing research on applying these methods to intrusion detection using various datasets and evaluating their accuracy. Finally, it compares the results, limitations, and opportunities for future enhancements in using machine learning for cybersecurity.
Understanding Software Cohesion Metrics:Experimental Assessment of Conceptua...Bruno C. da Silva
This document summarizes the research presented in Bruno Carreiro da Silva's doctoral thesis. The research involved four studies that compared conceptual and structural measures of software module cohesion. The first study found the measures capture different aspects of cohesion. The second study found developers primarily consider a module's responsibilities when assessing cohesion. The third study found a correlation between higher conceptual cohesion and lower change-proneness in certain systems. Overall, the research aimed to better understand conceptual cohesion and its relationship to structural cohesion and change-proneness.
Analysis of Various Cluster Algorithms Based on Flying Insect Wing Beat Sound...IRJET Journal
This document discusses various clustering algorithms that can be used to analyze the sounds produced by flying insects to identify insect species and quantify their populations. It proposes using hidden Markov models and dynamic time warping to cluster insect sounds based on their spatial-temporal features. The document provides a comparative analysis of hidden Markov models, agglomerative hierarchical clustering, k-means clustering, and expected maximization clustering when applied to benchmark and recorded insect sound datasets. It finds that hidden Markov models outperform other statistical and soft computing techniques for this application.
This document presents a Bayesian approach for detecting code and design smells. It aims to automate the detection process, handle uncertainty, and prioritize manual reviews. The approach builds Bayesian belief networks based on existing rule cards for smells. Experiments show the Bayesian models outperform the state-of-the-art DECOR approach and external calibration of probabilities yields good results across systems with minimal tweaking. The Bayesian approach supports uncertainty in detection and could be used industrially with minimal costs.
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
with the impending era of internet, the network security has become the key foundation for lot of financial and business application. Intrusion detection is one of the looms to resolve the problem of network security. An Intrusion Detection System (IDS) is a program that analyses what happens or has happened during an execution and tries to find indications that the computer has been misused. Here we propose a new approach by utilizing neuro fuzzy and support vector machine with fuzzy genetic algorithm for higher rate of detection.
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
Abstract
Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database.
Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
This document presents a novel approach for audio steganography that uses two levels of security. The first level uses an improved RSA encryption algorithm (RPrime RSA) to encrypt a message. The encrypted message is then encoded into an audio file using a genetic algorithm (GA) based least significant bit (LSB) algorithm. The encrypted message bits are embedded into random higher LSB layers of the audio samples to increase robustness against attacks. Genetic algorithm operators are used to minimize bit-level deviations between the original audio and stego audio, improving transparency. The proposed approach claims to provide higher security, capacity, and robustness for hidden data compared to traditional LSB encoding methods.
This document presents a multi-classification approach for detecting network attacks using a layered model. The proposed system consists of two stages - the first stage classifies network records as normal or an attack, while the second stage further classifies any detected attacks into four categories (DoS, Probe, R2L, U2R) using separate layers. Experimental results on the NSL-KDD dataset show the layered approach using the JRip classifier achieved very high classification accuracy of over 99% for each attack category, outperforming existing approaches. The multi-layered model is effective for improving detection of minority attack classes without reducing performance on majority classes.
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
Wireless reprogramming during a wireless detector net- work (WSN) is that the method of propagating a
replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in
hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all
existing insecure/secure reprogramming protocols square measure supported the centralized approach,
it\'s necessary to support distributed reprogramming during which multiple licensed network users will at
the same time and directly reprogram detector nodes while not involving the bottom station. Terribly
recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been
planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish
associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate
that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any
licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward
modification to mend the known security drawback while not losing any options of SRDRP. Our
experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B
redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal
computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications.
Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP;
any higher established identity-based position formula will be directly utilized in SRDRP. Supported
implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP
Collaborative spectrum sensing (CSS) was visualize to improve the reliability of spectrum sensing in centralized cognitive radio networks (CRNs). A popular attack in Collaborative Spectrum Sensing is the called spectrum sensing data falsification (SSDF) attack. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. Harvesting energy from ubiquitous radio frequency (RF) signals in urban area is environmentally friendly and self-sustaining. Here Proposed a threshold-based framework for optimal spectral access strategy and show that the threshold is optimal and traffic-dependent. The proposed threshold-based strategy takes into account both the spectral access and energy harvesting opportunities provided by a particular traffic application. Also an iterative algorithm is used that selects a threshold which maximizes the SU transmission opportunity subject to the overall harvested energy budget. Further, we illustrate the effects of different Harvesting energy for the Primary users and the illerate algorithm is used here.
The aim of this research paper is to design a new pseudorandom number generator based on FCSR registers, with not affecting the speed of generation.In the main part, a deep description of the cascades used in the design and describe the working principle of GPRN. The analyzed statistical characteristics are obtained from various generated sequences using test package NIST 800-22 and then confirmed by experiment, that a modeled GPRN has a higher period of repetition and works faster.
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
In this paper, we explore the use of an attention based mechanism known as Residual Attention for malware detection and compare this with existing CNN based methods and conventional Machine Learning algorithms with the help of GIST features. The proposed method outperformed traditional malware detection methods which use Machine Learning and CNN based Deep Learning algorithms, by demonstrating an accuracy of 99.25%.
This paper has been accepted in the International Conference of Consumer Electronics (ICCE 2021).
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
This document is a thesis submitted by Suneth Namal Karunarathna for the degree of Master of Engineering in Information and Communication Technologies. It discusses technology challenges for context aware multimedia services. The key challenges identified are providing seamless service continuity, context awareness in multimedia applications, content delivery in ubiquitous environments, and cross-layer adaptation for multimedia applications. The document also discusses threats to context collectors like limited resources, communication unavailability, and unattended operation. It proposes using analytic hierarchical process for context reasoning and develops models to evaluate performance and service continuity in multimedia services.
Image Based Relational Database Watermarking: A Surveyiosrjce
This document summarizes and analyzes several existing image-based relational database watermarking techniques. It begins with background on database watermarking, including applications, classifications of techniques, desired characteristics of watermarked databases, and types of attacks. It then reviews four specific algorithms that embed image watermarks into database attributes. The algorithms are analyzed for robustness against different attacks like modification, deletion and addition of tuples. The document concludes various image-based techniques are effective for copyright protection and survive attacks while preserving data integrity.
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Alessandro Suglia
Presentation for "Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neural Networks" at the 7th Italian Information Retrieval Workshop.
See paper: http://ceur-ws.org/Vol-1653/paper_11.pdf
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...ijwmn
Localization entails position estimation of sensor nodes by employing different techniques and mathematical computations. Localizable sensors also form an inherent part in the functioning of IoT devices and robotics. In this article, the author extends1 a novel scheme for node localization implemented using a hybrid fuzzy logic system to trace the node locations inside the deployment region, presented by the
Abhishek Kumar et. al. The results obtained were then optimized using Gauss Newton Optimization to improve the localization accuracy by 50% to 90% vis-à-vis weighted centroid and other fuzzy based localization algorithms. This article attempts to scale the proposed scheme for large number of sensor nodes to emulate somewhat real world scenario by introducing cooperative localization in previous presented work. The study also analyses the effectiveness of such scaling by comparing the localization accuracy. In next section, the article incorporates security in the proposed cooperative localization approach to detect malicious nodes/anchors by mutual authentication using El Gamel digital Signature scheme. A detailed study of the impact of incorporating security and scaling on average processing time and localization coverage has also been performed. The processing time increased by a factor of 2.5s for 500 nodes (can be attributed to more number of iterations and computations and large deployment area with small radio range of nodes) and coverage remained almost equal, albeit slightly low by a factor of 1% to 2%. Apart from these, the article also discusses the impact of adding extra functionalities in the proposed hybrid fuzzy system based localization scheme on processing time and localization accuracy.Lastly, this study also briefs about how the proposed scalable, cooperative and secure localization scheme tackles the type of attacks that pose threat to localization.
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...IRJET Journal
This document proposes a method for improving the security of symmetric key encryption by introducing randomness into the encryption process using a genetic algorithm. The genetic algorithm is used to generate random keys that change continuously. This results in different ciphertexts being generated for the same plaintext and key each time the algorithm is run. Standard attacks like brute force are made more difficult by this randomness. The document describes how the genetic algorithm incorporates mutation and crossover to generate random keys. It then explains a three stage encryption process where the plaintext is encrypted using a randomly generated key from the genetic algorithm in the first stage. The random key is embedded within the ciphertext to allow decryption. The method aims to improve security for applications like IoT without significantly increasing computational complexity.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
The document describes a proposed tool called the Class Breakpoint Analyzer (CBA) that evaluates software quality at the class level. The CBA extracts metrics like weighted methods per class (WMC), depth of inheritance tree (DIT), number of children (NOC), and lack of cohesion in methods (LCOM) based on the Chidamber and Kemerer (CK) metrics suite. Threshold values are set for each metric to determine if a class is overloaded. The CBA then generates a scorecard for each class to identify classes that need to be refactored to improve quality and reusability. The goal is to help evaluate code quality, identify areas for improvement, and make off-the-shelf
Class quality evaluation using class quality scorecardsIAEME Publication
The document describes a Class Breakpoint Analyzer tool that evaluates software quality using metrics. The tool extracts metrics like Weighted Methods per Class (WMC), Depth of Inheritance Tree (DIT), Number of Children (NOC), and Lack of Cohesion in Methods (LCOM) from source code. Threshold values for each metric indicate if a class needs restructuring. The tool generates a scorecard to determine if a class is overloaded or saturated. This helps improve reusability of existing software and evaluate code quality for junior programmers. The tool uses metrics from the Chidamber and Kemerer (CK) suite to analyze classes and suggest where to break classes for better design.
Named Entity Recognition using Bi-LSTM and Tenserflow ModelIRJET Journal
This document presents a study on using a bi-directional long short-term memory (Bi-LSTM) neural network for named entity recognition. The proposed model uses a Bi-LSTM network with four layers to classify text sequences into predefined entity types without feature engineering. The model was trained on a publicly available dataset and achieved an accuracy of 96.89%. The study demonstrates that Bi-LSTM networks can effectively perform named entity recognition by understanding contextual relationships between tokens in a sequence.
Analysis of Various Cluster Algorithms Based on Flying Insect Wing Beat Sound...IRJET Journal
This document discusses various clustering algorithms that can be used to analyze the sounds produced by flying insects to identify insect species and quantify their populations. It proposes using hidden Markov models and dynamic time warping to cluster insect sounds based on their spatial-temporal features. The document provides a comparative analysis of hidden Markov models, agglomerative hierarchical clustering, k-means clustering, and expected maximization clustering when applied to benchmark and recorded insect sound datasets. It finds that hidden Markov models outperform other statistical and soft computing techniques for this application.
This document presents a Bayesian approach for detecting code and design smells. It aims to automate the detection process, handle uncertainty, and prioritize manual reviews. The approach builds Bayesian belief networks based on existing rule cards for smells. Experiments show the Bayesian models outperform the state-of-the-art DECOR approach and external calibration of probabilities yields good results across systems with minimal tweaking. The Bayesian approach supports uncertainty in detection and could be used industrially with minimal costs.
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
with the impending era of internet, the network security has become the key foundation for lot of financial and business application. Intrusion detection is one of the looms to resolve the problem of network security. An Intrusion Detection System (IDS) is a program that analyses what happens or has happened during an execution and tries to find indications that the computer has been misused. Here we propose a new approach by utilizing neuro fuzzy and support vector machine with fuzzy genetic algorithm for higher rate of detection.
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
Abstract
Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database.
Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
This document presents a novel approach for audio steganography that uses two levels of security. The first level uses an improved RSA encryption algorithm (RPrime RSA) to encrypt a message. The encrypted message is then encoded into an audio file using a genetic algorithm (GA) based least significant bit (LSB) algorithm. The encrypted message bits are embedded into random higher LSB layers of the audio samples to increase robustness against attacks. Genetic algorithm operators are used to minimize bit-level deviations between the original audio and stego audio, improving transparency. The proposed approach claims to provide higher security, capacity, and robustness for hidden data compared to traditional LSB encoding methods.
This document presents a multi-classification approach for detecting network attacks using a layered model. The proposed system consists of two stages - the first stage classifies network records as normal or an attack, while the second stage further classifies any detected attacks into four categories (DoS, Probe, R2L, U2R) using separate layers. Experimental results on the NSL-KDD dataset show the layered approach using the JRip classifier achieved very high classification accuracy of over 99% for each attack category, outperforming existing approaches. The multi-layered model is effective for improving detection of minority attack classes without reducing performance on majority classes.
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
In this paper, a model of protection services in the antivirus system is proposed. The antivirus system
behavior separate in to preventive and control behaviors. We extract the properties which are expected
from the model of antivirus system approach from control behavior in the form of CTL and LTL temporal
logic formulas. To implement the behavior models of antivirus system approach, the ArgoUML tool and the
NuSMV model checker are employed. The results show that the antivirus system approach can detects
fairness, reachability, deadlock free and verify some properties of the proposed model verified by using
NuSMV model checker.
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
Wireless reprogramming during a wireless detector net- work (WSN) is that the method of propagating a
replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in
hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all
existing insecure/secure reprogramming protocols square measure supported the centralized approach,
it\'s necessary to support distributed reprogramming during which multiple licensed network users will at
the same time and directly reprogram detector nodes while not involving the bottom station. Terribly
recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been
planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish
associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate
that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any
licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward
modification to mend the known security drawback while not losing any options of SRDRP. Our
experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B
redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal
computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications.
Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP;
any higher established identity-based position formula will be directly utilized in SRDRP. Supported
implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP
Collaborative spectrum sensing (CSS) was visualize to improve the reliability of spectrum sensing in centralized cognitive radio networks (CRNs). A popular attack in Collaborative Spectrum Sensing is the called spectrum sensing data falsification (SSDF) attack. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. Harvesting energy from ubiquitous radio frequency (RF) signals in urban area is environmentally friendly and self-sustaining. Here Proposed a threshold-based framework for optimal spectral access strategy and show that the threshold is optimal and traffic-dependent. The proposed threshold-based strategy takes into account both the spectral access and energy harvesting opportunities provided by a particular traffic application. Also an iterative algorithm is used that selects a threshold which maximizes the SU transmission opportunity subject to the overall harvested energy budget. Further, we illustrate the effects of different Harvesting energy for the Primary users and the illerate algorithm is used here.
The aim of this research paper is to design a new pseudorandom number generator based on FCSR registers, with not affecting the speed of generation.In the main part, a deep description of the cascades used in the design and describe the working principle of GPRN. The analyzed statistical characteristics are obtained from various generated sequences using test package NIST 800-22 and then confirmed by experiment, that a modeled GPRN has a higher period of repetition and works faster.
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
In this paper, we explore the use of an attention based mechanism known as Residual Attention for malware detection and compare this with existing CNN based methods and conventional Machine Learning algorithms with the help of GIST features. The proposed method outperformed traditional malware detection methods which use Machine Learning and CNN based Deep Learning algorithms, by demonstrating an accuracy of 99.25%.
This paper has been accepted in the International Conference of Consumer Electronics (ICCE 2021).
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
This document is a thesis submitted by Suneth Namal Karunarathna for the degree of Master of Engineering in Information and Communication Technologies. It discusses technology challenges for context aware multimedia services. The key challenges identified are providing seamless service continuity, context awareness in multimedia applications, content delivery in ubiquitous environments, and cross-layer adaptation for multimedia applications. The document also discusses threats to context collectors like limited resources, communication unavailability, and unattended operation. It proposes using analytic hierarchical process for context reasoning and develops models to evaluate performance and service continuity in multimedia services.
Image Based Relational Database Watermarking: A Surveyiosrjce
This document summarizes and analyzes several existing image-based relational database watermarking techniques. It begins with background on database watermarking, including applications, classifications of techniques, desired characteristics of watermarked databases, and types of attacks. It then reviews four specific algorithms that embed image watermarks into database attributes. The algorithms are analyzed for robustness against different attacks like modification, deletion and addition of tuples. The document concludes various image-based techniques are effective for copyright protection and survive attacks while preserving data integrity.
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Alessandro Suglia
Presentation for "Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neural Networks" at the 7th Italian Information Retrieval Workshop.
See paper: http://ceur-ws.org/Vol-1653/paper_11.pdf
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...ijwmn
Localization entails position estimation of sensor nodes by employing different techniques and mathematical computations. Localizable sensors also form an inherent part in the functioning of IoT devices and robotics. In this article, the author extends1 a novel scheme for node localization implemented using a hybrid fuzzy logic system to trace the node locations inside the deployment region, presented by the
Abhishek Kumar et. al. The results obtained were then optimized using Gauss Newton Optimization to improve the localization accuracy by 50% to 90% vis-à-vis weighted centroid and other fuzzy based localization algorithms. This article attempts to scale the proposed scheme for large number of sensor nodes to emulate somewhat real world scenario by introducing cooperative localization in previous presented work. The study also analyses the effectiveness of such scaling by comparing the localization accuracy. In next section, the article incorporates security in the proposed cooperative localization approach to detect malicious nodes/anchors by mutual authentication using El Gamel digital Signature scheme. A detailed study of the impact of incorporating security and scaling on average processing time and localization coverage has also been performed. The processing time increased by a factor of 2.5s for 500 nodes (can be attributed to more number of iterations and computations and large deployment area with small radio range of nodes) and coverage remained almost equal, albeit slightly low by a factor of 1% to 2%. Apart from these, the article also discusses the impact of adding extra functionalities in the proposed hybrid fuzzy system based localization scheme on processing time and localization accuracy.Lastly, this study also briefs about how the proposed scalable, cooperative and secure localization scheme tackles the type of attacks that pose threat to localization.
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...IRJET Journal
This document proposes a method for improving the security of symmetric key encryption by introducing randomness into the encryption process using a genetic algorithm. The genetic algorithm is used to generate random keys that change continuously. This results in different ciphertexts being generated for the same plaintext and key each time the algorithm is run. Standard attacks like brute force are made more difficult by this randomness. The document describes how the genetic algorithm incorporates mutation and crossover to generate random keys. It then explains a three stage encryption process where the plaintext is encrypted using a randomly generated key from the genetic algorithm in the first stage. The random key is embedded within the ciphertext to allow decryption. The method aims to improve security for applications like IoT without significantly increasing computational complexity.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
The document describes a proposed tool called the Class Breakpoint Analyzer (CBA) that evaluates software quality at the class level. The CBA extracts metrics like weighted methods per class (WMC), depth of inheritance tree (DIT), number of children (NOC), and lack of cohesion in methods (LCOM) based on the Chidamber and Kemerer (CK) metrics suite. Threshold values are set for each metric to determine if a class is overloaded. The CBA then generates a scorecard for each class to identify classes that need to be refactored to improve quality and reusability. The goal is to help evaluate code quality, identify areas for improvement, and make off-the-shelf
Class quality evaluation using class quality scorecardsIAEME Publication
The document describes a Class Breakpoint Analyzer tool that evaluates software quality using metrics. The tool extracts metrics like Weighted Methods per Class (WMC), Depth of Inheritance Tree (DIT), Number of Children (NOC), and Lack of Cohesion in Methods (LCOM) from source code. Threshold values for each metric indicate if a class needs restructuring. The tool generates a scorecard to determine if a class is overloaded or saturated. This helps improve reusability of existing software and evaluate code quality for junior programmers. The tool uses metrics from the Chidamber and Kemerer (CK) suite to analyze classes and suggest where to break classes for better design.
Named Entity Recognition using Bi-LSTM and Tenserflow ModelIRJET Journal
This document presents a study on using a bi-directional long short-term memory (Bi-LSTM) neural network for named entity recognition. The proposed model uses a Bi-LSTM network with four layers to classify text sequences into predefined entity types without feature engineering. The model was trained on a publicly available dataset and achieved an accuracy of 96.89%. The study demonstrates that Bi-LSTM networks can effectively perform named entity recognition by understanding contextual relationships between tokens in a sequence.
An Empirical Study on the Adequacy of Testing in Open Source ProjectsPavneet Singh Kochhar
In this study, we investigate the state-of-the-practice of testing
by measuring code coverage in open-source software projects. We examine over 300 large open-source projects written in Java, to measure the code coverage of their associated test cases.
ONTOLOGY INTEGRATION APPROACHES AND ITS IMPACT ON TEXT CATEGORIZATIONIJDKP
This article will introduce some approaches for improving text categorization models by integrating
previously imported ontologies. From the Reuters Corpus Volume I (RCV1) dataset, some categories very
similar in content and related to telecommunications, Internet and computer areas were selected for models
experiments. Several domain ontologies, covering these areas were built and integrated to categorization
models for their improvements.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
An Effective Semantic Encrypted Relational Data Using K-Nn ModelClaraZara1
Data exchange and data publishing are becoming an important part of business and academic practices. Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be provided for the ownership of shared data, without revealing its usage under a wide range of machine learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object remain unaltered. The algorithms preserve the both right protection and utility preservation. The right protection scheme is based on watermarking. Watermarking methodology preserves the distance relationships.
A defect prediction model based on the relationships between developers and c...Vrije Universiteit Brussel
The document proposes a new defect prediction model called the Developer Based Changes Model (DBCM) which is based on relationships between developers and changed files. It evaluates DBCM on several open source projects and finds it achieves similar accuracy to an existing approach based on number of changes. The document also combines DBCM and the existing approach, finding the combined model further improves prediction accuracy by 5% over the individual models.
International Journal of Computer Science and Security Volume (1) Issue (2)CSCJournals
The document discusses evaluating the changeability of aspect-oriented (AO) systems by measuring the impact of code-level changes made to modules. Three projects developed in AspectJ were used as case studies. Changes were made and the impact on other modules was computed. The results suggest that AO systems can easily absorb changes. AO design metrics were also found to provide indicators of changeability and maintainability. However, code-level changes in AO systems do not always cause less impact than in object-oriented systems.
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
This document summarizes a research paper that proposes a method for dynamically measuring coupling in distributed object-oriented software systems. The method involves three steps: instrumentation of the Java Virtual Machine to trace method calls, post-processing of the trace files to merge information, and calculation of coupling metrics based on the dynamic traces. The implementation results show that the proposed approach can effectively measure coupling metrics dynamically by accounting for polymorphism and dynamic binding, overcoming limitations of traditional static coupling analysis.
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
Software metrics are increasingly playing a central role in the planning and control of software development projects. Coupling measures have important applications in software development and maintenance. Existing literature on software metrics is mainly focused on centralized systems, while work in the area of distributed systems, particularly in service-oriented systems, is scarce. Distributed systems with service oriented components are even more heterogeneous networking and execution environment. Traditional coupling measures take into account only “static” couplings. They do not account for “dynamic” couplings due to polymorphism and may significantly underestimate the complexity of software and misjudge the need for code inspection, testing and debugging. This is expected to result in poor predictive accuracy of the quality models in distributed Object Oriented systems that utilize static coupling measurements. In order to overcome these issues, we propose a hybrid model in Distributed Object Oriented Software for measure the coupling dynamically. In the proposed method, there are three steps
such as Instrumentation process, Post processing and Coupling measurement. Initially the instrumentation process is done. In this process the instrumented JVM that has been modified to trace method calls. During this process, three trace files are created namely .prf, .clp, .svp. In the second step, the information in these file are merged. At the end of this step, the merged detailed trace of each JVM contains pointers to the merged trace files of the other JVM such that the path of every remote call from the client to the server can be uniquely identified. Finally, the coupling metrics are measured dynamically. The implementation results show that the proposed system will effectively measure the coupling metrics dynamically.
Software Systems as Cities: a Controlled ExperimentRichard Wettel
This document describes a controlled experiment to evaluate the Software Systems as Cities visualization tool CodeCity. The experiment involves participants completing program comprehension and design quality assessment tasks on medium and large software systems using either CodeCity or traditional tools like Eclipse. The main research questions are whether CodeCity increases task correctness and reduces time compared to traditional tools, regardless of system size. Key variables that are measured include task correctness, completion time, tool used, system size, participant experience level and background.
Semantic similarity measurement- A theoretical study of various approachesIRJET Journal
This document discusses various approaches for measuring semantic similarity between sentences, including structure-based, information-based, feature-based, and hybrid methods. Structure-based methods measure similarity based on path lengths or edge counts between concepts in ontologies like WordNet, while information-based methods consider the information content of concept nodes. Feature-based approaches compare common features or properties of concepts, and hybrid methods combine multiple approaches. The document analyzes methods such as shortest path, Resnik, Lin, and Tversky in detail and compares their effectiveness for semantic similarity measurement.
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
This document provides an overview and comparison of three classification algorithms: K-Nearest Neighbors (KNN), Decision Trees, and Bayesian Networks. It discusses each algorithm, including how KNN classifies data based on its k nearest neighbors. Decision Trees classify data based on a tree structure of decisions, and Bayesian Networks classify data based on probabilities of relationships between variables. The document conducts an analysis of these three algorithms to determine which has the best performance and lowest time complexity for classification tasks based on evaluating a mock dataset over 24 months.
CONTEXT-AWARE CLUSTERING USING GLOVE AND K-MEANSijseajournal
ABSTRACT
In this paper we propose a novel method to cluster categorical data while retaining their context. Typically, clustering is performed on numerical data. However it is often useful to cluster categorical data as well, especially when dealing with data in real-world contexts. Several methods exist which can cluster categorical data, but our approach is unique in that we use recent text-processing and machine learning advancements like GloVe and t- SNE to develop a a context-aware clustering approach (using pre-trained
word embeddings). We encode words or categorical data into numerical, context-aware, vectors that we use to cluster the data points using common clustering algorithms like K-means.
Fisher exact Boschloo and polynomial vector learning for malware detection IJECEIAES
Computer technology shows swift progress that has infiltrated people’s lives with the candidness and pliability of computers to work ease shows security breaches. Thus, malware detection methods perform modifications in running the malware based on behavioral and content factors. The factors are taken into consideration compromises of convergence rate and speed. This research paper proposed a method called fisher exact Boschloo and polynomial vector learning (FEB-PVL) to perform both content and behavioral-based malware detection with early convergence to speed up the process. First, the input dataset is provided as input then fisher exact Boschloo’s test Bernoulli feature extraction model is applied to obtain independent observations of two binary variables. Next, the extracted network features form input to polynomial regression support vector learning to different malware classes from benign classes. The proposed method validates the results with respect to the malware and the benign files. The present research aimed to develop the behaviors to detect the accuracy process of the features that have minimum time speeds the overall performances. The proposed FEB-PVL increases the true positive rate and reduces the false positive rate and hence increasing the precision rate using FEB-PVL by 7% compared to existing approaches.
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
Abstract: It is widely argued that today's largely reactive, "respond and patch" approach to securing cyber systems must yield to a new, more rigorous, more proactive methodology. Achieving this transformation is a difficult challenge. Building on insights into requirements for cyber science and on experience gained through 8 years of operation, the DETER project is addressing one facet of this problem: the development of transformative advances in methodology and facilities for experimental cybersecurity research and system evaluation. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of others within the community. We describe in this paper the trajectory of the DETER project towards a new experimental science and a transformed facility for cyber-security research development and evaluation.
For more information, visit: http://www.deter-project.org
The document discusses assessing software complexity and security metrics from UML class diagrams for software reengineering. It proposes developing a Software Reverse Engineering Tool (SRET) that can automatically calculate metrics like coupling, cohesion, and security metrics from a UML class diagram generated from source code. This would help analysts and developers evaluate software metrics more quickly and efficiently during reengineering compared to manual methods. The tool would extract metrics based on rules applied to the class diagram to measure things like data access, operation access, and interactions between methods and attributes.
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHcscpconf
Due to the intangible nature of “software”, accurate and reliable software effort estimation is a challenge in the software Industry. It is unlikely to expect very accurate estimates of software
development effort because of the inherent uncertainty in software development projects and the complex and dynamic interaction of factors that impact software development. Heterogeneity exists in the software engineering datasets because data is made available from diverse sources.
This can be reduced by defining certain relationship between the data values by classifying them into different clusters. This study focuses on how the combination of clustering and
regression techniques can reduce the potential problems in effectiveness of predictive efficiency due to heterogeneity of the data. Using a clustered approach creates the subsets of data having a degree of homogeneity that enhances prediction accuracy. It was also observed in this study that ridge regression performs better than other regression techniques used in the analysis.
Similar to Ijess complimentary copy vol1issue3 (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
1. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Sr. TITLE & NAME OF THE AUTHOR(S) Page
No. No.
1 MEASURING SOFTWARE QUALITY FACTORS USING CK METRICS 1
Rashmi Goyal, Sona Malhotra
2 INDIAN REAL ESTATE‐ A BOON TO THE ECONOMY 10
Dr. V. Santhi, Benon.S, Arun Kumar.J
3 WIRELESS SIGNAL STRENGTH ENHANCEMENT IN LOCAL AREA NETWORK (WLAN) 28
M. Umair Saleem, Tasleem Mustafa, Ahsan Raza Sattar, Dr. Muhammad Saleem, Dr. Shaukat Ali
4 SECURITY IN VEHICULAR AD‐HOC NETWORKS ‐ CHALLENGES AND COUNTER MEASURES 45
Ann Baby, .Dr.Sreekumar
International Journal of Engineering & Social Sciences
www.gjmr.org
2. IJESS Volume1Issue3 ISSN: 2249‐ 9482
MEASURING SOFTWARE QUALITY FACTORS USING CK METRICS
Rashmi Goyal*
Sona Malhotra**
ABSTRACT
This paper gives an approach to evaluate software testability. The process of Software
Engineering evolves with a unique issue of testability. It is an external software attribute that
assesses the complexity and effort required for testing software. The insight provided by
testability is valuable during design, coding, testing and quality assurance. To capture
testability of classes, we used different metrics to measure its characteristics. Testability
Keywords: Software Testability, CK metrics, quality.
*CSE Deptt., University Institute of Engineering & Technology, Kurukshetra
** Assistant Professor, CSE Deptt., University Institute of Engineering & Technology,
Kurukshetra
International Journal of Engineering and Social Science
www.gjmr.org
1
3. IJESS Volume1Issue3 ISSN: 2249‐ 9482
1. INTRODUCTION
Software engineering is a profession dedicated to analysis, designing, implementing and
modifying software so that we develop software of high quality and fast to build. Testing has
always been a broad concept to measure and evaluate software accurately. Software quality is the
attribute to measure the software characteristics. To measure software quality, a no. of software
metrics is used. Metric are the quantitative measure of the degree to which a system, component,
or process possesses a given attribute. Software metrics can be used to measure different
characteristics of a software system or software development process. Metrics for object oriented
development is a relatively new field of study. The metrics focus on internal object structures
that reflect the complexity of each individual entity, such as methods and classes, and on external
complexity that measures the interactions among entities, such as coupling and inheritance.
Chidamber and Kemerer’s metrics suite for object-oriented design is the deepest research in OO
metrics investigation. They have defined six metrics for OO design.
2. CK METRICS
Weighted methods per class (WMC):
It is the sum of the complexities of all methods of a class. According to this metric if a Class C,
has n methods and c1, c2 …cn be the complexity of the methods, then WMC(C)= c1 + c2 +… +
cn. Mc Cabe’s complexity metric is chosen for calculating the complexity values of the methods
of a class. The value is normalized so that nominal complexity for a method takes on a value of
1.0. If all method complexities are considered to be unity, then WMC = n i.e. the number of
methods existing in that class.
Depth of the inheritance tree (DIT):
Depth of inheritance of a class is “the maximum length from the node to the root of the tree".
More is the depth of the inheritance tree greater the reusability of the class corresponding to the
root of that tree as the class properties are shared by more derived classes under that class. So
there too much depth dilutes the abstraction. So there is a need to set the minimum & maximum
DIT value for a class as a contribution towards the reusability.
International Journal of Engineering and Social Science
www.gjmr.org
2
4. IJESS Volume1Issue3 ISSN: 2249‐ 9482
The definition of DIT is ambiguous when multiple inheritance and multiple roots are present as
the alternative length of the path is not being considered in case of multiple inheritance. If we
add all the ancestor classes coming in common path to the ancestor classes coming in alternative
paths then that will be the true representation of the theoretical basis of the DIT metric.
Number of Children (NOC):
According to this metric Number of children (NOC) of a class is the number of immediate sub-
classes subordinated to a class in the class hierarchy. So greater is the value of NOC greater will
be the reusability of the parent class. Hence there should be some minimum value of NOC for a
parent class for its reusability. Theoretical basis of NOC metric relates to the notion of scope of
properties. It is a measure of how many sub-classes are going to inherit the methods of the parent
class. The definition of NOC metric gives the distorted view of the system as it counts only the
immediate sub-classes instead of all the descendants of the class. NOC value of a class, say class
i, should reflect all the subclasses that share the properties of that class.
NOC(i) =N+ΣiAll subclasses NOC(i)
Where N is the total number of immediate subclasses of class i.
Coupling between object classes (CBO):
Coupling between Object Classes (CBO) is a count of the number of other classes to which a
class is coupled. Excessive coupling is detrimental to modular design and prevents reuse. The
more independent a class is, the easier it is reuse in another application. The larger the number of
couples, the higher the sensitivity to changes in other parts of the design and therefore
maintenance is more difficult. Strong coupling complicates a system since a class is harder to
understand, change or correct by itself if it is interrelated with other classes.
Response for a class (RFC):
According to this metric “Coupling between Object Classes” (CBO) for a class is a count of the
number of other classes to which it is coupled. Theoretical basis of CBO relates to the notion that
an object is coupled to another object if one of them acts on the other, i.e. methods of one object
use methods or instance variables of another. Here we are restricting the unidirectional use of
International Journal of Engineering and Social Science
www.gjmr.org
3
5. IJESS Volume1Issue3 ISSN: 2249‐ 9482
methods or instance variables of another object by the object of the class whose reusability is to
be measured. As Coupling between Object classes increases, reusability decreases and it becomes
harder to modify and test the software system. So there is the need to set some maximum value
of coupling level for its reusability. If the value of CBO for a class is beyond that maximum
value then the class is said to be non-reusable. It is the number of methods that can be triggered
by a message sent to an object.
Software Testability:
Software testability is affected by many different factors, including the required validity, the
process and tools used and the representation of the requirements. Voas et. al. [27] defines
software testability as the probability that a piece of software will fail on its next execution
during testing, provided it contains a fault. This fault sensitivity is obtained by multiplying the
probabilities that
(1) the location containing the fault is executed;
(2) the fault corrupts the program’s state; and
(3) the corrupted state gets propagated to the output.
High fault sensitivity indicates high testability and vice versa. The effort required to test a
program to ensure that it performs its intended function. Thus testability is also measured in form
of testability effort. The effect of values of CK metrics on testability is defined in the principles
below:
Principles for measuring Testability are:
1. LOC, the larger the size of a class, more effort is required to test a class.
2. WMC, more the methods in a class, more difficult it is to test the class.
3. DIT, greater is the inheritance tree, more testing effort is required.
4. NOC, more no. of children more will be the testing effort.
5. CA, increased complexity will increase testability of the software.
International Journal of Engineering and Social Science
www.gjmr.org
4
6. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Based upon these principles (1 – 5), equations for measuring testability are following:
Testability of a class = a*(LOC) + b*(WMC) + c*(DIT) +d*(NOC) +e*(CA)
where a, b, c, d, e are regression coefficients.
a =b =c = d =e = 1
Testability of OO program = sum (testability (class)i)
where i = 1 to n, n is number of classes.
3. COLLECTION OF METRIC DATA
To collect metric data, we have used Eclipse platform. Source code is given as input to the
Metrics tool. We analyzed software testability on metric.java and calculate ck metrics. Eclipse
Metrics tool is an open source tool which is available on internet.
Fig 1: Metric.java
International Journal of Engineering and Social Science
www.gjmr.org
5
7. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Fig 2: QualityFactorGenerator.java
4. METRIC VIEW:
To view metrics of source program, we have to enable metrics view from the menu list. It will
display the object oriented metrics for the code.
Fig 3:Metric view
International Journal of Engineering and Social Science
www.gjmr.org
6
8. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Metric Metric.java QualityFactorGenerator.java
NOC 0 0
CA 1 1
TLOC 108 40
LCOM 1 0
WMC 27 3
Table 1: CK metrics
120
metric.java
100
80
QualityFactorGener
60 ator.java
40
20
0
NOC CA TLOC LCOM WMC
Fig 4: Metric graph
These metrics are saved as a text file and given as input to the QualityFactorGenerator which
further calculates software testability.
Fig 5: Input File
International Journal of Engineering and Social Science
www.gjmr.org
7
9. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Fig 6: Software Testability
5. CONCLUSION:
The framework proposed in the paper will address testability during software development life
cycle. It may help putting testability benchmarking of software projects. The framework is
generic in nature, and may be used by industry practitioners to quantify testability in order to
make design decisions early in the development life cycle. In future, we have to emphasize on
more testability characteristics. We will introduce more software metrics too calculate testability
accurately.
6. REFERENCES:
[1]R. A. Khan, K. Mustafa, I Ahson, “An Empirical Validation of Object Oriented Design
Quality Metrics, Journal King Saud University, Computer & Information Science, Vol. 19, pp.
1-16, Riyadh (1427H/2007).
[2] Jungmayr, S. Testability Measurement and Software Dependencies. In Proceedings of the
12th International
Workshop on Software Measurement, pp. 179–202, October 2002.
[3]Bertolino, A., and Strigini, L., “On the Use of Testability Measures for Dependability
Assessment”, IEEE Transactions on Software Engineering, VOL. 22, NO. 2, February 1996.
[4] McCall, J. A., Richards, P. K., and Walters, G. F., “Factors in Software Quality”, Nat’l Tech.
Information Service, no. Vol. 1, 2 and 3, 1977.
[5]Booch, G., Object Oriented Design with Applications. Redwood City, CA: Benjamin/
Cummings, 1991.
[6]P. Coad and E. Yourdon, Object-Oriented Design. Englewood Cliffs, NJ: Prentice-Hall, 1991.
International Journal of Engineering and Social Science
www.gjmr.org
8
10. IJESS Volume1Issue3 ISSN: 2249‐ 9482
[7]Magiel Bruntink, Arie van Deursen, “Predicting Class Testability using Object-Oriented
Metrics” Proceedings of the Fourth IEEE International Workshop on Source Code Analysis and
Manipulation (SCAM’04), pp 1-10, 2004
International Journal of Engineering and Social Science
www.gjmr.org
9
11. IJESS Volume1Issue3 ISSN: 2249‐ 9482
INDIAN REAL ESTATE- A BOON TO THE ECONOMY
Dr. V. Santhi*
Benon.S**
Arun Kumar.J**
ABSTRACT
The prospects for real estate industry in India goes buoyant. All the factors that contributed to the
growth of real estate sector- high disposable incomes, sharp increase in global liquidity, selective
capital account liberalization, looser credit policies, a greater availability for the leverage due to
financial liberalization and the consequent increase in shortage lending and price increase.
*Asst.prof(S.G), Dept of Humanities, PSG College of technology, Coimbatore-641004
** III B.E (SW) EEE , PSG College of technology, Coimbatore-641004
International Journal of Engineering and Social Science
www.gjmr.org 10
12. IJESS Volume1Issue3 ISSN: 2249‐ 9482
INTRODUCTION
Real estate sector in India is witnessing tremendous boom and is presently worth $12 billion and is
growing at the rate of 30 per cent per annum.It is the second largest employer next to
agriculture.India is fast evolving in the real estate market witnessing a growth in construction
activities both in residential as well as commercial and retail segments. It has observed that the real
estate action is no longer limited to the large metropolises of India but has now permeated to the
burgeoning smaller towns and cities. These emerging centers of growth are lending sparkle to India's
booming economy. It has emerged as the most profitable business venture to invest US $ 90 billion
by 2015 also witnessing huge FDI (Foreign Direct Investment), not only due to the 100 per cent
Government allowance with fast track approvals but also due to high potential investment returns of
more than 25-30 per cent. Eighty per cent share of the real estate market is garnered by residential
sector and the rest is comprised of offices, shopping malls, hotels and hospitals.One Rupee invested
in real estate sector results in 78 paise being added to the GDP of the country.With the urban
population of India is likely to grow from 285.3 million in 2001 to 360 million in 2010, 410 million
in 2015, 468 million in 2020 and 533 million in 2025 gives a huge potential simultaneously demand
for affordable residents which is considered as the basic need of human being of food, water and
shelter. The current size of real estate construction industry in India is estimated to be approximately
US$44 billion. The boom in retail industry has also spurred the growth in real estate sector. India at
the moment is witnessing a spurt in extremely large retail spaces.The industry is highly fragmented.
The top 10 players account for approximately 10 per cent of the total revenue of the industry, while a
major part is attributed to unorganized real estate contractors.The industry is expected to witness an
annual average growth rate of approximately 26 per cent till 2014. The main focus area of almost all
real estate companies is the ‘affordable housing,’ which controls more than 50 per cent of residential
sales in key residential areas such as Chennai, Gurgaon and Mumbai.The prevailing stature of the real
estate market in India and it growth statistics motivated us to carry this introspective study. Real
estate construction industry is also getting benefited from government initiatives. The Government of
India, in order to attract foreign direct investment in the industry, is working out on easier rules for
overseas investors to invest in smaller real estate projects.
International Journal of Engineering and Social Science
www.gjmr.org 11
13. IJESS Volume1Issue3 ISSN: 2249‐ 9482
NEED FOR THE STUDY
Low interest rates, modern attitudes to home ownership (the average age of a new homeowner is now
32 years compared with 45 years a decade ago), economic prosperity along with a change of attitude
amongst the young working population from that of ‘save and buy’ to ‘buy and repay’ and liberalized
FDI regime have all contributed to sector in this boom. The above stated definition has created a need
for framing the below mentioned objective of the study to analyse the consumers preference for
towards the modern town ship development, their simultaneous perception and motivating factors at
micro level.
OBJECTIVES OF THE STUDY
To analyze the level of perception of consumers towards the Township Project.
To state the factors influencing the purchase of Villas in Township project.
To offer suggestion for Taamaesek Engineering Consortium India and S.P.Apparels in
promoting the Township.
SCOPE FOR THE STUDY
This study provides scope to review the pattern of consumer’s attitude towards the modern township
development proposal at Tirupur and Coimbatore Districts and also draw an introspective view of the
property promoters’ perception about the same. Thus it supposed that the current study to
demonstrate functional issues of real estate business development to research scholars, academician,
economic planners and the marketers as a whole.
INTRODUCTION TO THE COMPANY
The current study is based on the real-time project proposal joint-venture signed between the
Taamaesek Engineering Consortium India and SP Apparels to develop a modern town-ship.
Taamaesek Engineering Consortium India established in the year 2000,having worked on many
prestigious projects in Singapore, viz Fullerton Hotels, Ritz Carlton, Hazel Park & Flora Vale
condominiums, Millennia towers & Centennial towers etc., is ably assisted by a core team of 20
International Journal of Engineering and Social Science
www.gjmr.org 12
14. IJESS Volume1Issue3 ISSN: 2249‐ 9482
engineers with various levels of International work execution and project management expertise and
100 engineering professionals from all streams of engineering contributing to a value engineered
design. Drawing on the multi - disciplinary expertise, generates a value engineered design to create
maximum value and enhance quality of life is the MISSION and VISION of the organization.
Taamaesek Engineering Consortium India’s total involvement and comprehensive value engineering,
in every project cutting across all services such as civil, structure, trades, electrical, air conditioning,
plumbing, fire detection and suppression, networking, water treatment, interiors. The Major
competitors for the concern are; JLL, CBRE and CUSMAN.
SPAL, well known Knitwear Garment manufacturer is in the business for nearly two decades. SPAL
is one of the largest Knitwear Exporter in India and is ranked second among 5000 Exporters in
Knitwear town of Tirupur, South India. SPAL is focused on producing extensive range of Knit
Garments viz. Kids wear – 50per cent, Ladies Garments -35per cent & Men’s wear-15per cent. SPAL
is catering to major global brands and chain stores. The unit has set up globally acceptable standards
and quality norms. With this expertise gained in the manufacturing,SPAL plans to build domestic
brand in order cash in vibrant and expending domestic garment market. SPAL holds 70 per cent
equity stake in Crocodile Products Private Limited in. The Joint Venture Partner being Crocodile
International Private Limited, Singapore. Further it is proposed to commence more stores all over the
country. The Company has vertically integrated manufacturing set up starting from Spinning,
Knitting, Processing (Dyeing), Printing & Embroidery, Sewing Facility and Retail in domestic
market.To be the best clothing supplier in the world aggressively work into US, & other EU
Countries and increase the customer base by 25 per cent a year, to grow into a 2000 cr. Company by
2015 and to create a retail presence pan India within one year is the MISSION and VISION of the
organization.
RESEARCH METHODOLOGY
Real estate property development joint venture named “OPULENCE” has been signed between
Taamaesek Engineering Consortium India and SP apparels to build a modern town ship. A marketing
research has been conducted on their request to know the feasibility of developing a town ship
connected directly by the NH 49 National High Way Road Line. The data was collected through a
International Journal of Engineering and Social Science
www.gjmr.org 13
15. IJESS Volume1Issue3 ISSN: 2249‐ 9482
well structured interview schedule. The chi-square test is an important test amongst the several tests
of significance.It is a statistical measure used in the context of sampling analysis for comparing a
variable to a theoretical variance. As a non-parametric test, it can be used to determine if categorical
data shows dependency or the two classifications are independent. The entire hypothesis test in this
study was carried out at 5 per cent level of significance.An attempt was made to analyze the main
factors influencing the level of buyer preference with the evident of the selected sample respondents
in the study area. For the purpose of the detailed analysis, variable are classified in two important
strata which are termed as dependent variables and independent variables. The buyer preference
interms of opinion towards likeliness, opinion towards uniqueness and opinion towards willingness
by the sample respondent was taken as dependent variables and the independent variables used in
this study are age, location, annual family income. The instrument used in collecting the primary data
was Structured Questionnaire. The questionnaire consisted of both closed and open ended questions.
The sample size taken for my study is about 200 respondents. Area sampling was done. If cluster
happen to be some geographic subdivisions, cluster sampling is better known as area sampling. In
other words, cluster designs, where the primary sampling unit represents a cluster of unit based on
geographic area, are distinguished as area samplings. The frequency distribution of the variables were
calculated with help of simple percentage, by writing the formula FD = F/N x 100. Where F denotes
the number of respondents, and N denotes the total number of sample population.
(O E ) 2
Chi–square test ( ) = 2
E
Degrees of freedom = (R-1) (C-1)
Where O = observed frequency
E = expected frequency
R = number of rows
C = number of columns
International Journal of Engineering and Social Science
www.gjmr.org 14
16. IJESS Volume1Issue3 ISSN: 2249‐ 9482
The 2 values obtained as such should be compared with relevant table value of 2 and the inference
can be drawn. If the calculated value is greater than the table value the hypothesis framed will be
rejected, otherwise accepted.
TABLE-I
FACTORS INFLUENCING THE BUYERS DECISION
TOTAL
S.NO FACTORS RANK
SCORE
1. Price 1640 1
2. Location 1404 2
Transport, Shops and Public
3. 1040 3
Amenities
4. Facilities & Amenities 798 4
Brand Image of builder / property
5. 530 6
developer
6. Landscape Area (Sq.Ft) 48 10
7. License of the Builder 368 7
8 Registration & Documents 240 8
9. Loans & EMI 660 5
10. Security of the Property 112 9
Source-primary data
It is found from the analysis that most of the respondents are influenced by competitive price, locality
and transport, shops and public amenities.
International Journal of Engineering and Social Science
www.gjmr.org 15
17. IJESS Volume1Issue3 ISSN: 2249‐ 9482
FIGURE-I
AGE AND FACTOR SCORE
FIGURE-II
AGE AND FACTOR RANKING
International Journal of Engineering and Social Science
www.gjmr.org 16
18. IJESS Volume1Issue3 ISSN: 2249‐ 9482
FIGURE-III
GENDER AND FACTOR SCORE
FIGURE-IV
GENDER AND FACTOR RANKING
FIGURE-V
International Journal of Engineering and Social Science
www.gjmr.org 17
19. IJESS Volume1Issue3 ISSN: 2249‐ 9482
ANNUAL INCOME AND FACTOR PRICE
FIGURE-VI
ANNUAL INCOME AND FACTOR RANKING
International Journal of Engineering and Social Science
www.gjmr.org 18
20. IJESS Volume1Issue3 ISSN: 2249‐ 9482
FACTORS INFLUENCING TO BUY TOWNSHIP
The following variables have been selected to the level of likeliness; uniqueness and willingness to
purchase the property are Age, Location, Annual family income and Profession.
TABLE-II
AGE AND OPINION ABOUT WILLINGNESS TO BUY A TOWNSHIP
Opinion towards willingness
Age Might
Probably Definitely Total
Definitely Probably or
(in yrs) would not would not
would buy would buy might
buy buy
not buy
16 6 4 0 10
20 – 30 36
(44.4) (16.7) (11.1) (0) (27.8)
16 22 20 4 4
30 – 40 66
(24.2) (33.3) (30.3) (6.1) (6.1)
8 32 8 4 14
40 – 50 66
(12.1) (48.5) (12.1) (6.1) (21.2)
4 16 4 0 8
Above 50 32
(12.5) (50) (12.5) (0) (25)
Total 44 76 36 8 36 200
SOURCE-PRIMARY DATA
International Journal of Engineering and Social Science
www.gjmr.org 19
21. IJESS Volume1Issue3 ISSN: 2249‐ 9482
TABLE-III
CHI-SQUARE TEST
Calculated 2 Table
Factor D.F Result
Value Value
Age 28.750 21.026 12 Rejected
The above table shows that the calculated chi-square value (28.750) is greater than the table value
(21.026). So, the null hypothesis is rejected. Hence, there is a close significant relationship between
age and opinion about willingness to buy a township.
TABLE-IV
ANNUAL FAMILY INCOME AND OPINION ABOUT WILLINGNESS TO BUY A
TOWNSHIP
Opinion towards willingness
Annual Family Total
Income Might or Probably Definitely Score
Definitely Probably
Might not not not
Less than 2 2 0 2 2
8
2,00,000 (25) (25) (0) (25) (25)
2,00,001 – 2 0 4 2 2
10
4, 00, 000 (20) (0) (40) (20) (20)
4,00,001 – 4 16 2 0 0
22
6,00,000 (18.2) (72.7) (9.1) (0) (0)
6,00,001 – 10 18 8 0 0 36
International Journal of Engineering and Social Science
www.gjmr.org 20
22. IJESS Volume1Issue3 ISSN: 2249‐ 9482
8,00,000 (27.8) (50) (22.2) (0) (0)
8,00,001 – 10 16 6 2 10
44
10,00,000 (22.7) (36.4) (13.6) (4.6) (22.7)
16 24 16 2 22
Above 10,00,000 80
(20) (30) (20) (2.5) (27.5)
Total 44 76 36 8 36 200
SOURCE-PRIMARY DATA
TABLE-V
CHI-SQUARE TEST
Calculated 2 Table
Factor D.F Result
Value Value
Annual
family 54.138 31.410 20 Rejected
income
The above table shows that the calculated chi-square value (54.138) is greater than the table value
(31.410). So, the null hypothesis is rejected. Hence, there is a close significant relationship between
annual family income and opinion about willingness to buy a township.
International Journal of Engineering and Social Science
www.gjmr.org 21
23. IJESS Volume1Issue3 ISSN: 2249‐ 9482
TABLE-VI
LOCATION AND OPINION ABOUT WILLINGNESS TO BUY A TOWNSHIP
Opinion towards willingness
Location Might or Probably Definitely Total
Definitely Probably
Might not not not
12 46 12 6 24
Coimbatore 100
(12) (46) (12) (6) (24)
32 30 24 2 12
Tirupur 100
(32) (30) (24) (2) (12)
Total 44 76 36 8 36 200
SOURCE-PRIMARY DATA
TABLE-VII
CHI-SQUARE TEST
Calculated 2 Table
Factor D.F Result
Value Value
Location 13.368 9.488 4 Rejected
The above table shows that the calculated chi-square value (13.368) is greater than the table value
(9.488). So, the null hypothesis is rejected. Hence, there is a close significant relationship between
location and opinion about willingness to buy township
International Journal of Engineering and Social Science
www.gjmr.org 22
24. IJESS Volume1Issue3 ISSN: 2249‐ 9482
TABLE-VIII
PROFESSION AND OPINION ABOUT WILLINGNESS
TO BUY A TOWNSHIP
Opinion towards willingness
Profession Might or Probably Definitely Total
Definitely Probably
Might not not not
Business / 18 32 16 2 12
80
Industrialist (22.5) (40) (20) (2.5) (15)
16 24 8 2 10
Self Employee 60
(26.67) (40) (13.33) (3.33) (16.67)
10 20 12 4 14
Employee 60
(16.67) (33.33) (20) (6.67) (23.33)
Total 44 76 36 8 36 200
SOURCE-PRIMARY DATA
TABLE-IX
CHI-SQUARE TEST
Calculated 2 Table
Factor D.F Result
Value Value
Profession 5.898 15.507 8 Accepted
International Journal of Engineering and Social Science
www.gjmr.org 23
25. IJESS Volume1Issue3 ISSN: 2249‐ 9482
The above table shows that the calculated chi-square value (5.898) is less than the table value
(15.507). So, the null hypothesis is accepted. Hence, there is no significant relationship between
profession and opinion about willingness to buy a township.
TABLE-X
PROFESSION AND OPINION ABOUT WILLINGNESS
TO BUY A TOWNSHIP
Opinion towards willingness
Profession Might or Probably Definitely Total
Definitely Probably
Might not not not
Business / 18 32 16 2 12
80
Industrialist (22.5) (40) (20) (2.5) (15)
16 24 8 2 10
Self Employee 60
(26.67) (40) (13.33) (3.33) (16.67)
10 20 12 4 14
Employee 60
(16.67) (33.33) (20) (6.67) (23.33)
Total 44 76 36 8 36 200
International Journal of Engineering and Social Science
www.gjmr.org 24
26. IJESS Volume1Issue3 ISSN: 2249‐ 9482
TABLE-XI
CHI-SQUARE TEST
Calculated 2 Table
Factor D.F Result
Value Value
Profession 5.898 15.507 8 Accepted
The above table shows that the calculated chi-square value (5.898) is less than the table value
(15.507). So, the null hypothesis is accepted. Hence, there is no significant relationship between
profession and opinion about willingness to buy a township.
FINDINGS
Price got the first rank in all categories of gender and landscape area got the tenth rank in all
categories of gender.
It brings from the analysis that majority of the respondents are very much interested to buy a
township.
Most of the respondents are influenced to buy a township by its competitive price, locality and
transport, shops and public amenities.
While in the case of Annual family income level, the respondents who earn eight lakhs to ten
lakhs opined that they are willing to purchase township. The result of chi-squared test
accepted the result at 5 per cent level of significance.
It is clear from the analysis that the respondents who are businessman and self employees are
opined that they probably would buy the township than the other group of the respondents.
RECOMMENDATION
The current study aims on the consumer’s attitude on purchase of opulence township, so as to take
informed business decisions (which would form as inputs to go ahead with the proposed township)
and through this process of study it has been found that India’s real estate market is poised for
tremendous growth potential with a wave of development and investment into these “exciting”
International Journal of Engineering and Social Science
www.gjmr.org 25
27. IJESS Volume1Issue3 ISSN: 2249‐ 9482
assets. It is recommended that the “Opulence” has been well received by the industry stakeholders
company and they can go forward with the project. Opulence can be further added to the project
proposal green property with infrastructure, keeping tradition & technology under one roof .It is also
recommended that the concern can added amenities which can provide Yoga / meditation centers,
Gym, Clinics, Crèche, ATMs etc., Developers can look at Coimbatore - Tirupur belt for the further
business promotions.The price tag should be moderately range between 30 – 40 lakhs to attract all
categories of potential buyers.
CONCLUSION
It was observed that the main factor affecting the real estate business in Coimbatore and Tirupur
districts is due to the increased in land prices, followed by government policies / lack of infrastructure
and lastly by fluctuation in interest rate in home loans.India is emerging as one of the places to live
in with tranquility and a better social life. India now is not only a place to find greenery and an
enriched culture but also it is the place to find various opportunities in terms of jobs and money. Due
to growth in income class there has been an unprecedented rise in the real estate business in India.
. Real Estate Agents are good option as well, for those service class people who hardly have enough
time to search for place to put up their effects. There is a discernible hunger for knowledge and
interaction as developers and investors begin to penetrate the Indian real estate market. The
Opulence’s key success lies in the provision of pollution free environment, hassle free traffic,
optimum utilization of the scope of upcoming projects proposed area, existing educational
establishments (for multiplex/malls) and location proximity etc.,
References:
Books-
1. C.R.Kothari- Research methodology and techniques, second edition, new age international (p)
Limited publications, Reprinted, 2005.
2. O.R. Krishnaswamy and M.Ranganatham- Methodology of Research in social science;
Himalaya Publishing House; reprint 2006.
International Journal of Engineering and Social Science
www.gjmr.org 26
28. IJESS Volume1Issue3 ISSN: 2249‐ 9482
3. Philip Kotler, “Marketing Management”, prentice hall of India private Ltd., New Delhi, 2000.
4. Pillai,R.S.N and Bagavathi, “Modern Marketing”, S.Chand and Company Ltd., 2004
Journals and Magazines-
1. Rands Joseph, Real Estate Development in India; Published 10/07/2006
2. Samuel Zell, Real estate industry- The true barometer for a country’s economy; Keynote
Address, Chairman Equity Group Investments, USA in a International Symposium; a Global
Platform where Developers & Investors Gather to Discuss Emerging Opportunities in India
Real Estate Market; 23-25 April 2007, Renaissance Mumbai Hotel & Convention Centre,
Mumbai, India.
3. Jones Lang LaSalle Meghraj (2007); Emerging Trends and Adoption of Sustainable practices
in India; New Delhi, 25 November.
Web Sites-
1. http://www.buzzle.com/articles/real-estate-developements-india.html
2. Mizra Sajid; Properties in south India; Article sphere; May 2007. :
http://www.articlesphere.com/Article /Properties-in-south-India/156562.
International Journal of Engineering and Social Science
www.gjmr.org 27
29. IJESS Volume1Issue3 ISSN: 2249‐ 9482
WIRELESS SIGNAL STRENGTH ENHANCEMENT IN LOCAL AREA
NETWORK (WLAN)
M. Umair Saleem*
Tasleem Mustafa**
Ahsan Raza Sattar***
Dr. Muhammad Saleem****
Dr. Shaukat Ali*****
ABSTRACT
With the improvement in IEEE 802.11 standards, wireless networks are increasing in number.
With the advancement of technology, the data rates and coverage of Wi-Fi and usage for
different high bandwidth increases. The major problem in the Wireless Local Area network
(WLAN) is its coverage. In this research, different techniques were implemented to increase the
signal strength of wireless network (WLAN). Various forms of antennas (circular, parabolic etc.)
with different types of material (aluminum, steel and iron etc) were prepared locally. These
devices were used to increase the signal strength of WLAN in a minimum cost. These equipments
were attached with the AP (Access point) to enhance its efficiency and signal strength.
Furthermore comparative study among these devices with AP and existing devices were carried
out to evaluate the performance of above mentioned antennas.
*Computer Network Engineer, MIT College of Commerce and Computer, Faisalabad, Pakistan.
** Chairman, Department of Computer Science, University of Agriculture Faisalabad, Pakistan.
*** Lecturer, Department of Computer Science, University of Agriculture Faisalabad, Pakistan
**** Senior Research officer, Dept. of water management, University of agriculture Faisalabad,
Pakistan.
***** Assistant Professor, University of Agriculture Faisalabad, Pakistan
International Journal of Engineering and Social Science
www.gjmr.org
28
30. IJESS Volume1Issue3 ISSN: 2249‐ 9482
INTRODUCTION
In the present, the industry is grown towards portability of network. Most of the phone
companies and signal based network companies launch wireless network facilities instead of
wired network. This mobility supports efficiency as well as service opportunities not achievable
with wired networks.
NEED FOR RESEARCH
In wireless network, the communication of network is based on signals. If everything is alright
then the user (who is wirelessly connected with the network) is using network by sitting at a far
distance, he must has a network coverage problem. But how the network increases its signals and
covers a long distance in a minimum cost. When the signal drops then the speed of the network
access will automatically decrease. Hence the signal must be strong and covers long distance
with networks original speed. The major problem in the Wireless Local Area Network (WLAN)
is its coverage. But it is possible to increase signals with the use different types of antennas. But
these are much costly antenna devices. Small CPW-fed T-shaped antenna for MIMO application
was presented to gain signal strength of wireless network. The size of the antenna was only 35%
of conventional CPW-fed T-shaped antenna, which had been satisfied return loss bandwidth and
Omni-directional radiation characteristics. Wi-Fi Access Points are being configured in most of
the possible areas like public parks, hotels, banks and universities.
ANTENNA CHARACTERISTICS
The D-Link Extreme Antenna was a multipurpose antenna designed to help get better
performance of wireless signals. It was an Omni-directional antenna (360o coverage) with the
range of 200 meters shown in figure (1). The dimensions of this antenna was (2.9” x 4.2” x 5.3”).
Operating Temperature of the antenna was (-3°F to 150°F (-21°C to 66°C)) and Storage
Temperature was (-21°F to 170°F (-29°C to 80°C)) it was so much expensive antenna as
compared to signal strength. The market price of this antenna was 180$.
International Journal of Engineering and Social Science
www.gjmr.org
29
31. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Figure (1): D-Link Extreme N™ 2.4GHz Antenna
WIRELESS SIGNAL RADIATION OF D-LINK EXTREME ANTENNA IN
AIR:
The above antenna spreads the wireless signals in a circular form shown in figure (2). It radiates
the signals up and down like a jumping ball.
Figure (2): Wireless signal radiation of D-Link Extreme antenna
MATERIAL USED TO BUILD D-LINK EXTREME ANTENNA:
The first step in building of wireless antenna is the collection of the material required for
building. The essential materials for the wireless antenna are as follows.
1. Low resistance aluminum wire
International Journal of Engineering and Social Science
www.gjmr.org
30
32. IJESS Volume1Issue3 ISSN: 2249‐ 9482
2. Special plastic for coating
3. Special nut to connect with Access Point
4. Aluminum connectors
5. Ninety degree straight building of antenna
6. Fine soldering
7. Low resistance Copper wire
In this research, different techniques and types of antennas were judged-in for the investigation
to increase the signal strength and spread signals of wireless network. Various forms of antennas
(Omni-directional) with different types of material (aluminum, steel iron etc) were prepared
indigenously.
These devices were used to increase the signal strength of WLAN in a minimum cost. The total
cost of these type of antennas was approximately 3$ to 5$. These equipments were attached with
the AP (Access point) built in antenna to enhance its efficiency. The range of these antennas was
approximately above 1000 meters (1km) in outdoor use. Furthermore comparative study among
these devices with AP and existing devices was carried out to evaluate the performance of above
mentioned antennas.
PROBLEM STATEMENT:
In a wireless based network, signal range is a big problem. A user who wants to connect with a
wireless network from a far distance must have a signal problem. When the signal drops then the
speed of the network access will automatically decrease. The user cannot make a reliable
connection with the network. A 5-dbi Access Point antenna has no enough signal strength. The
maximum outdoor range of that antenna was 100 meter. In this research, we investigated new
home made antenna to increase signal strength of Wireless Network.
PROPOSED SOLUTION:
International Journal of Engineering and Social Science
www.gjmr.org
31
33. IJESS Volume1Issue3 ISSN: 2249‐ 9482
A new home made wireless antenna was investigated to increase signal strength. This antenna
was used to increase signals up-to 1000 meters and also in a minimum cost. Following are the
specification of homemade antenna.
Wireless signal radiation of homemade wifi antenna in air:
The following figure (3) shows that the signal spread in the air horizontally. The signal strength
level was not same in all the directions. It depends on the environment and other factors i.e.
building, furniture and trees etc. It spreads signals at least 1 km.
a. Horizontal View
Figure (3): Wireless signal radiation of homemade wifi antenna
b. Vertical View
The following figure (4) shows, how the signal spread in the air. The vertically view of signals
shows that the signals are spreading like a fountain. The signal strength level is not same in all
the sides. Middle lobe is approximately 300 meter up in the air and side lobes covers 1000 meter
approximately in left and right. The signal strength depends on the environment and some other
factors i.e. building, furniture and trees etc. But with all these factors this antenna spreads signals
at least 1 kilo meter.
International Journal of Engineering and Social Science
www.gjmr.org
32
34. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Figure (4): Wireless signal radiation of homemade wifi antenna
Material to build Homemade antenna.
The first step in building the wireless home antenna is the collection of the material required for
building. The essential materials for the homemade wireless antenna are as follows
1. Local packing aluminum foil
2. Local Copper wire
3. Aluminum wire
4. Nuts and Bolts
ADVANTAGES
RANGE as compared to other antennas:
The range of any antenna depends on the material of antenna and also the environment in which
that antenna is used. This antenna was made up of a local material like aluminum, iron and steel.
The range of this antenna was more than 1000 meters (1 km).
The user can connect with the network easily while he will away from the access point up to
1000 meter. The efficiency of this antenna is very high than the other wireless antennas.
OUTDOOR Adjustment:
The antenna should be placed outdoor approximately 20 feet high from the ground.
Material used
International Journal of Engineering and Social Science
www.gjmr.org
33
35. IJESS Volume1Issue3 ISSN: 2249‐ 9482
A local material was used to build homemade antenna. A simple rough aluminum and plane steel
was required to build this antenna.
PRICE compared to the other antennas:
The price will depended on the material which is used to manufacturing of antenna. This
research also concluded that these antennas were made up of a local aluminum and iron material.
The Total cost to build this antenna was approximately 3$-5$. It was most reasonable price
antenna.
Research Methodology
The major problem of WLAN network is the network coverage range. When the signal drops
then the speed of the network access will automatically decrease. The requirements, was to
increase the network signal strength also in a minimum cost. In this research, we were
investigated new techniques to increase signal strength of WLAN. Various forms of antennas
with different types of materials i.e Aluminum and iron etc was prepared locally. These devices
were used to increase the signal strength of WLAN and in a minimum cost. These antennas were
attached with the AP (Access point) antenna to enhance its efficiency. The signals which were
emits from the AP were reflected by these antennas and travels a long distance as compared to
the AP.
Materials and Methods
Wireless Networks are spreading day by day due to their reliability, ease and low cost. The speed
and the reliability of communication of communicating devices is depends on wireless signal.
These signals must be strong, powerful and covered long distance as possible in a minimum cost.
These are strong if the user is using network in its coverage range. The aim of this research was
investigated that how to improve the signal strength of Wireless Local Area Network (WLAN)
and new ways of improving existing standards in terms of distance covered and data rates.
There are lot of software available in the market to measure the strength once the access point
has been installed (Net Stumbler, 2007) or to even plot-out maps of signal strength (Air Magnet,
2007); however to gain this information in proceed of the installation requires a degree of
calculation. This is particularly important in business environments, where it is necessary to
know that network connection cannot be made to the network from outside the building.
International Journal of Engineering and Social Science
www.gjmr.org
34
36. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Figure 5: Wireless signals in building
Some security point of views was also a big question that It is necessary to guarantee that the
user cannot be connect to the network if he wants to connect to the network from outside of the
building. If his device full strength signals then he can easily connected to the network. Figure 5
shows an example of the results of a survey, which is color-coded to aid the explanation of the
information.
Increasing Signal Strength with Homemade Antenna
A homemade antenna was attached with the Access point to increase its efficiency. When the
user was out of range from the access point range, low speed of 5.5 Mbps shown in Figure (6). It
cannot connect a reliable connection, and have no access of network with the proper speed.
Figure 6: Wireless network out of range
International Journal of Engineering and Social Science
www.gjmr.org
35
37. IJESS Volume1Issue3 ISSN: 2249‐ 9482
A homemade antenna was attached with the Access point, that antenna was gain the signal
strength up to double of signals original coverage of access point. A user who was received 5.5
Mbps signals with original antenna of AP, was received 54 Mbps speed with the home made
local antenna shown in the figure (7).
Watch out the speed: 5.5 Mbps
Watch out the signal strength level: 3 of 5 lights are glowed.
Signal quality was also very low. Hence the sent and receive capability would also be
decrease due to low signals.
Figure (7): Wireless network increase high range
Signal Measurement Calculator:
PdBm = Log Pmw x 10
1 Watt = 1x 1000 mW
PdBm = Log 1000 x 10 = 30 dBm
100 mW; P dBm = Log 100 x 10 = 20 dBm
For link budget calculations, the dBm convention is more convenient than the Watts convention.
International Journal of Engineering and Social Science
www.gjmr.org
36
38. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Signal Attenuation
Attenuation (fading) of an RF signal is defined as follows:
Pin : power level input at the attenuator input
Pout: power level output at the attenuator output
Attenuation is expressed in dB as follows: PdB = 10 x Log (Pout / Pin)
i.e., If, due to attenuation, 1/2 power is lost (Pout/Pin = 2),
Attenuation in dB is 10 x Log (2) = 3dB
Path Loss
Path loss is the loss of power of an RF signal travelling (propagating) through space. It is
expressed in dB. Path loss depends on:
Antenna height is a great factor of path loss.
Line of sight clearance between the receiving and transmitting antennas.
The distance between receiving and transmitting antennas.
Loss of Free Space
Attenuation of the electromagnetic wave while propagating through space. This attenuation is
Calculated using the following formula:
Loss of Free space = 20 * Log R (Km) + 20 * Log F (MHz) + 32.4
F = RF frequency expressed in MHz.
R = distance b/t the receiving and transmitting antennas.
At 2.4 Ghz, this formula is: 20 * Log R (Km) + 100
THE EXPERIMENTS
In total, three experiments were performed. The following are the experiments.
Experiment 1st Sniffing for sources of the interference
While performing all experiments, other 802.11 wireless equipments can potentially affect any
results obtained. Thus, the aim of the experiment had been identified, ' II" I I other potential
802.11 causes of the interference using a wireless sniffer. A wireless sniffer was a program that
has ability to capture and report to the user all traffic in the form of the packets (including beacon
frames) that traverses in free space. Wireless on had been a tool that allows users to monitor the
status of the wireless adapter(s) and gather information about nearby wireless access points in
real-time, it can help users to:
International Journal of Engineering and Social Science
www.gjmr.org
37
39. IJESS Volume1Issue3 ISSN: 2249‐ 9482
The measure of the network throughput and view available data rates
Verifying the their network configuration had been correct
Experiment 2nd: The Time Variance
The correct variance over the time of the signal power and Packet mistake Rate had been
unknown. This testing aims to settle on if the signal power and ultimately the error rates alter
considerably over time. We had been chosen any measurement point relatively close to the AP
(ensure packets will be conventional by the wireless swarm) and run the program for as long as
possible.
Experiment 3rd: Signal propagation
The main aim of this experiment had been to determine the signal strength and the amount of the
loss throughout in the area. All of this area had been measured in which experiment had to be
conducted. The plan captured the emit packets from the AP side and record data to the TXT and
database files.
Uploading the data
Once the experiments had been completed during allocated slot, the collected data from all above
three experiments has been then uploaded using a wired connection to a desktop system. The
files that are uploaded include
Text files
Wireless Mon files
Signal strength files
Data Analysis
The statistically software had been needed to that analyzed the experimental results of the
experiment and proceeded to collate the recorded data within the text and database files into
meaningful and compact information set. The program outputs of this information on a single
line along with the particular area. The information set had been present in the database a file
determines. The round trip time i.e. time in which packet send and received had been to the
system at a particular distance and at a particular packet size, the average signal strength had
been the total number of the packets collected and finally the number of the packets was missed.
REUSLTS AND DISCUSSION
It was studied the motivation by the need for fundamental understanding of ultimate limits of
bandwidth efficient delivery of higher bitrates in digital wireless communications and to also
International Journal of Engineering and Social Science
www.gjmr.org
38
40. IJESS Volume1Issue3 ISSN: 2249‐ 9482
begin to look into how these limits might be approached. He examined that exploitation of multi
element array (MEA) technology that was processing the spatial dimension (not just the time
dimension) to improve wireless signal strength and capacities in certain applications.
Measuring and Performance signal strength:
Access point was sending Normal signals, and Pc was received average signals before
implemented homemade (Locally) metallic material antenna behind Access point shown in the
figure 18.
Figure (8) signal strength
Access point was sending High signals and Pc receives high signals after implementing
homemade (Locally) antenna behind Access point shown in the figure 8.
International Journal of Engineering and Social Science
www.gjmr.org
39
41. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Figure (9): Boost signal strength
Analysis of reason of Signal loss
The requirements, is to increase the network signal strength also in a minimum cost. In this
research, we were investigated new techniques to increase signal strength of WLAN. Various
forms of antennas with different types of materials i.e. Aluminum and iron etc was prepared
locally. These devices were used to increase the signal strength of WLAN in a minimum cost.
These antennas were attached with the AP (Access point) antenna to enhance its efficiency. The
signals which were emitting from the AP were reflected by these antennas and travel a long
distance as compared to the AP.
Distance Vs Mean
200
180
160
140
Distance
120
100 Mean
80
60
40
20
0
0 50 100 150 200 250
Mean
Figure 10: Distance Vs Mean RTT
The above figure 10 shows that the distance VS mean. The distance increase and distance
decrease was affected negatively on the network. The distance of 90 feet and 110 feet was
significant effect. The distance of 170 feet has the mean of 140
Byte Vs Mean RTT
160
140
120
100
Mean
80 Mean
60
40
20
0
0 10000 20000 30000 40000 50000 60000 70000
Byte
Figure 11: Byte Vs Mean RTT
International Journal of Engineering and Social Science
www.gjmr.org
40
42. IJESS Volume1Issue3 ISSN: 2249‐ 9482
The above figure 11 shows that the bytes vs. mean RTT. 5000 bytes have the mean of 16.95,
15000 have the mean of 41.62, 25000 have the mean of 65.45, 35000 have the mean of 74.616,
45000 have the mean of 92.977, 55000 have the mean of 120.598, 65000 have the mean of
139.697.
Effect of walls vs. Packet Loss
The above table shows the %age packet loss which shows that as we increase the number of
walls packet loss increases but there is another consideration that if the size of packet is small
there is almost no loss in case of six walls even so we conclude that if the packet size is small the
loss will be almost nil and if we want to communicate from such a location we must maneuver
packet size.
Effect of number of floors vs. RTT
We conducted experiment in university administration block to check the effect of %age packet
loss and increase in RTT in multi-Floor building. We designed a scenario in which first we
placed AP at 3rd Floor and PC on second, first and ground respectively. Than we place AP on
2nd floor and PC on first and first and ground Floor, the last part of the experiment was to place
AP at 1st floor and PC at ground floor. The analysis of variance table is below:
SUMMARY
Main aim of my research had been to look in the current technologies influencing the market like
“wireless local area networks” due to the cheap cost and efficiency, how were the Access Point
sends the signals, how were the antenna boost the signals. In wireless network, the
communication of network is based on signals. If everything is alright then the user (who is
wirelessly connected with the network) is using network by sitting at a far distance, he must has
a network coverage problem. But how the network increases its signals and covers a long
distance in a minimum cost. When the signal drops then the speed of the network access will
automatically decrease. Hence the signal must be strong and covers long distance with networks
original speed. The major problem in the Wireless Local Area Network (WLAN) is its coverage.
But it is possible to increase signals with the use different types of antennas. But these are much
costly antenna devices.
In this research, we have been investigated new techniques to increase signal strength of WLAN.
Various forms of antennas with different types of materials i.e. Aluminum and iron etc have been
International Journal of Engineering and Social Science
www.gjmr.org
41
43. IJESS Volume1Issue3 ISSN: 2249‐ 9482
prepared locally. These devices were used to increase the signal strength of WLAN in a
minimum cost. This antenna was attached with the AP (Access point) antenna to enhance its
efficiency. The signals which were emitted from the AP will amplified with these antennas and
travel a long distance as compared to the original signals of AP. Furthermore comparative study
among these devices with AP and existing devices will be carried out to evaluate the
performance of above mentioned antennas.
LITERATURE CITED
Baek,S., 2010. Receiver Synchronization for UWB TDOA Localization. Electrical and
Computer Engineering. 1(2): 355-380.
Chadchan S. M., C. B. Akki. 2009. The Survey of Handoff Issues in Wireless ATM Networks,
International Journal of Nonlinear Science. 7(2):189-200.
Chakravarty T., S. M. Roy, S. K. Sanyal and A. De. 2005. A novel microstrip patch antenna with
large impedance bandwidth in VHF/UHF range. Progress In Electromagnetics Research, 5(4):
83-93.
Chen, Y. B., Y. C. Jiao, F. S. Zhang, and H. W. Gao. 2006. A novel small CPW-fed T-shaped
antenna for MIMO system applications. Journal of Electromagnetic Waves and Applications,
20(14): 2027-2036.
Cheng H. R., X. Q. Chen, l. Chen and X. W. Shi. 2009. Design of a fractal dual-polarized
aperture coupled micro-strip antenna. Progress in electromagnetics research letters, 9(1):175-
181.
Chou H. and D. Wu. 2002. Radiation of a handset monopole antenna in the presence of a finite
shielding sheet for the purpose of SAR reduction. IEEE International Symposium on Antenna
and Propagation, 1(2): 452-455.
Chou H., H. C. Cheng, H. T. Hsu and L. R. Kuo. 2008. Investigations of isolation improvement
techniques for multiple input multiple output (MIMO) WLAN portable terminal applications.
Progress In Electromagnetic Research, 8(5): 349-366.
International Journal of Engineering and Social Science
www.gjmr.org
42
44. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Cunningham, S. & Grout, V. 2007. War and Peace: A practical study of Wi-Fi related issues.
Proceedings of the International Conference E-Activity and Leading Technologies. 1(2): 393-
399.
Roche G. and Gorce J. 2007. On predicting in-building WiFi coverage with a fast discrete
approach, Int. J. Mobile Network Design and Innovation, l(2):1344-1364.
Fakhr R. S., A. A. L. Neyestanak and M. N. Moghaddasi. 2009. Compact size and dual band
semicircle shaped antenna for MIMO applications. Progress In Electromagnetic Research, 1(2):
147-154.
Foschini G.J. and M.J. Gans. 1998. On limits of wireless communications in a fading
environment when using multiple antennas. Wireless Personal Communications, 6(1): 311-335.
Gesbert, D., H. Bolcskei, A. G Dhananjay and J. P. Arogyaswami. 2002. Outdoor MIMO
Wireless Channels: Models and Performance Prediction. Transactions on communications, 5(9):
1926-1934.
Hardy, W. 2003. VoIP Service Quality: Measuring and Evaluating Packet-Switched Voice,
McGraw-Hill Professional, 9(2): 32-35
Ji, Z., Li, B.-H. Wang, H.-X., Chen, H.Y. and Sarkar, T.K. 2001. Efficient raytracing methods
for propagation prediction for indoor wireless communications. IEEE Antennas and Propagation
Magazine. 43(2): 41-49.
Jiao J., G. Zhao, F.S. Zhang, H.W. Yuan and Y.C. Jiao. 2007. A broadband CPW-fed T-shape
slot antenna. Progress In Electromagnetics Research, 7(6): 237-242.
Johansson B., S. Jain and E. Yücesan, 2010. Estimating path loss in wireless local area networks
using ordinary kriging, Proceedings of the Winter Simulation Conference, 9(8): 2888-2896.
Krusevac S., P. B. Rapajic and R. Kennedy. 2006. Mutual coupling effect on thermal noise in
multi-element antenna systems. Progress in electromagnetics research, 5(5): 325-333.
Min K.S., M.S. Kim, C.K. Park and M. D. Vu. 2008. Design for PCS antenna based on WIBRO-
MIMO. Progress in electromagnetics research letters, 1(2): 77-83.
International Journal of Engineering and Social Science
www.gjmr.org
43
45. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Nedil, M., M. A. Habib, T. A. Denidni and H. Boutayeb. 2008. Quasi-metallic-wall technique for
increasing the efficiency of CB-CPW antennas. Progress In Electromagnetics Research, 3(4):
437-455.
Rahman, M. and F. Harmantzis 2004. IEEE 802.11 Inter-WLAN Mobility Control with
Broadband Supported Distribution System Integrating WLAN and WAN Stevens Institute of
Technology, Castle Point on Hudson, Hoboken, NJ 07030, U.S.A.
Ren W. 2008. Compact dual-band slot antenna for 2.4/5 Ghz WLAN applications. Progress in
electromagnetics research 8(1): 319-327.
Shynu S. V., G. Augustin, C. K. Aanandan, P. Mohanan, and K. Vasudevan. (2006). Design of
compact reconfigurable dual Frequency microstrip antennas using Varactor diodes. Progress in
electromagnetics research, 60: 197-205.
Stallings, W. 2004. IEEE 802.11: Wireless LANs from a to n. IT Professional. McGraw Hill
publication, 6(5): 32-38
Tzannes,P., 2005. Design considerations of MIMO antennas for mobile phones. Characterizing
wireless lan transmission characteristics Piers online, 4(1): 129-135
Usman M.and A. Abd-al-hameed, 2008. Design considerations of MIMO antennas for mobile
phones. Piers online, 4(1): 121-125.
Takeuchi S. and K. Sezaki 2004. An Improved Power Saving Mechanism for MAC Protocol in
Ad Hoc Networks. IEEE Communications Society, 3(2): 2791-2796
Wiley J. 2008. Modern Antenna, Mobile Network Design and Innovation, 1(2):233-276.
International Journal of Engineering and Social Science
www.gjmr.org
44
46. IJESS Volume1Issue3 ISSN: 2249‐ 9482
SECURITY IN VEHICULAR AD-HOC NETWORKS - CHALLENGES
AND COUNTERMEASURES
Ann Baby*
.Dr.Sreekumar**
ABSTRACT
Vehicular Ad-hoc Networks (VANETS) are a kind of MANETs (Mobile Ad Hoc Networks) which
operate without any predefined infrastructure. Vehicular Networks are conceived from the
Intelligent Transportation Systems. Ad hoc (or self-organizing) networks operate without
predefined infrastructure. In VANETs, vehicles equipped with Wi-Fi hardware constitute the
mobile nodes (hosts). VANETs help in inter vehicular and intra vehicular communication. The
most challenging issue in VANETs is the security aspect. This paper is an effort in discussing the
security aspects in VANETs, the challenges, requirements and a possible solution to overcome e
the security aspects in VANETs.
Keywords: VANETs, V2V, V2I, RSU, DCF, PCF, Vehicular Public Key Infrastructure, Digital
Signatures.
*
Computer Science Department, Rajagiri College of Social Sciences, Kalamassery, Kerala
**
Computer Science Departments, Cochin University of Science and Technology, Cochin, Kerala.
International Journal of Engineering and Social Science
www.gjmr.org
45
47. IJESS Volume1Issue3 ISSN: 2249‐ 9482
1. INTRODUCTION
The innovations and improvement in the networking technologies has resulted in the
development of VANETs. VANETS (Vehicular Ad Hoc Networks) is a special kind of
MANETs (Mobile Ad Hoc Networks)) which aids in Vehicular Communication. Vehicular
Communication offers safer roads, efficient driving and easier maintenance. VANETs help in
saving time and money. The IEEE 802.11 Wireless standards are of high acceptance in today’s
academic and commercial standards. Driving cars includes two aspects: the first one being driver
assistance and car safety and the second one is infotainment for the travelers in the car (1). The
exchange of data and information between vehicles helps in the process of transferring real
time data. It also helps in communication about the road traffic and environment conditions.
VANETS also finds its applications in determining free parking slots and online help for car
maintenance. Research is also in progress for inter-vehicle communication. The field of inter-
vehicular communications (IVC), including both vehicle-to-vehicle communications (V2V) and
vehicle-to roadside communications (V2R), also known as VANET, is recognized as an
important component of ITS (Intelligent Transport Systems) in various national plans.(2) Traffic
fatalities are the leading causes of death in many countries. (3)This paper discusses the IEEE
802.11 standards for VANETS, the security problems that occurs in VANETs and the
countermeasures to overcome them.
2. VANET BASICS
Vehicular ad hoc networks are also known under a number of different terms such as inter
vehicle communication (IVC), Dedicated Short Range Communication (DSRC) or WAVE.(3) A
MANET is a self forming network which can function without the help of a centralized control.
Each node in this type of an ad-hoc network can act as both a terminal to store data and also as a
router. The nodes communicate through wireless medium in their specific radio range. VANETs
are a type of MANETs. As installing IEEE802.11 access points in all roads is expensive, it is
beneficial to go for an ad-hoc network. It also helps in quicker deployment. The greatest
challenge in creating a VANET is the rapidly changing network topology. The approximate time
International Journal of Engineering and Social Science
www.gjmr.org
46
48. IJESS Volume1Issue3 ISSN: 2249‐ 9482
period in which two vehicles are in the same communication range is approximately one minute,
which is a greatest challenge for implementing VANETS. The error-rate in wireless networks is
also comparatively higher. Another challenge is the limited ad-hoc mode provided by the
IEEE802.11 protocols.
3. WORKING OF VANETS
VANETS can be of V2V or V2R (also known as V2I- Vehicle-to-infrastructure) approaches. In a
V2V approach which requires zero infrastructures to outside devices is purely ad-hoc. In this
approach, vehicles communicate with each other to determine the traffic situation. The number
of vehicles needed to use the system to get quality information need to be determined. In the
second approach which employs both V2V and V2R requires roadside devices or units (RSUs)
as outside infrastructure. RSUs are usually placed in the traffic lights, road dividers etc. Using
this technology, vehicles can communicate with RSUs (also known as OBUs-On-Board Units)
and with other vehicles. Thus, a VANET is an ad-hoc network with vehicles, other network
services and applications (2).
Figure 1: Conceptual Schematic of a VANET
The IEEE has completed the standards IEEE P1609.1, P1609.2, P1609.3, and P1609.4 for
vehicular networks and recently released them for trial use. (4)
4. VANET APPLICATIONS
The three major areas of applications of VANETs are safety oriented, convenience oriented and
commercial oriented. (5) Safety applications include a Slow/Stop Vehicle Advisor (SVA) which
International Journal of Engineering and Social Science
www.gjmr.org
47
49. IJESS Volume1Issue3 ISSN: 2249‐ 9482
happens through V2V. Another safety application is Emergency Electronic Brake Light (EBBL).
Broadcast warning message about a vehicle involved in accident is done through Post Crash
Notification (PCN). Road Hazard Control Notification (RHCN) notifies other cars about road
slides, floods etc. Co-operative Collision Warning (CCW) alerts vehicles about potential crash
routes.
Convenience applications include Congested Road Notification (CRN) which alerts and notifies
congestion routes. Parking Availability Notification (PAN) helps in locating available parking
lots.
Commercial Applications include RVP/D, CMDD, RTVR and SA. Remote Vehicle
Personification/Diagnostics (RVP/D) downloads and uploads vehicle settings from/to
infrastructure. Content Map Database Download (CMDD) helps in obtaining information from
other stations. Real Time Video Relay (RTVR) helps in viewing videos for entertainment.
Service Announcements (SA) helps in giving alerts about gas stations, restaurants and restrooms
on the highway. (5) The U.S. Federal Communications Commission (FCC) recently allocated 75
MHz of Dedicated Short Range Communications (DSRC) spectrum, a one or two-way short to
medium range wireless communication channels at 5.9 GHz, to be used exclusively for V2V
and V2R communications(6).
5. MAC PROTOCOLS FOR VANETS
VANET Medium Access Control (MAC) protocols have to cater to the fast changing network
topologies and the different kinds of applications. VANET MAC protocols have to also reduce
the medium access delay for safety applications. Modifications need to be thus made to the MAC
layer to create wide scale VANETs, to share the wireless channel medium. It is the duty of the
MAC to ensure nodes from transmitting at the same time and to avoid collision. Due to the large
availability of cheap IEEE 802.11 based wireless devices, both the MAC and physical layer can
be addressed. (3)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) with acknowledgements
helps the network in avoiding collisions. Two protocols namely Distributed Co-ordinate
Function(DCF), a contention based, easy to implement access protocol where all the nodes
planning to send data compete for the channel, and Point Co-ordinate Function (PCF), a
International Journal of Engineering and Social Science
www.gjmr.org
48
50. IJESS Volume1Issue3 ISSN: 2249‐ 9482
contention free protocol , which is not applicable to ad-hoc networks are defined by 802.11
standards. (7)
5.1 IEEE 802.11 Standards
IEEE defines a MAC sub layer, protocols and services for the WLANs and three physical (PHY)
layers. The SME (Station Management Entity) and MLME (MAC Layer Management Entity)
control the MAC sub layer.
The IEEE working group has now come out with the 802.11p, an approved amendment (2009) to
the IEEE 802.11 standard for implementing wireless access in vehicular environments (WAVE),
the next generation dedicated short-range communications (DSRC) state-of-the art technology to
support VANETs. IEEE 802.11p includes vehicular safety applications, data transfer enabled
through V2V and V2R, in the licensed ITS band of 5.9 GHz (5.85-5.925 GHz). The IEEE
802.11p also states that in the United States proposes that the information about an accident
should be communicated through VANET within half a second to all equipped vehicles in 500
meters range. (7) 802.11p will be used as the groundwork for DSRC based on the ISO CALM
architecture standard looking at vehicle-based communication networks, particularly for
applications such as toll collection, vehicle safety services, and commerce transactions via cars.
(8) CALM is an acronym for Continuous Air interface for Long and Medium distance. WAVE
uses the CSMA/CA as the basic medium access scheme for sharing links between vehicles and
stations.
6. INTER VEHICLE AND INTRA VEHICLE COMMUNICATION
Communicating vehicles can be possible by microwaves for broadcast communication and
infrared for directional communication, though microwaves are used more often (9). Bluetooth
technology is also used widely. Communication requests can be refused due to the master/slave
setup of Bluetooth. Directional MAC (DMAC) protocol, which uses only directional
transmissions (10) helps in avoiding hidden terminal and deafness problems among nodes. A
Circular Request to Send (CRTS) consisting of RTS-CTS-DATA-ACK is sent directionally. The
source transmits its data when it receives Clear to Send (CTS) message. Though DMAC should
have better performance, it is hindered by mobile portability. (10) The Adaptive Space Division
Multiplexing (ASDM) addresses the denial of Service (DoS) attacks. It is an extension of Space
International Journal of Engineering and Social Science
www.gjmr.org
49
51. IJESS Volume1Issue3 ISSN: 2249‐ 9482
Division Multiple Access (SDMA) where time slots are assigned based on the location of
vehicles on the highway.
Communication functions inside a vehicle can be performed using the wireless technologies.
IEEE 802.15.1(Bluetooth), IEEE 802.15.3(UWB (Ultra Wide Band), high data rate) and IEEE
802.15.4 (ZigBee, low data rate) can be used for the inter vehicle communication. Bluetooth
which is a proven, cheap technology can transmit both voice and data with good security
features. The power requirement is low and security features are good. It conforms to the
Frequency Hopping Spread Spectrum (FHSS) mode and supports star topology and has error
correcting mechanisms (11).
7. SECURITY REQUIREMENTS IN VANETS
Similar to any other networks, VANETS are also vulnerable to attackers and adversaries. The
CIAN (Confidentiality, Integrity, Availability and Non-Repudiation) are of most importance to a
VANET.
Confidentiality- It ensures that information is accessible only to those nodes authorized to have
access. It prevents unauthorized access. Not all data are confidential but critical data require
confidentiality. This type of access includes printing, transmitting, displaying and other forms of
disclosure, including simply revealing the existing of a vehicle.
Integrity and Authentication – It ensures safeguarding the accuracy and completeness of
information and processing methods. Data cannot be modified.
Availability – Availability ensures that authorized users have access to information and
associated assets when required. Availability requires that vehicle details are available to
authorized parties. Availability is a requirement intended to assure that systems work promptly
and service is not denied to authorize users.
Non Repudiation – The sender of the message cannot deny having sent the message. It ensures
that a transferred message has been sent and received by the parties claiming to have sent and
received the message. It guarantees that the sender of a message cannot later deny having sent
the message and that the recipient cannot deny having received the message.
International Journal of Engineering and Social Science
www.gjmr.org
50