This document summarizes a research paper that proposes a system called Traffic Pattern Discovery System (TPDS) to discover communication patterns in mobile ad hoc networks (MANETS) without decrypting packets. The system uses a heuristic best-first search approach to find a target node, performs statistical traffic analysis on that node, and calculates probability distributions to identify the source and destination nodes. The paper describes the system design, implementation including topology formation and data routing, results from simulations with different node counts, and an analysis of the success rate. It is concluded that the system is able to fulfill its purpose of reducing anonymity in MANETS through discovering communication patterns with an overall success rate of 93.67%.
Prediction of RNA 3D Structure using Parallel Algorithmrahulmonikasharma
This document describes a novel methodology for predicting RNA tertiary structure using known structural templates from a database. The method first analyzes the RNA secondary structure to identify free nucleotide regions that could contribute to tertiary interactions. Similar structural templates are then searched from a database and used to model the tertiary structure. The predicted tertiary structure is expected to have minimum negative energy like the templates. The method can predict structures of large ribosomal RNAs. Experimental results show prediction accuracy based on similarity and time required.
A Survey on the Use of Pattern Recognition Techniquesrahulmonikasharma
This document discusses various pattern recognition techniques including statistical, structural, hybrid, and neural network approaches. Statistical pattern recognition uses concepts from statistical decision theory to classify patterns based on quantitative features. Structural pattern recognition focuses on morphological primitives and relationships. Hybrid approaches combine statistical and structural methods. Neural networks like multilayer perceptrons are commonly used for pattern classification and can learn efficiently from data with low dependence on prior knowledge. The document provides examples of different pattern recognition applications and concludes different techniques may be suitable depending on the problem domain.
This document describes the design of a pick and place robotic arm that is controlled via Bluetooth by an Android device. The robotic arm uses 5 DC motors - 2 for body movement and 3 for arm and gripper movement. It consists of an 8051 microcontroller, Bluetooth receiver, LCD display, motor driver IC, DC gear motors, relay, regulator, battery and other electrical components. The Android application acts as a remote control to move the robotic arm forward, backward, left and right to pick and place objects. The document discusses the system architecture, components, working and concludes the robotic arm can be useful for industrial purposes and enhanced with additional features.
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...rahulmonikasharma
The latest development in machine learning techniques has enabled the development of intelligent tools which can identify anomalies in the system in real time. These intelligent tools become expert systems when they combine the algorithmic result of root cause analysis with the domain knowledge. Truth maintenance, fuzzy logic, ontology classification are just a few out of many techniques used in building these systems. Logic is embedded in the code in most of the traditional computer program, which makes it difficult for domain experts to retrieve the underlying rule set and make any changes. These system bridge the gap by making information explicit rather than implicit. In this paper, we present a new approach for developing an expert system using decision tree analysis with probabilistic network models such as Bayes-network. The proposed model facilitate the process of correlation between belief probability with the unseen data by use of logical flowcharting, loopy belief propagation algorithm, and decision trees analysis. The performance of the model will be measured by evaluation and cross validation techniques.
Smart License Plate Recognition Using Optical Character Recognition Based on ...rahulmonikasharma
In recent years Unmanned Aerial Vehicle (UAV) is major focused of active research, since they can extend our capabilities in a variety of areas, especially for application like research detection, tracking and recognition. For our project goals is vehicle tracking and plate recognition. In addition, we have to combine some intelligence algorithms. In this project to define the number and type of vehicles, using our nation's roadways is becoming more and more important. This project used for Multicopter. The multicopter to flying around of the roadway. Because it is to collect roadway’s data. That means, to send a picture of a vehicle violating the law. Then our algorithm is recognizing to the number plate. In addition, this algorithm saving the vehicle number plate. We are great database in this algorithm. In this paper, template matching algorithm for character recognition is used. The developed system first detects the vehicle and capture the image. Then vehicle number plate region is extracted using the image segmentation in an image. Character recognition algorithm working on the OCR algorithm. We are detection accuracy to increase by using some algorithms. We combined these different algorithms using a modified version of PCA and OCR recognizer, we designed the proposed an architecture using OpenCV and we used to implement the design in the Multicopter.
Restricting Barrier and Finding the Shortest Path in Wireless Sensor Network ...rahulmonikasharma
Wireless Sensor Network (WSN) is a collection of spatially deployed in wireless sensors. In general, sensing field could contain various barriers which cause loss of information transferring towards the destination. As a remedy, this proposed work presents an energy-efficient routing mechanism based on cluster in mobile sink. The scope of this work is to provide a mobile sink in a single mobile node which begins data-gathering from starting stage, then immediately collects facts from cluster heads in single-hop range and subsequently, it returns to the starting stage. During the movement of the mobile sink if the barrier exists in the sensing field it can be detected using Spanning graph and Grid based techniques. The possible locations for the mobile sink movement can be reduced easily by Spanning graph. At last, Barrier avoidance-shortest route was established for mobile sink using Dijkstra algorithm. The Distributed location information is collected using a Timer Bloom Filter Aggregation (TBFA) scheme. In the TBFA scheme, the location information of Mobile node (MNs) is maintained by Bloom filters by each Mobile agent (MA). Since the propagation of the whole Bloom filter for every Mobile node (MN) movement leads to high signaling overhead, each Mobile agent (MA) only propagates changed indexes in the Bloom filter when a pre-defined timer expires. To verify the performance of the TBFA scheme, an analytical model is developed on the signaling overhead and the latency and devise an algorithm to select an appropriate timer value. Extensive simulation and Network Simulator 2(NS2) results are given to show the accuracy of analytical models and effectiveness of the proposed method.
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
Routing Protocols for Large-Scale Wireless Sensor Networks: A Reviewrahulmonikasharma
With the advances in micro-electronics, wireless sensor gadgets have been made substantially littler and more coordinated, and large-scale wireless sensor networks (WSNs) based the participation among the noteworthy measure of nodes have turned into a hotly debated issue. "Large-scale" implies for the most part large region or high thickness of a system. As needs be the routing protocols must scale well to the system scope augmentation and node thickness increments. A sensor node is regularly energy-constrained and can't be energized, and in this manner its energy utilization has a very critical impact on the adaptability of the protocol. To the best of our insight, at present the standard strategies to tackle the energy issue in large-scale WSNs are the various leveled routing protocols. In a progressive routing protocol, every one of the nodes are separated into a few gatherings with various task levels. The nodes inside the abnormal state are in charge of data aggregation and administration work, and the low level nodes for detecting their environment and gathering data. The progressive routing protocols are ended up being more energy-proficient than level ones in which every one of the nodes assume a similar part, particularly as far as the data aggregation and the flooding of the control bundles. With concentrate on the various leveled structure, in this paper we give an understanding into routing protocols planned particularly for large-scale WSNs. As per the distinctive goals, the protocols are by and large ordered in light of various criteria, for example, control overhead decrease, energy utilization mitigation and energy adjust. Keeping in mind the end goal to pick up a thorough comprehension of every protocol, we feature their imaginative thoughts, portray the basic standards in detail and break down their points of interest and hindrances. Also a correlation of each routing protocol is led to exhibit the contrasts between the protocols as far as message unpredictability, memory necessities, localization, data aggregation, bunching way and different measurements. At last some open issues in routing protocol plan in large-scale wireless sensor networks and conclusions are proposed.
Prediction of RNA 3D Structure using Parallel Algorithmrahulmonikasharma
This document describes a novel methodology for predicting RNA tertiary structure using known structural templates from a database. The method first analyzes the RNA secondary structure to identify free nucleotide regions that could contribute to tertiary interactions. Similar structural templates are then searched from a database and used to model the tertiary structure. The predicted tertiary structure is expected to have minimum negative energy like the templates. The method can predict structures of large ribosomal RNAs. Experimental results show prediction accuracy based on similarity and time required.
A Survey on the Use of Pattern Recognition Techniquesrahulmonikasharma
This document discusses various pattern recognition techniques including statistical, structural, hybrid, and neural network approaches. Statistical pattern recognition uses concepts from statistical decision theory to classify patterns based on quantitative features. Structural pattern recognition focuses on morphological primitives and relationships. Hybrid approaches combine statistical and structural methods. Neural networks like multilayer perceptrons are commonly used for pattern classification and can learn efficiently from data with low dependence on prior knowledge. The document provides examples of different pattern recognition applications and concludes different techniques may be suitable depending on the problem domain.
This document describes the design of a pick and place robotic arm that is controlled via Bluetooth by an Android device. The robotic arm uses 5 DC motors - 2 for body movement and 3 for arm and gripper movement. It consists of an 8051 microcontroller, Bluetooth receiver, LCD display, motor driver IC, DC gear motors, relay, regulator, battery and other electrical components. The Android application acts as a remote control to move the robotic arm forward, backward, left and right to pick and place objects. The document discusses the system architecture, components, working and concludes the robotic arm can be useful for industrial purposes and enhanced with additional features.
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...rahulmonikasharma
The latest development in machine learning techniques has enabled the development of intelligent tools which can identify anomalies in the system in real time. These intelligent tools become expert systems when they combine the algorithmic result of root cause analysis with the domain knowledge. Truth maintenance, fuzzy logic, ontology classification are just a few out of many techniques used in building these systems. Logic is embedded in the code in most of the traditional computer program, which makes it difficult for domain experts to retrieve the underlying rule set and make any changes. These system bridge the gap by making information explicit rather than implicit. In this paper, we present a new approach for developing an expert system using decision tree analysis with probabilistic network models such as Bayes-network. The proposed model facilitate the process of correlation between belief probability with the unseen data by use of logical flowcharting, loopy belief propagation algorithm, and decision trees analysis. The performance of the model will be measured by evaluation and cross validation techniques.
Smart License Plate Recognition Using Optical Character Recognition Based on ...rahulmonikasharma
In recent years Unmanned Aerial Vehicle (UAV) is major focused of active research, since they can extend our capabilities in a variety of areas, especially for application like research detection, tracking and recognition. For our project goals is vehicle tracking and plate recognition. In addition, we have to combine some intelligence algorithms. In this project to define the number and type of vehicles, using our nation's roadways is becoming more and more important. This project used for Multicopter. The multicopter to flying around of the roadway. Because it is to collect roadway’s data. That means, to send a picture of a vehicle violating the law. Then our algorithm is recognizing to the number plate. In addition, this algorithm saving the vehicle number plate. We are great database in this algorithm. In this paper, template matching algorithm for character recognition is used. The developed system first detects the vehicle and capture the image. Then vehicle number plate region is extracted using the image segmentation in an image. Character recognition algorithm working on the OCR algorithm. We are detection accuracy to increase by using some algorithms. We combined these different algorithms using a modified version of PCA and OCR recognizer, we designed the proposed an architecture using OpenCV and we used to implement the design in the Multicopter.
Restricting Barrier and Finding the Shortest Path in Wireless Sensor Network ...rahulmonikasharma
Wireless Sensor Network (WSN) is a collection of spatially deployed in wireless sensors. In general, sensing field could contain various barriers which cause loss of information transferring towards the destination. As a remedy, this proposed work presents an energy-efficient routing mechanism based on cluster in mobile sink. The scope of this work is to provide a mobile sink in a single mobile node which begins data-gathering from starting stage, then immediately collects facts from cluster heads in single-hop range and subsequently, it returns to the starting stage. During the movement of the mobile sink if the barrier exists in the sensing field it can be detected using Spanning graph and Grid based techniques. The possible locations for the mobile sink movement can be reduced easily by Spanning graph. At last, Barrier avoidance-shortest route was established for mobile sink using Dijkstra algorithm. The Distributed location information is collected using a Timer Bloom Filter Aggregation (TBFA) scheme. In the TBFA scheme, the location information of Mobile node (MNs) is maintained by Bloom filters by each Mobile agent (MA). Since the propagation of the whole Bloom filter for every Mobile node (MN) movement leads to high signaling overhead, each Mobile agent (MA) only propagates changed indexes in the Bloom filter when a pre-defined timer expires. To verify the performance of the TBFA scheme, an analytical model is developed on the signaling overhead and the latency and devise an algorithm to select an appropriate timer value. Extensive simulation and Network Simulator 2(NS2) results are given to show the accuracy of analytical models and effectiveness of the proposed method.
A biometric ,system has been the important affordable and more reliable system .A biometrics identification system is refers to the automatic recognition of individual person based on their characteristics. Early authentication method like which can be stolen or shared by with other person . Biometric has two modals ,unimodals and multimodals .Inunimodol system , it has disadvantages due to lack of its non –versality and unacuptable error rate .To overcome these unimodal issues multimodals is better approach for combining two or more features of person like for sirisdetetmines a authentication (i.e. identification and verification ) this paper that characterstics ,types and biometrics ,fusion levels and research areas etc.
Routing Protocols for Large-Scale Wireless Sensor Networks: A Reviewrahulmonikasharma
With the advances in micro-electronics, wireless sensor gadgets have been made substantially littler and more coordinated, and large-scale wireless sensor networks (WSNs) based the participation among the noteworthy measure of nodes have turned into a hotly debated issue. "Large-scale" implies for the most part large region or high thickness of a system. As needs be the routing protocols must scale well to the system scope augmentation and node thickness increments. A sensor node is regularly energy-constrained and can't be energized, and in this manner its energy utilization has a very critical impact on the adaptability of the protocol. To the best of our insight, at present the standard strategies to tackle the energy issue in large-scale WSNs are the various leveled routing protocols. In a progressive routing protocol, every one of the nodes are separated into a few gatherings with various task levels. The nodes inside the abnormal state are in charge of data aggregation and administration work, and the low level nodes for detecting their environment and gathering data. The progressive routing protocols are ended up being more energy-proficient than level ones in which every one of the nodes assume a similar part, particularly as far as the data aggregation and the flooding of the control bundles. With concentrate on the various leveled structure, in this paper we give an understanding into routing protocols planned particularly for large-scale WSNs. As per the distinctive goals, the protocols are by and large ordered in light of various criteria, for example, control overhead decrease, energy utilization mitigation and energy adjust. Keeping in mind the end goal to pick up a thorough comprehension of every protocol, we feature their imaginative thoughts, portray the basic standards in detail and break down their points of interest and hindrances. Also a correlation of each routing protocol is led to exhibit the contrasts between the protocols as far as message unpredictability, memory necessities, localization, data aggregation, bunching way and different measurements. At last some open issues in routing protocol plan in large-scale wireless sensor networks and conclusions are proposed.
Vehicular Ad-hoc Network, its Security and Issues: A Reviewrahulmonikasharma
Vehicular ad hoc network (VANET) is a vehicle to vehicle (VVC) and roadside to vehicle (RVC) communication system. The technology in VANET incorporates WLAN and Ad Hoc networks to achieve the regular connectivity. The ad hoc network is brought forth with the objectives of providing safety and comfort related services to vehicle owners. Collision warning, traffic congestion warning, lane-change warning, road blockade alarm (due to construction works etc.) are among the major safety related services addressed by VANET. In the other category of comfort related services, vehicle users are equipped with Internet and Multimedia connectivity. The major research challenges in the area lies in design of routing protocol, data sharing, security and privacy, network formation etc. We aim here to study the overview of VANET and its security issues.
A Framework for Improving the Performance of MANET by Controlling Data Traffi...rahulmonikasharma
A mobile ad-hoc network is a category of wireless network which does not depend on a predefined network structure or topology. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. Two mobile nodes can exchange data directly if they are in the defined range of each other. If not, nodes can communicate via a multi-hop route with the help of other mobile nodes. This paper proposed an approach to improve data transmission by reducing the data traffic and it also increase data availability in the mobile ad-hoc network. In the proposed approach, MANET is server client based network, means a mobile host acts as a server and fulfill the others node’s request. Each mobile node has a buffer for temporarily storing data fragment for a specific time, If a mobile node requests for a particular data fragment and the request is multi hoped, then first request is sent to its neighbor node, neighbor node first match requested data fragment with stored data, if it is matched the request will be responded by this neighbor otherwise request will be routed to mobile server. In this way the overhead of the server and server traffic will be reduced. The proposed method reduces time consumed by data fetching directly from server routing through multiple nodes and thus, it also enhances data availability.
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
Wireless Sensor Networks (WSNs) have been widely considered as one of the most important technologies for the twenty first century. Due to the advancements in microelectronic mechanical systems (MEMS) and wireless communication technologies, it has become possible to deploy tiny, cheap, and smart sensors in any physical area. The routing is one of the dominant factors which decide the fate of limited battery resources in WSNs. In this paper, a review on the state-of-the-art on PEGASIS (Power efficient Gathering in Sensor Information System) protocol has been presented. PEGASIS is highly significant in small areas applications, some of the variants of PEGASIS protocol has been studied in this paper. After studying various protocols, it has been found that Chain Based Cluster Cooperative Protocol (CBCCP) has tremendously improved network lifetime by incorporating cluster based concept in routing. Although it has outperformed various routing protocols but it still leave a great margin of improvement in the inter cluster communication. This paper basically focuses on reflecting the significance of chain based protocols in WSNs.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This document discusses a mobile coordinated wireless sensor network (MC-WSN) approach for structural health monitoring applications with fault tolerance. The key points are:
1) The MC-WSN uses mobile access points to coordinate the sensor network and collect data directly from sensors to improve energy efficiency. Backup sensors are placed at critical points to ensure fault tolerance if primary sensors fail.
2) A backup sensor placement algorithm is proposed to search for and place backup sensors at locations that are likely future failure points.
3) Simulations show the MC-WSN approach improves network lifetime and maintains data throughput independently of the mobile access point's physical speed. The fault tolerance mechanism is evaluated using real sensor data and is shown to
New Approach to Implement Authentication and Key Distribution on WI-Max Networksrahulmonikasharma
Wi-Max is utilized for the remote system. This innovation will be a developing innovation for remote innovation in future. It is like Wi-Fi however its territory of scope and transfer speed is considerably higher than the Wi-Fi. So the security turns out to be vital issue. Wi-Max innovation incorporates some security components, for example, Key administration, Authentication and privacy. For security first need is crosswise over remote system and other is to give get to control to the system and the get to control can be given utilizing access control conventions. Major issues are in WiMax difficult to handle the security problems. In this paper proposed implementing authentication and distribution of keys in secure manner on open networks and also providing confidentiality.
Application of Elliptical Curve Cryptography in Empowering Cloud Data Securityrahulmonikasharma
Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud.
Web Page Recommendation Using Domain Knowledge and Improved Frequent Sequenti...rahulmonikasharma
This document describes a proposed web page recommendation system that uses domain knowledge and an improved frequent sequential pattern mining algorithm. The system first analyzes web logs to discover frequent access patterns using algorithms like PLWAP-Mine or PREWAP. It then constructs a domain ontology to represent the knowledge domain and solve the "new page problem." A prediction model is also generated to create a weighted semantic network of frequently viewed terms. The recommendation engine then recommends web pages to users based on these analyses and models. The PREWAP algorithm is improved to recommend pages faster and with less memory than existing approaches. The results are expected to provide more relevant recommendations to users.
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
In wireless mobile ad hoc network, mainly, two approaches are followed to protect the security such as prevention-based approaches and detection-based approaches. A Mobile Ad hoc Network (MANET) is a collection of autonomous wireless mobile nodes forming temporary network to interchange data (data packets) without using any fixed topology or centralized administration. In this dynamic network, each node changes its geographical position and acts as a router for forwarding packets to the other node. Current MANETs are basically vulnerable to different types of attacks. The multimodal biometric technology gives possible resolves for continuous user authentication and vulnerability in high security mobile ad hoc networks (MANETs). Dempster’s rule for combination gives a numerical method for combining multiple pieces of data from unreliable observers. This paper studies biometric authentication and intrusion detection system with data fusion using Dempster–Shafer theory in such MANETs. Multimodal biometric technologies are arrayed to work with intrusion detection to improve the limitations of unimodal biometric technique.
Secure Fog Computing System using Emoticon Techniquerahulmonikasharma
Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data.
An automatic lawn mower is a device or robot that help human to cut grass automatically. It will allow the user to cut their grass with minimal effort. The proposed robotmove on the grass of the garden, within a defined area thereby completes the task automatically. The electrical power required to energies the proposed system is provided from the solar panel. Single-Ended Primary-Inductor Converter (SEPIC)with Maximum Power Point Tracking (MPPT) algorithm and Fuzzy logic controller (FLC) is used at output of solar panel to improve the overall efficiency. The movement or the path of the automatic lawn mower is based on a path planning technique. Sensors are used to provide feedback from obstacles. Every action of the lawn mower is monitored by the PIC microcontroller with the help of the sensor. Unlike other robotic lawn mowers on the market, this design requires no perimeter wires to maintain the robot within the lawn. Through sensor arrangement, the proposed lawn mower avoidsobstacles and humans. A hardware prototype is implemented and successfully tested in the lawn.
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensingrahulmonikasharma
This document summarizes a research paper on real-time vehicle classification and counting using low-cost collaborative sensing. It presents a three-stage model for vehicle classification that uses Gaussian transformation to extract vehicle image features, and an SVM model to identify the vehicle class and improve classification accuracy. It reviews related literature on vehicle detection and classification techniques. It then describes the system development, including binary classification, linear classifiers like perceptrons, target classification using boosting algorithms, and feature extraction methods like histograms of oriented gradients. The goal is to classify vehicles into categories like cars and bicycles in real-time using camera sensors and collaborative sensing.
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNrahulmonikasharma
The advancement in the wireless communications and electronics has led to the growth of low-cost sensor networks. Due to which the sensor networks is part of different application areas now. Low-cost, low-power and multifunctional small-sized sensor devices are the great end-products of wireless sensor network technologies. These sensor nodes together in a group form a sensing network. A sensor network can offer access to data anytime, anywhere by gathering, processing, evaluating and distributing data. The evolution of information sending in wireless sensor networks is boosting to devise newer and more advanced routing strategies. Many strategies have considered data collection and data dissemination. In this project, the data produced by the sensor nodes is aggregated and provide the further guaranteed data transmission to sink node/ base station using clustering mechanism and node concentration with SPIN protocol. The proposed scheme provides increased network lifetime, better data gathering and period of stability as compared to M-LEACH protocol.
Prediction of Default Customer in Banking Sector using Artificial Neural Networkrahulmonikasharma
The aim of this article is to present perdition and risk accuracy analysis of default customer in the banking sector. The neural network is a learning model inspired by biological neuron it is used to estimate and predict that can depend on a large number of inputs. The bank customer dataset from UCI repository, used for data analysis method to extract informative data set from a large volume of the dataset. This dataset is used in the neural network for training data and testing data. In a training of data, the data set is iterated till the desired output. This training data is cross check with test data. This paper focuses on predicting default customer by using deep learning neural network (DNN) algorithm.
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
Cloud computing owes to its potency, value effectiveness, flexibility and quantifiability for being a trend setting technology. In this paper, a cloud computing and education based theory has been studied and analyzed. This paper is based on the utilizations of cloud computing services in network security and its applications.
Enhanced Privacy Preserving Accesscontrol in Incremental Datausing Microaggre...rahulmonikasharma
In microdata releases, main task is to protect the privacy of data subjects. Microaggregation technique use to disclose the limitation at protecting the privacy of microdata. This technique is an alternative to generalization and suppression, which use to generate k-anonymous data sets. In this dataset, identity of each subject is hidden within a group of k subjects. Microaggregation perturbs the data and additional masking allows refining data utility in many ways, like increasing data granularity, to avoid discretization of numerical data, to reduce the impact of outliers. If the variability of the private data values in a group of k subjects is too small, k-anonymity does not provide protection against attribute disclosure. In this work Role based access control is assumed. The access control policies define selection predicates to roles. Then use the concept of imprecision bound for each permission to define a threshold on the amount of imprecision that can be tolerated. So the proposed approach reduces the imprecision for each selection predicate. Anonymization is carried out only for the static relational table in the existing papers. Privacy preserving access control mechanism is applied to the incremental data.
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA).
Safeguarding Data Privacy by Placing Multi-level Access Restrictionsrahulmonikasharma
People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since organizations increase their implementation of database systems as the key data management technology for regular operations and decision making, the security of data managed by these systems is an important task.
This document describes a proposed employee monitoring system using Android smartphones. The system would allow managers to track employee phone usage such as call logs, text messages, browser history, and location via GPS. It consists of an employee app on employee phones, an admin app for managers, and a centralized server to store phone usage data. When an employee leaves an approved area, an alert is sent to managers. The system aims to reduce unauthorized phone use and help calculate employee behavior using k-means clustering. It provides a more secure alternative to existing systems by using 3G networks instead of 2G or Bluetooth.
Authentic and Anonymous Data Sharing with Data Partitioning in Big Datarahulmonikasharma
A Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have proposed ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
Noise is one of the important issue which has to considered while designing any analog circuit . As far as operational amplifiers are concerned, it is very clear that so get maximum efficient output , the noise has to be eliminated . There are two various types of operational amplifiers which are deployed for various applications but for better results fully differential operational amplifier must be used as the noise produced by this configuration is lesser as compared to single ended . Not only this the offset voltage is also lesser in fully differential amplifiers. This paper gives an overview of opamp design with lesser noise and high SNR ratio with high gain.
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
More Related Content
Similar to Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wireless Network
Vehicular Ad-hoc Network, its Security and Issues: A Reviewrahulmonikasharma
Vehicular ad hoc network (VANET) is a vehicle to vehicle (VVC) and roadside to vehicle (RVC) communication system. The technology in VANET incorporates WLAN and Ad Hoc networks to achieve the regular connectivity. The ad hoc network is brought forth with the objectives of providing safety and comfort related services to vehicle owners. Collision warning, traffic congestion warning, lane-change warning, road blockade alarm (due to construction works etc.) are among the major safety related services addressed by VANET. In the other category of comfort related services, vehicle users are equipped with Internet and Multimedia connectivity. The major research challenges in the area lies in design of routing protocol, data sharing, security and privacy, network formation etc. We aim here to study the overview of VANET and its security issues.
A Framework for Improving the Performance of MANET by Controlling Data Traffi...rahulmonikasharma
A mobile ad-hoc network is a category of wireless network which does not depend on a predefined network structure or topology. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. Two mobile nodes can exchange data directly if they are in the defined range of each other. If not, nodes can communicate via a multi-hop route with the help of other mobile nodes. This paper proposed an approach to improve data transmission by reducing the data traffic and it also increase data availability in the mobile ad-hoc network. In the proposed approach, MANET is server client based network, means a mobile host acts as a server and fulfill the others node’s request. Each mobile node has a buffer for temporarily storing data fragment for a specific time, If a mobile node requests for a particular data fragment and the request is multi hoped, then first request is sent to its neighbor node, neighbor node first match requested data fragment with stored data, if it is matched the request will be responded by this neighbor otherwise request will be routed to mobile server. In this way the overhead of the server and server traffic will be reduced. The proposed method reduces time consumed by data fetching directly from server routing through multiple nodes and thus, it also enhances data availability.
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
Wireless Sensor Networks (WSNs) have been widely considered as one of the most important technologies for the twenty first century. Due to the advancements in microelectronic mechanical systems (MEMS) and wireless communication technologies, it has become possible to deploy tiny, cheap, and smart sensors in any physical area. The routing is one of the dominant factors which decide the fate of limited battery resources in WSNs. In this paper, a review on the state-of-the-art on PEGASIS (Power efficient Gathering in Sensor Information System) protocol has been presented. PEGASIS is highly significant in small areas applications, some of the variants of PEGASIS protocol has been studied in this paper. After studying various protocols, it has been found that Chain Based Cluster Cooperative Protocol (CBCCP) has tremendously improved network lifetime by incorporating cluster based concept in routing. Although it has outperformed various routing protocols but it still leave a great margin of improvement in the inter cluster communication. This paper basically focuses on reflecting the significance of chain based protocols in WSNs.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This document discusses a mobile coordinated wireless sensor network (MC-WSN) approach for structural health monitoring applications with fault tolerance. The key points are:
1) The MC-WSN uses mobile access points to coordinate the sensor network and collect data directly from sensors to improve energy efficiency. Backup sensors are placed at critical points to ensure fault tolerance if primary sensors fail.
2) A backup sensor placement algorithm is proposed to search for and place backup sensors at locations that are likely future failure points.
3) Simulations show the MC-WSN approach improves network lifetime and maintains data throughput independently of the mobile access point's physical speed. The fault tolerance mechanism is evaluated using real sensor data and is shown to
New Approach to Implement Authentication and Key Distribution on WI-Max Networksrahulmonikasharma
Wi-Max is utilized for the remote system. This innovation will be a developing innovation for remote innovation in future. It is like Wi-Fi however its territory of scope and transfer speed is considerably higher than the Wi-Fi. So the security turns out to be vital issue. Wi-Max innovation incorporates some security components, for example, Key administration, Authentication and privacy. For security first need is crosswise over remote system and other is to give get to control to the system and the get to control can be given utilizing access control conventions. Major issues are in WiMax difficult to handle the security problems. In this paper proposed implementing authentication and distribution of keys in secure manner on open networks and also providing confidentiality.
Application of Elliptical Curve Cryptography in Empowering Cloud Data Securityrahulmonikasharma
Cloud computing is one of the most preferable and used technologies in IT Industry in the present scenario. Providing security to cloud data in cloud environment has become popular feature in industry and academic research. Cloud Computing is a conceptual concept based on technology that is widely used by many companies these days. The Elliptical Curve Cryptography algorithm ensures the integrity and authentication of secure communications with non-repudiation of communication and data confidentiality. Elliptical Curve Cryptography is also known as a public key cryptography technique based on the elliptic curve theory that can be used to create a fast, small, more efficient and unpredictable cryptographic key. This paper provides authentication and confidentiality to cloud data using Elliptical Curve Cryptography. This paper attempts to evolve cloud security and cloud data security by creating digital signatures and encryption with elliptical curve cryptography. The proposed method is an attempt to provide security to encryption keys using access control list, wherein it lists all the authorized users to give access to the encryption keys stored in cloud.
Web Page Recommendation Using Domain Knowledge and Improved Frequent Sequenti...rahulmonikasharma
This document describes a proposed web page recommendation system that uses domain knowledge and an improved frequent sequential pattern mining algorithm. The system first analyzes web logs to discover frequent access patterns using algorithms like PLWAP-Mine or PREWAP. It then constructs a domain ontology to represent the knowledge domain and solve the "new page problem." A prediction model is also generated to create a weighted semantic network of frequently viewed terms. The recommendation engine then recommends web pages to users based on these analyses and models. The PREWAP algorithm is improved to recommend pages faster and with less memory than existing approaches. The results are expected to provide more relevant recommendations to users.
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
In wireless mobile ad hoc network, mainly, two approaches are followed to protect the security such as prevention-based approaches and detection-based approaches. A Mobile Ad hoc Network (MANET) is a collection of autonomous wireless mobile nodes forming temporary network to interchange data (data packets) without using any fixed topology or centralized administration. In this dynamic network, each node changes its geographical position and acts as a router for forwarding packets to the other node. Current MANETs are basically vulnerable to different types of attacks. The multimodal biometric technology gives possible resolves for continuous user authentication and vulnerability in high security mobile ad hoc networks (MANETs). Dempster’s rule for combination gives a numerical method for combining multiple pieces of data from unreliable observers. This paper studies biometric authentication and intrusion detection system with data fusion using Dempster–Shafer theory in such MANETs. Multimodal biometric technologies are arrayed to work with intrusion detection to improve the limitations of unimodal biometric technique.
Secure Fog Computing System using Emoticon Techniquerahulmonikasharma
Fog computing is a distributed computing infrastructure in whichsome application services are provided at the edge of the network in smart devices( IoT devices) and some applications are handled in cloud. Fog computing operates on network ends instead of working entirely from a centralized cloud. It facilitates the operation of storage, compute, analysis and other services between edge devices mostly IoT devices and cloud computing data centres. The main objective of Fog computing is to process the data close to the edge devices .The problem that occurs in Fog is confidentiality and security of data . To overcome this problem, we have proposed the Dual-Encryption to data using Emoticon Technique which is combination of Cryptography and Steganography. In this method, first data is encrypted and then encrypted data is hidden with the cover text like emoticons. So Dual-Encryption enhances data security and reliability. Even if the covered text is accessed by unauthorized person, only encrypted data of original data can be viewed not the actual data.
An automatic lawn mower is a device or robot that help human to cut grass automatically. It will allow the user to cut their grass with minimal effort. The proposed robotmove on the grass of the garden, within a defined area thereby completes the task automatically. The electrical power required to energies the proposed system is provided from the solar panel. Single-Ended Primary-Inductor Converter (SEPIC)with Maximum Power Point Tracking (MPPT) algorithm and Fuzzy logic controller (FLC) is used at output of solar panel to improve the overall efficiency. The movement or the path of the automatic lawn mower is based on a path planning technique. Sensors are used to provide feedback from obstacles. Every action of the lawn mower is monitored by the PIC microcontroller with the help of the sensor. Unlike other robotic lawn mowers on the market, this design requires no perimeter wires to maintain the robot within the lawn. Through sensor arrangement, the proposed lawn mower avoidsobstacles and humans. A hardware prototype is implemented and successfully tested in the lawn.
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensingrahulmonikasharma
This document summarizes a research paper on real-time vehicle classification and counting using low-cost collaborative sensing. It presents a three-stage model for vehicle classification that uses Gaussian transformation to extract vehicle image features, and an SVM model to identify the vehicle class and improve classification accuracy. It reviews related literature on vehicle detection and classification techniques. It then describes the system development, including binary classification, linear classifiers like perceptrons, target classification using boosting algorithms, and feature extraction methods like histograms of oriented gradients. The goal is to classify vehicles into categories like cars and bicycles in real-time using camera sensors and collaborative sensing.
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNrahulmonikasharma
The advancement in the wireless communications and electronics has led to the growth of low-cost sensor networks. Due to which the sensor networks is part of different application areas now. Low-cost, low-power and multifunctional small-sized sensor devices are the great end-products of wireless sensor network technologies. These sensor nodes together in a group form a sensing network. A sensor network can offer access to data anytime, anywhere by gathering, processing, evaluating and distributing data. The evolution of information sending in wireless sensor networks is boosting to devise newer and more advanced routing strategies. Many strategies have considered data collection and data dissemination. In this project, the data produced by the sensor nodes is aggregated and provide the further guaranteed data transmission to sink node/ base station using clustering mechanism and node concentration with SPIN protocol. The proposed scheme provides increased network lifetime, better data gathering and period of stability as compared to M-LEACH protocol.
Prediction of Default Customer in Banking Sector using Artificial Neural Networkrahulmonikasharma
The aim of this article is to present perdition and risk accuracy analysis of default customer in the banking sector. The neural network is a learning model inspired by biological neuron it is used to estimate and predict that can depend on a large number of inputs. The bank customer dataset from UCI repository, used for data analysis method to extract informative data set from a large volume of the dataset. This dataset is used in the neural network for training data and testing data. In a training of data, the data set is iterated till the desired output. This training data is cross check with test data. This paper focuses on predicting default customer by using deep learning neural network (DNN) algorithm.
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
Cloud computing owes to its potency, value effectiveness, flexibility and quantifiability for being a trend setting technology. In this paper, a cloud computing and education based theory has been studied and analyzed. This paper is based on the utilizations of cloud computing services in network security and its applications.
Enhanced Privacy Preserving Accesscontrol in Incremental Datausing Microaggre...rahulmonikasharma
In microdata releases, main task is to protect the privacy of data subjects. Microaggregation technique use to disclose the limitation at protecting the privacy of microdata. This technique is an alternative to generalization and suppression, which use to generate k-anonymous data sets. In this dataset, identity of each subject is hidden within a group of k subjects. Microaggregation perturbs the data and additional masking allows refining data utility in many ways, like increasing data granularity, to avoid discretization of numerical data, to reduce the impact of outliers. If the variability of the private data values in a group of k subjects is too small, k-anonymity does not provide protection against attribute disclosure. In this work Role based access control is assumed. The access control policies define selection predicates to roles. Then use the concept of imprecision bound for each permission to define a threshold on the amount of imprecision that can be tolerated. So the proposed approach reduces the imprecision for each selection predicate. Anonymization is carried out only for the static relational table in the existing papers. Privacy preserving access control mechanism is applied to the incremental data.
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA).
Safeguarding Data Privacy by Placing Multi-level Access Restrictionsrahulmonikasharma
People always tend to protect assets regardless of what they are. For example, a user may keep a memorable picture of his parents in a safe place. However, the degree of protection he provides is directly based on how much he values the assets. If the user highly value the picture of his great-grandparents, he might take an extra measure of precaution by copying it and placing it in a fireproof safe where it is guarded from most natural disasters and from theft, or he may just put it in a frame because he has many similar pictures or because he can reproduce it. Usage of Database management systems to store information in every aspect of an enterprise is rapidly growing. Every company need to protect all tangible assets like valuable information stored in a DBMS is often vital to the business interests of the organization and is regarded as a corporate asset of the company that must be protected. There is no doubt that a password is the key to opening a user account. The Stronger the password, the longer it takes a hacker to break in. User authentication depends on a password to ensure the user account’s identity. Since organizations increase their implementation of database systems as the key data management technology for regular operations and decision making, the security of data managed by these systems is an important task.
This document describes a proposed employee monitoring system using Android smartphones. The system would allow managers to track employee phone usage such as call logs, text messages, browser history, and location via GPS. It consists of an employee app on employee phones, an admin app for managers, and a centralized server to store phone usage data. When an employee leaves an approved area, an alert is sent to managers. The system aims to reduce unauthorized phone use and help calculate employee behavior using k-means clustering. It provides a more secure alternative to existing systems by using 3G networks instead of 2G or Bluetooth.
Authentic and Anonymous Data Sharing with Data Partitioning in Big Datarahulmonikasharma
A Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have proposed ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it.
Noise is one of the important issue which has to considered while designing any analog circuit . As far as operational amplifiers are concerned, it is very clear that so get maximum efficient output , the noise has to be eliminated . There are two various types of operational amplifiers which are deployed for various applications but for better results fully differential operational amplifier must be used as the noise produced by this configuration is lesser as compared to single ended . Not only this the offset voltage is also lesser in fully differential amplifiers. This paper gives an overview of opamp design with lesser noise and high SNR ratio with high gain.
Similar to Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wireless Network (20)
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
This document discusses techniques for processing queries over encrypted data in Internet of Things (IoT) systems. It describes CryptDB and MONOMI, which are database systems that can execute SQL queries over encrypted data. CryptDB uses a database proxy to encrypt/decrypt data and rewrite queries to execute on encrypted data. MONOMI builds on CryptDB and introduces a split client/server approach to query execution to improve efficiency of analytical queries over encrypted data. The document also outlines various encryption schemes that can be used for encrypted query processing, including deterministic encryption, order-preserving encryption, homomorphic encryption, and others.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
This document describes a system for determining the quality and grading tomatoes using image processing techniques on a Raspberry Pi. The system uses a USB camera to capture images of tomatoes and then performs preprocessing, masking, contour detection, image enhancement and color detection algorithms to analyze features like shape, size, color and texture. It can grade tomatoes into four categories: red, orange, green, and turning green. The system was able to accurately determine tomato quality and estimate expiry dates with 90% accuracy and had low computational time of 0.52 seconds compared to other machine learning methods.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
This document summarizes research on using Alamouti space-time block coding (STBC) for channel estimation in MIMO-OFDM wireless communication systems. The proposed system uses 16-PSK modulation with up to 4 transmit and 32 receive antennas. Simulation results show that the proposed approach reduces bit error rate and mean square error at higher signal-to-noise ratios, compared to existing MISO systems. Alamouti-STBC channel estimation improves performance for MIMO-OFDM by achieving full diversity gain from multiple transmit antennas.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
1) The document discusses using the ARIMA technique for short term load forecasting of electricity demand in West Bengal, India.
2) It analyzed historical hourly load data from 2017 to build an ARIMA model and forecast demand for July 31, 2017, achieving a Mean Absolute Percentage Error of 2.1778%.
3) ARIMA is identified as an appropriate univariate time series method for short term load forecasting that provides more accurate results than other techniques.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wireless Network
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 134 – 138
_______________________________________________________________________________________________
134
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC
Wireless Network
Mr. Umesh Samarth
ME in Wireless Communication and Computing
JDCOEM, Nagpur
RTMNU, Nagpur, India
kamble.rucha3@gmail.com
Prof. S. V. Sonekar
ME in Wireless Communication and Computing
JDCOEM, Nagpur
RTMNU, Nagpur, India
srikantsonekar@rediffmail.com
Abstract—A mobile ad-hoc network (MANET) is a self-arranged network that consists of mobile routers connected by wireless channels.
Anonymity communication is a great challenge in MANET. Though there are many anonymity enhancing techniques that have been introduced.
These techniques are based on packet encryption to secure the communication anonymity. Still MANET is vulnerable to passive statistical traffic
analysis attacks. There are two features of communication anonymity: end-to-end anonymity and source or destination anonymity.
This proposed system is designed to discover the communication pattern without decoding the captured packets. First phase of the
proposed system is to search the required node. The search is performed by using a heuristic approach. Second phase is to perform statistical
traffic analysis. The purpose of this phase is to discover the data transmission of the searched node to its adjoining nodes. After implementing
the statistical traffic analysis whether the searched node plays the role of source or destination is estimated. With the help of this estimation the
traffic pattern is discovered.
The utility of this proposed system is basically in military environment. In order to track the adversaries attack this system is utilized.
The adversaries are not able to know that they have been tracked. This proposed system works passively and perform traffic analysis based on
statistical characteristic of captured raw packets.
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Mobile Ad-hoc Network (MANET) is one of random
network whose nodes are self-constructed, self-established,
infrastructure less and connected by wireless links. The basic
structure of MANET is illustrated in Fig. 1. In mobile ad-hoc
network (MANET) nodes are mobile in nature. This makes the
topology dynamic. The wireless medium used has limited
resource and also lack of centralized administration. Due to
above characteristics, anonymous communication becomes a
challenge in MANET. There are two aspects of
communication anonymity: End-to-End Anonymity and
Source or Destination Anonymity. Source or Destination
Anonymity: There is difficulty in identification of source and
destination nodes in the network. End-to-End Anonymity:
There is difficulty in identification of end-to-end
communication relation. Many anonymous routing protocols
such as Anonymous On-Demand Routing (ANODR) and On-
demand Lightweight Anonymous Routing (OLAR) have been
proposed for anonymity of nodes in network. Still adversary
can intercept the information through passive attack.
Fig.1 Basic structure of Mobile Ad-hoc Network
MANET can be attacked in two ways: Active and
Passive. An active attack seeks to change system resource or
affect their operation. While a passive attack try to gain or
arrange data from the system but does not disturb system
resources. Passive attack is more harmful than active attack as
the user is unaware of collecting information performed by an
adversary without disturbing the operation. However, MANET
is vulnerable to traffic analysis that is one of the types of
passive attack. Traffic Analysis is the process of monitoring
and analyzing the activities of traffic patterns during delivery
of packets in MANET. Traffic analysis can be useful to carry
out an investigation on their adversary in a military operation.
The nodes that are within the transmission range can
communicate directly, while communication between more
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 134 – 138
_______________________________________________________________________________________________
135
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
than two nodes can take place through intermediate nodes. As
centralized administration is absent in MANET, each node
maintain their own routing and resource management in
distributed manner. This makes MANET vulnerable to traffic
analysis.
Problem Definition
The predecessor attack and disclosure attack are types
of traffic analysis. In traffic analysis information is neither
leaked nor modified it is analyzed and monitored. The enemy
could determine the identity and location of communication
hosts and could observe length and frequency of messages
being exchanged. This report might be useful in assuming the
nature of the communication. However, predecessor and
disclosure attacks cannot analyze MANET traffic due to the
following reasons:
1) Broadcasting nature: In wired networks, mostly point-to-
point message transmission takes place. In such cases there is
only one possible receiver. While in wireless network the
messages are broadcasted. So they can have multiple possible
receivers. This results in uncertainty to trace a particular path.
2) Ad hoc nature: One of the characteristic of MANET is
infrastructure less. Due to this nature the mobile node can
deliver as both a router and a host. Thus it is difficult to
determine the role of mobile node to be a source, destination,
or just a relay.
3) Mobile nature: The existing traffic analysis models do not
consider the mobility of communication peers. This makes
communication relations among mobile nodes more complex.
1.5 Objectives
In order to accomplish the aim of reducing
anonymous communication and to disclose the hidden traffic
pattern in mobile ad hoc network (MANET) the objectives of
Traffic Pattern Discovery System (TPDS) are mentioned
below:
1) To discover the traffic pattern in MANET.
The traffic pattern in MANET can be discovered by
first searching the required node using a heuristic approach.
Statistical traffic analysis is carried out to analyze the
transmission of data. Probability distribution deduces the
possibility of nodes being source and destination.
2) To identify point to point transmission among receivers.
Point-to-Point transmission can be analyzed by
calculating the number of data received by the receivers.
Traffic matrix is calculated to find out transmission among
receivers.
II. PROPOSED SYSTEM
The flow of the proposed system is illustrated in Fig. 4. The
first step of the system is to form a network. This network
consists of nodes that are scanned to find a traffic free path. In
order to search the node a heuristic searching algorithm is
applied. Statistical traffic analysis is performed on the required
node. Probability distribution is applied to discover the traffic
pattern. This system works on one condition that if the
required node is not found then the system stops and no further
process is carried out.
Constraints
Traffic Pattern Discovery System (TPDS) consists of
some of the constraints that are discussed below:
Best-First Search is used to traverse the traffic pattern
can detect the path until nodes can be scanned. If no
nodes are free then path is not found. Hence, the
algorithm stops working.
The searching of path is restricted to specified range
only. The searching cannot be performed away from
that specified range.
Fig. 2 System flow diagram
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 134 – 138
_______________________________________________________________________________________________
136
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. DESIGN AND IMPLEMENTATION
Outcomes
The research has been carried out with three different total
numbers of nodes. They are 25, 45 and 65. However, here only
outcomes of total numbers of nodes that are 45 nodes have
been included. The following outcomes are obtained during
each phase:
Topology Formation and Setup Phase
Fig.3 Topology formation for 1-hop neighbors
The topology formations among nodes for the nodes which
are 1-hop distance away are displayed in Fig. 3. In this phase,
hello packets are sending to all its neighbor nodes those are 1-
hop distance away from sender node. The black coloured node
indicates that the node is in state to start topology formation
for 1-hop nodes. The omni-directional antennas are sending
signals to neighbor nodes. One of the nodes becomes sender
node and starts sending hello packets to nodes that are 1-hop
distance away. The neighbor nodes become receiver and starts
receiving hello packets. The pink coloured node indicates that
the node has completed topology formation for 1-hop neighbor
Fig.4 Topology formation for 2-hop neighbors
The topology formation for 2-hop neighbor is illustrated in
Fig. 7. The pink coloured nodes indicate the node is in the
state to start sending hello packets to its 2-hop neighbors.
Node number 30 is performing topology formation for 2-hop
neighbors. This node first send signal to nodes that are 2-hop
distance away. After confirming the range the node number 30
acts as source and starts sending hello packets. Nodes that are
2-hop distance away acts as receivers. The violet coloured
nodes indicate that node had already completed 2-hop
topology formation
Data Routing
Fig.5 Discovery of source and destination nodes
The snapshot of last phase of the proposed system is displayed
in Fig.11. After performing statistical traffic analysis and
probability distribution, the node having the highest
probability of being a sender and receiver is traced in the last
phase. The outcome displays the source and destination node
of the detected traffic pattern. These nodes are marked with
red colour and labeled with green colour. The node number 12
is marked as source node, since it is having the highest
probability of being sender. Similarly node number 23 is
marked as destination node, as it is having the highest
probability of being receiver
IV. RESULTS
Result Analysis
With the completion of simulation of the proposed
system it is necessary to perform analysis of the system. This
gives an assurance of the correct implementation of the
proposed ideas. This analysis can be displayed through
graphical analysis. The following are the outcomes of the
analysis performed after simulation.
Fig.6 Source node probability analysis
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 134 – 138
_______________________________________________________________________________________________
137
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The analysis of source node probability is displayed in Fig.
12. The simulation is performed on three different total
numbers of nodes. They are 25, 45 and 65. This graph shows
the overall probability of being source node for each node in
the network. The X-axis represents “Nodes”, while Y-axis
represents “Probability”. The red colour line is used for 25
nodes, green for 45 nodes and blue for 65 nodes. For 25 nodes,
the highest probability value as 2 is present between node
numbers 10 to 15. For 45 nodes, the highest probability value
as 6 is present between node numbers 10 to 30. While, for 65
nodes the highest probability value as 8 is present between
node numbers 20 to 40
Fig.7 Destination node probability analysis
The analysis of destination node probability is
displayed in Fig. 13. The simulation is performed on three
different total numbers of nodes. They are 25, 45 and 65. This
graph shows the overall probability of being destination node
for each node in the network. The X-axis represents “Nodes”,
while Y-axis represents “Probability”. The red colour line is
used for 25 nodes, green for 45 nodes and blue for 65 nodes.
For 25 nodes, the highest probability value as 4 is present
between node numbers 10 to 20. For 45 nodes, the highest
probability value as 4 is present between node numbers 25 to
35. While, for 65 nodes the highest probability value as 7.5 is
present between node numbers 35 to 45.
Fig.14 Success rate for probability distribution
The success rate for probability distribution is
illustrated in Fig. 14. Success rate is calculated to find out the
correctness of working of the proposed system. Success rate
can be defined as percentage of success among a number of
attempts. Here, graphical analysis is displayed for different
number of nodes. The graphical analysis shows that how
successfully simulation is carried out for three different
numbers of nodes i.e. 25, 45 and 65. The X-axis represents
“Different total number of nodes”. While Y-axis represents
“Success rate”. The red line is used for 25 nodes, green for 45
nodes and blue for 65 nodes. From the graph it can be
concluded that 45 nodes have the most successful success rate
followed by 25 nodes and 65 nodes. The overall success rate
obtained from this graph is 93.67%. In the graph some lines
are in downfall position. This downfall can be seen in the
simulation carried with total number of nodes as 65.
The reason for this downfall is due to increase in
number of nodes. As the number of nodes in the network
increases the system has to analyze more number of nodes.
This result in increment in the number of packets transferred
in the network. With increment in the number of nodes, there
is increase in performing analysis. This definitely increase the
time required to perform the traffic analysis. The success rate
is inversely proportional to number of nodes. With increase in
number of nodes the success rate falls down.
For example, consider a network having 10 nodes, all
nodes are communicating with each other. So the number of
packets transferred can be considered as 100 at any given
point of time. The success rate can be considered as a
probability value which cannot be more than 1. So the success
rate for these 10 nodes will be 1/10=0.1. Now increase the
number of nodes to 20, the packets will get increased to 200
and success rate will fall to 1/20=0.05.
From above example it is proved that success rate
decreases with increase in number of nodes. The formula for
success rate used in this proposed system is:
Success rate =
Sucsess
No. of attempts
Where “Success” refers to the success of getting same
node number multiple times as source or destination and “No.
of attempts” refers to the number of times the simulation has
been executed.
V. CONCLUSION AND FUTURE SCOPE
The main purpose of the proposed system is to disclose the
identity of source and destination nodes in the network. This
can be fulfilled by discovery of communication pattern. The
communication pattern is discovered without decrypting the
packets. This has been satisfied by using best-first search (a
heuristic approach) for traversing the path, statistical traffic
analysis for analyzing and to identify point-to-point
transmission among receivers. This is followed by calculating
probability distribution to find out approximate source and
destination nodes in the traced path. This reduces anonymous
communication which is one of the characteristics in mobile
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 9 134 – 138
_______________________________________________________________________________________________
138
IJRITCC | September 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ad-hoc network (MANET).The overall success rate obtained
from the graph of success rate for probability distribution is
93.67%, while overall success rate obtained from the graph of
success rate for different traffic pattern is 78.33%.
Best-First Search is one of the heuristic search
algorithms that have been utilized in this proposed system.
However, this best-first search has a drawback. Best-First
Search algorithm terminates when no optimal path is found.
This drawback can create an obstacle to find out the
communication path of the adversary. Thus, in future instead
of best-first search A* or AO* can be used as a heuristic
search approach.
REFERENCES
[1] Yang Qin, Dijiang Huang and Bing Li, “STARS: A Statistical
Traffic Pattern Discovery System for MANETs” IEEE
Transactions on Dependable and Secure Computing, Vol. 11,
No. 2, March/April 2014.
[2] Lei Liu, Xiaolong Jin, Geyong Min, and Li Xu, “Real-Time
Diagnosis of Network Anomaly based on Statistical Traffic
Analysis”, IEEE 11th International Conference on Trust,
Security and Privacy in Computing and Communications,
2012.
[3] Y. Liu, R. Zhang, J. Shi, and Y. Zhang, “Traffic Inference in
Anonymous MANETs,” Proc. IEEE Seventh Ann. Comm.
Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks,
pp. 1-9, 2010.
[4] Benjie Lu and Zhingqing Liu,”Prolog with Best First Search”,
IEEE 25th
Chinese Control and Descision Conference, 2013.
[5] Douglas Kelly, Richard Raines, Rusty Baldwin, Michael
Grimaila, and Barry Mullins, “Exploring Extant and
Emerging Issues in Anonymous Networks: A Taxonomy and
Survey of Protocols and Metrics”, IEEE Communications
Surveys & Tutorials, Vol. 14, No. 2, Second Quarter 2012.
[6] Tehrani, A.H. and Shahnasser, H.,” Anonymous
communication in MANET's, solutions and challenges,” IEEE
International Conference on Wireless Information Technology
and Systems (ICWITS), pp. 1-4, 2010.
[7] Y. Qin and D. Huang, “OLAR: On-Demand Lightweight
Anonymous Routing in MANETs,” Proc.Fourth Int’l Conf.
Mobile Computing and Ubiquitous Networking, pp. 72-79,
2008.
[8] J. Kong, X. Hong, and M. Gerla, “An Identity-Free and On-
Demand Routing Scheme against Anonymity Threats in
Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing,
vol. 6, no. 8, pp.888-902, Aug. 2007.