As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
These are the slides used at the CIE-IEEE 2017 Tech Symposium at University of Texas at Dallas. Ed Hightower presente brief history of IoT, who are key players in the Low Power WAN space and how all this could enable Smart Cities and Smart Health.
IOT Based Smart Home System TechnologiesIJERDJOURNAL
ABSTRACT:- The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. It results improved efficiency, accuracy and economic benefit in addition to reduced human intervention. On the other hand, IoT systems could also be responsible for performing actions, not just sensing the things. Intelligent Shopping systems, for example could monitor specific users purchasing habits in a store by tracking their specific mobile phones. Other applications that the Internet of Things can provide enabling extended home security features and home automation. This paper relates smart home or home automation which induce technology for home atmosphere which is usage to provide ease and protection to its occupants.
Today’s connected enterprise relies on mobility for everything from guest services to tracking user behavior. As trends in IoT grow, the requirements of your network morph to a mobile-first environment where availability, security and quality are key to delivering reliable services with appropriate security from today’s threats.
(Source: RSA Conference USA 2017)
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
These are the slides used at the CIE-IEEE 2017 Tech Symposium at University of Texas at Dallas. Ed Hightower presente brief history of IoT, who are key players in the Low Power WAN space and how all this could enable Smart Cities and Smart Health.
IOT Based Smart Home System TechnologiesIJERDJOURNAL
ABSTRACT:- The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. It results improved efficiency, accuracy and economic benefit in addition to reduced human intervention. On the other hand, IoT systems could also be responsible for performing actions, not just sensing the things. Intelligent Shopping systems, for example could monitor specific users purchasing habits in a store by tracking their specific mobile phones. Other applications that the Internet of Things can provide enabling extended home security features and home automation. This paper relates smart home or home automation which induce technology for home atmosphere which is usage to provide ease and protection to its occupants.
Today’s connected enterprise relies on mobility for everything from guest services to tracking user behavior. As trends in IoT grow, the requirements of your network morph to a mobile-first environment where availability, security and quality are key to delivering reliable services with appropriate security from today’s threats.
(Source: RSA Conference USA 2017)
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Industrial Internet of things has continued to create the buzz, one can’t deny that it is the one of the fastest emerging technology with humpty amount of Data getting captured daily and with every industry demanding optimisation, analytics, automations and valuable insights Industrial Internet of things is something which the need of the day.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
IoT is a new technology that was born a few years ago that based on the internet network which connects all IoT network terminals together to transfer data over the network between terminals (devices) abd take an action according to these data.
5G is a set of emerging global telecommunications standards, generally using high-frequency spectrum, to offer network connectivity with reduced latency and greater speed and capacity relative to its predecessors, most recently 4G LTE (Long-Term Evolution).
Importantly, 5G describes a collection of standards and technologies used to build tomorrow’s cutting-edge network infrastructure. In fact, many of the standards that will be officially considered 5G are still being decided on by working groups like the 3GPP, a collaborative body made up of various telecommunications associations.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationMark Goldstein
Mark Goldstein, President of International Research Center (http://www.researchedge.com/) presented on the next Internet wave, how the Internet of Things (IoT), will connect tens of billions of new sensors and devices in the coming years driving sustainability while transforming home, business, government, industrial, medical, transportation, and other complex ecosystems. The presentation examined how IoT will be implemented and monetized across a various application spaces, creating new business models from pervasive sensor deployments and data gathering, accompanied by new privacy and security risks. Explore IoT’s evolving wireless protocols, their pro and cons, and deployment prospects including the impact of 5G, as well as roadblocks and operational challenges, emerging standards and protocols, gateways and ecosystem integration, big data strategies, and analytic opportunities.
Although all of this may come soon, we still need to understand the myriad behind-the-scenes technology that makes dreams a reality. Without them, dreams will never be realized.
Is Your Network Ready for the Age of IoT?GENIANS, INC.
IoT and other network-connected devices are flooding our networks, calling for a new approach to network security-with intelligence at the edge of the network and a laser-sharp focus on managing devices without compromising business goals. Not surprisingly, it's the top issue for anyone who manages networks and IT assets. Is it top of mind for you? Find out what you should be thinking about today.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Industrial Internet of things has continued to create the buzz, one can’t deny that it is the one of the fastest emerging technology with humpty amount of Data getting captured daily and with every industry demanding optimisation, analytics, automations and valuable insights Industrial Internet of things is something which the need of the day.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
IoT is a new technology that was born a few years ago that based on the internet network which connects all IoT network terminals together to transfer data over the network between terminals (devices) abd take an action according to these data.
5G is a set of emerging global telecommunications standards, generally using high-frequency spectrum, to offer network connectivity with reduced latency and greater speed and capacity relative to its predecessors, most recently 4G LTE (Long-Term Evolution).
Importantly, 5G describes a collection of standards and technologies used to build tomorrow’s cutting-edge network infrastructure. In fact, many of the standards that will be officially considered 5G are still being decided on by working groups like the 3GPP, a collaborative body made up of various telecommunications associations.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationMark Goldstein
Mark Goldstein, President of International Research Center (http://www.researchedge.com/) presented on the next Internet wave, how the Internet of Things (IoT), will connect tens of billions of new sensors and devices in the coming years driving sustainability while transforming home, business, government, industrial, medical, transportation, and other complex ecosystems. The presentation examined how IoT will be implemented and monetized across a various application spaces, creating new business models from pervasive sensor deployments and data gathering, accompanied by new privacy and security risks. Explore IoT’s evolving wireless protocols, their pro and cons, and deployment prospects including the impact of 5G, as well as roadblocks and operational challenges, emerging standards and protocols, gateways and ecosystem integration, big data strategies, and analytic opportunities.
Although all of this may come soon, we still need to understand the myriad behind-the-scenes technology that makes dreams a reality. Without them, dreams will never be realized.
Is Your Network Ready for the Age of IoT?GENIANS, INC.
IoT and other network-connected devices are flooding our networks, calling for a new approach to network security-with intelligence at the edge of the network and a laser-sharp focus on managing devices without compromising business goals. Not surprisingly, it's the top issue for anyone who manages networks and IT assets. Is it top of mind for you? Find out what you should be thinking about today.
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...IJECEIAES
Man and Machine in terms of heterogeneous devices and sensors collaborate giving birth to the Internet of Things, Internet of future. Within a short span of time 30billions intelligent devices in form of smart applications will get connected making it difficult to test and debug in terms of time and cost. Simulators play vital role in verifying application and providing security before actually deploying it in real environment. Due to constraint environment in terms of memory, computation, and energy this review paper under a single umbrella will throw insight on comprehensive and in-depth analysis keeping in mind various barriers, critical design characteristics along with the comparison of candidate simulator and packet sniffing tool. Post simulated analysis play vital role in deciding behavior of data and helping research community to satisfy quality of service parameters. This review makes it feasible to make an appropriate choice for simulators and network analyzer tool easy fulfilling needs and making IoT a reality.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
Study and simulation of the systems modern IoT with examples of connected objects such as: GPS(GLOBAL POSITIONING SYSTEM), Philips Hue, Thermometer, and connected cars implemented with the technology nodeJS and Node-Red with the communication protocol of M2M ( MQTT).
As well as an analytical study based on Elasticsearch, MongoDB, Apache Hadoop, Apache Hive and Jaspersoft.
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
Digital technologies empower the
transformation into data-driven, intelligent, agile, and
autonomous farm operations and are typically considered a
key to addressing the grand challenges in agriculture. To avoid
unscientific water supply for plantation as well as to save the
water and also yield the better crop, therefore, to increase
production efficiency out of smart irrigation and to send the
status of irrigation at standard environmental conditions, The
Internet of Things (IoT) based prototype is designed and
implemented. The prototype automatically turns ON /OFF the
motor pump based on the moisture level of the soil by taking
the temperature and humidity of the environment near the
plantation into consideration (In India, the standard
parameters for watering the vegetable plantation are
Humidity>60%, Temperature < 25°C and Humidity<40% ).
The prototype is designed with an ESP32S microcontroller
with DHT 11 and a moisture sensor. Arduino IDE development
tool is used for programming ESP32S using embedded C
programming language. The prototype is configured,
programmed, and connected to the Arduino IoT cloud. The
data of temperature, humidity, and moisture are received via
message queuing telemetry transport (MQTT) protocol on IoT
cloud through public IP therefore the data can be accessed
worldwide. The authorized person can access the data and
control the motor pump from anywhere across the world. The
test data obtained out of the prototype over the cloud and at
the system are presented in the result section.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
Checkout well known company for BlockChain, Devops, IoT and other cutting edge technologies Product, Consulting & Training in India. Pingala Software India Pvt Ltd is one of the leading company that deals in IoT application development, Blockchain development, Devops, etc. technologies.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
1. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2622
Monitoring in IOT enabled devices
Udit Gupta
Information Networking Institute, Carnegie Mellon University, Pittsburgh-Pennsylvania, USA
Email: uditg@andrew.cmu.edu
---------------------------------------------------------------ABSTRACT------------------------------------------------------------------
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes
in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices
will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex
for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be
more complex given the scale at which devices will be added to the network and hence monitoring is bound to
become an uphill task due to management of larger range of addresses. This paper will throw light on what kind
of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
Keywords – Big Brother (BB), Internet of things (IOT), Monitoring, Simple Network Management Protocol (SNMP),
Zenoss
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: June 14, 2015 Date of Acceptance: July 21, 2015
-------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Monitoring [3, 4, 5 and 6] of systems has always been of
prime importance for organizations since the advent of
internet in 1960’s. The abrupt increase in the number of
devices ensured that manually monitoring every device
connected to the network would become infeasible. As
internet expanded to more number of devices which
includes wireless devices, more robust monitoring systems
were designed which were simple to use yet powerful
enough to detect failures. As the wave of virtualization
swept the technology world in early 2000’s, monitoring
systems had to be evolved in order to monitor virtual
machines. As cloud computing [19 and 20] came into
existence over the past decade, monitoring systems had to
be customized according to cloud technology. As world is
looking towards IOTs, it becomes paramount to design
monitoring systems which will be compatible with
different kinds of devices and at the same time detect
intrusions and failures efficiently.
The term ‘Internet of things’ or IOTs [7, 8 and 9] refers to
the networking amongst everyday objects or with a
centralized system. More colloquially, it is the process of
how various ‘things’ which are connected to the internet
interact with each other. Ever since the idea of first
internet based coke machine was conceived at Carnegie
Mellon University in 1982, the idea about extending
internet to entities turned into a reality. This can be
observed in the form of RFID [10, 11 and 12] technology
which provides a unique identity to objects. Apart from
this, iPad controlled lights has gained significant
importance in organizations and homes. To add to this list,
there has been a gradual progress in the research on smart
cars and smart homes [13]. Furthermore, in order to make
IOT a reality a lot of research has been going on in domain
of security issues [1] pertaining to IOT and operating
systems [2] which will be compatible with IOT. It’s
important to have monitoring systems in place which
would ensure that these devices are monitored periodically
and intimates user accordingly.
There are three primary reasons for designing monitoring
systems: intrusion detections [14, 15, 21, 24, 25 and 26],
notifications about critical parameters reaching threshold
and alerts pertaining to failure of the corresponding
machine. Therefore, it’s important that whatever
monitoring systems are deployed onto the architecture
they must analyze all three parameters named above and
must notify user accordingly. Moreover, if the monitoring
system can identify whether encrypted [22, 23 and 24]
connection exists between two nodes then it’ll be of added
advantage to the network as a whole. In this paper, we will
discuss two monitoring agents (Big Brother and Zenoss)
and how they can be utilized in monitoring IOTs.
2. MONITORING SYSTEMS FOR IOTS
Over the past decade, a number of monitoring systems
were designed for effective network administration.
Monitoring data will be present in almost all the nodes in
the network but an efficient system will be able to collect
all this data and present it to administrator in a
comprehensive manner. Some of the monitoring systems
which could meet this criterion are: Nagios, Big Brother,
Ntop, Zenoss and Multi Router Traffic Grapher (MRTG).
Big Brother, Zenoss and Nagios are mostly used as part of
enterprise level monitoring solution since they could
monitor all aspects of the network. On the other hand, the
functionality of Ntop and MRTG are somewhat limited
since they were primarily designed to monitor IP traffic.
Our prime focus henceforth will be on Big Brother and
Zenoss and how they could be deployed in IOTs.
2.1 USING BIG BROTHER (BB) IN IOT
Big Brother (also called BB) is the first monitoring system
to use web as its user interface. This allowed non-technical
users to see the holistic picture and gain an understanding
of network in a simplified manner. BB uses a client-server
model where client will send status information to
monitoring server after certain time intervals. BB can be
effective tool to monitor IOTs. Consider the example of
smart home. Consider an example of smart home which
will have smart refrigerator, smart washing machine and
2. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2623
smart AC. Let's consider the definitions of each entity
described. Smart refrigerator will adjust its temperature
automatically based on the weather so that electricity
consumption can be optimized. Smart washing machine
will automatically set its washing mode based on the cloth
material and finally smart AC will again be able to adjust
its temperature according to climate outdoors. Each of
these smart devices will operate on sensors or actuators or
both. Hence it is important to maintain a server and a UI,
which will present required information to user on his/her
mobile/tablet. Also a tabular form can be maintained as
shown in table 1 where for sensors/actuators ‘working’
condition is highlighted in green while ‘not working’
condition is highlighted in red. For memory/cpu-utilization
three colors are used to indicate the value above or below
threshold. This table is just an excerpt of a larger table
which will have many more smart things and
corresponding parameters to be analyzed.
2.2 USING ZENOSS IN IOT
Zenoss is an open source platform based on SNMP [16
and 17] protocol and it monitors networks, servers,
applications and services. The biggest advantage of this
monitoring system is that it is an open architecture and
hence users can customize it according to their own needs.
As a result, it is widely used in enterprise solutions. The
functionality of this monitoring system can be extended to
IOTs as well. Given that SNMP is the underlying protocol,
the notification mechanism can be either polling or traps.
Polling would be a better option for most IOT based
devices since metrics can be stored and as a result
historical analysis can be performed. Also configuring
notifications and alarms based on active polling is much
easier as compared to traps. Consider again the example of
smart home described previously: network server can
easily identify via polling the status of smart things.
Metrics will be presented to user in the form of UI and it
will also include data in graphical form.
3. COMPARISON BETWEEN ZENOSS & BB IN IOT
Both BB and Zenoss have been extensively used by
enterprises in the past. Given their wide range of
functionality and ease of deployment they still continue to
be a part of most organizations monitoring framework. As
a result of their ability to provide comprehensive overview
of the network, both can be deployed for monitoring IOT
enabled devices. Both can work in heterogeneous
environment where apart from virtual or physical
machines other network devices like routers, switches can
also be monitored.
But after due consideration of the features being offered
by these two monitoring agents, Zenoss is found to be
slightly better than BB due to multiple reasons. Zenoss is
found to support IPv6 protocol which is bound to gain
paramount importance in case of IOTs due to range of IP
addresses being offered by it. As mentioned previously,
there will be an exponential increase in the number of IOT
enabled devices in the near future and as a result
identifying each device uniquely will be of prime
importance. Therefore, it’s essential to have a protocol in
place which will ensure that numbers of unique tags are
not depleted while identifying IOT devices. IPv6 serves
this purpose quite well. With Zenoss being compatible
with IPv6, its execution in IOT will be less complex.
Secondly, in Zenoss there is provision for both: polling as
well as trap, both of which will be significant as far as IOT
is concerned. Let us consider an example: if a smart car is
being monitored then it is important to gain a periodic
update as to whether it is working properly or not. Thus,
implementing polling becomes inevitable. On the other
hand if something needs to be communicated on an urgent
basis like calling a fire brigade by a smart device then
implementing trap is the only feasible option. With SNMP
offering both these features and given that Zenoss is based
on SNMP, it can safely be assumed to be ideal for IOT.
Finally, it'll easier to manage IOT devices using Zenoss
due to the fact that an MIB [18] file can be created for
each managed object. MIB (management information
base) file is a formal description of a set of network
objects that can be managed using the SNMP. A sample
MIB file for smart home described above has been
mentioned below:
SMART_HOME-MIB DEFINITIONS: = BEGIN
IMPORTS
enterprises
FROM RFC1155-SMI
OBJECT-TYPE
FROM RFC-1212
DisplayString
FROM RFC-1213;
smartAC OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart AC"
smartRefrigerator OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart refrigerator"
smartWashingMachine OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart washing machine"
3. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2624
Table 1
T
a
b
l
e
1
4. CONCLUSION
While Internet of things (IOT) is yet to mark its arrival in
a substantial way in technology world, it becomes
paramount to address monitoring perspective beforehand.
Some of them were highlighted in this paper and a brief
attempt was to enable the reader to understand the context
in which two of the existing monitoring solutions can be
deployed for IOT enabled devices. Although only two
monitoring systems were presented in this paper which
could be deployed in IOT, there is no denial that other
monitoring systems in the market can also be implemented
as part of IOT enabled devices. But there is no denying the
fact that Big Brother and Zenoss can monitor wide range
of applications which includes processes, events and even
logs. A comparison was presented between these two
monitoring systems and then an inference was drawn
based on certain observations about which would be better
in case of IOT.
ACKNOWLEDGEMENTS
The author is extremely grateful to Dr. Sugata Sanyal for
his invaluable suggestions which led to the improvement
of this paper.
REFERENCES
[1] Tuhin Borgohain, Amardeep Borgohain, Uday
Kumar, Sugata Sanyal, “Authentication Systems in
Internet of Things”, arXiv preprint
arXiv:1502.00870, 2015/2/3
[2] Tuhin Borgohain, Uday Kumar, Sugata Sanyal,
“Survey of Operating Systems for the IoT
Environment”, arXiv preprint arXiv:1504.02517,
2015/4/13
[3] Andreas Hanemann, Jeff W. Boote, Eric L. Boyd,
Jérôme Durand, Loukik Kudarimoti, Roman Łapacz,
D. Martin Swany, Szymon Trocha, Jason Zurawski,
“PerfSONAR: A Service Oriented Architecture for
Multi-domain Network Monitoring”, pp 241-254,
DOI 10.1007/11596141_19, Volume 3826, 2005
[4] Chuck Cranor, Yuan Gao, Theodore Johnson,
Vlaidslav Shkapenyuk, Oliver Spatscheck,
“Gigascope: high performance network monitoring
with an SQL interface”, pages 623, DOI
10.1145/564691.564777, ACM, 2002-06-03
[5] Ferdinand Engel, Kendall S. Jones, Kary Robertson,
David M. Thompson, Gerard White, "Network
Monitoring", US Patent US6115393 A, Sep 5, 2000
[6] Marcus J Ranum,Kent Landfield, Mike Stolarchuk,
Mark Sienkiewicz, Andrew Lambeth, Eric Wall,
"Implementing a generalized tool for network
monitoring", Information Security Technical Report,
Elsevier, 1998
[7] Feng Xia, Laurence T.Yang, Lizhe Wang and
Alexey Vinel, “Internet of Things”,
INTERNATIONAL JOURNAL OF
COMMUNICATION SYSTEMS, Volume 25, Issue
9, pages 1101-1102, September 2012
[8] Kevin Ashton, “That ‘Internet of Things’ Thing”,
RFID journal, June 2009,
http://www.rfidjournal.com/articles/view?4986
[9] Kortuem G, Kawsar F Fitton D, Sundramoorthy V,
“Smart objects as building blocks for internet of
things”, Internet Computing IEEE, Volume 14, Issue
1, Pages 44-51, Feb 2010
[10] A Juels, "RFID security and privacy: A research
survey", Selected Areas in Communications, IEEE
Journal on Volume: 24, Issue: 2, Pages 381 – 394,
Feb 2006
[11] R Want, "An introduction to RFID technology",
Pervasive Computing, IEEE Volume:5, Issue: 1,
Pages 25-33, Jan-March 2006
[12] Battle L, Cole G, Gould K, Rector K, Raymer S,
Balazinska M, Borriello G, “Building the Internet of
Things Using RFID: The RFID Ecosystem
Experience”, Pages 48-55, Volume 13, Issue 3,
Internet Computing IEEE, May-June 2009
[13] D. Bregman, "Smart Home Intelligence – The
eHome that Learns", International Journal of Smart
Home, Volume 4, No. 4, October 2010
[14] Animesh K Trivedi, Rajan Arora, Rishi Kapoor,
Sudip Sanyal and Sugata Sanyal, "A Semi-distributed
Reputation-based Intrusion Detection System for
Mobile Ad hoc Networks”, arXiv preprint
arXiv:1006.1956, 2010/6/10
[15] Manoj Rameshchandra Thakur, Sugata Sanyal, "A
Multi-Dimensional approach towards Intrusion
Detection System", arXiv:1205.2340v1[cs.CR],
2012/5/10
[16] J.D. Case, M. Fedor, M.L. Schoffstall, J. Davin,
"Simple Network Management Protocol (SNMP)",
http://dx.doi.org/10.17487/RFC1157, May 1990
Sensor Actuator Memory CPU utilization
Smart AC Working Working Below threshold Below Threshold
Smart Refrigerator Not working Working Threshold Below Threshold
Smart washing
machine
Working Not working Above Threshold Above Threshold
4. Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2625
[17] William Stallings, "SNMP, SNMPv2, and CMIP: the
practical guide to network management", Book,
ISBN:0-201-63331-0, 1993
[18] David Perkins, Evan McGinnis, "Understanding
SNMP MIBs", Book, ISBN:0-13-437708-7, 1997
[19] Michael Armbrust, Armando Fox, Rean Griffith,
Anthony D. Joseph, Randy Katz, Andy Konwinski,
Gunho Lee, David Patterson, Ariel Rabkin, Ion
Stoica, Matei Zaharia, “A view of cloud computing”,
Communications of the ACM, Volume 53 Issue 4,
Pages 50-58, April 2010
[20] Simon Ostermann, Alexandria Iosup, Nezih
Yigitbasi, Radu Prodan, Thomas Fahringer, Dick
Epema, "A Performance Analysis of EC2 Cloud
Computing Services for Scientific Computing", pp
115-131, DOI 10.1007/978-3-642-12636-9_9, 2010
[21] Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang Yong
Han, "SCIDS: a soft computing intrusion detection
system", Pages 252-257, Book Distributed
Computing-IWDC 2004, 2005/1/1
[22] Dan Boneh, Matt Franklin, "Identity-Based
Encryption from the Weil Pairing", Advances in
Cryptology — CRYPTO 2001, pp 213-229, DOI
10.1007/3-540-44647-8_13, 2001
[23] Ronald L. Rivest, "The RC5 encryption algorithm",
Second International Workshop Leuven, Belgium, pp
86-96, DOI 10.1007/3-540-60590-8_7, December
14–16, 1994
[24] Brent Waters, "Efficient Identity-Based Encryption
Without Random Oracles", 24th Annual International
Conference on the Theory and Applications of
Cryptographic Techniques, Aarhus, Denmark, pp
114-127, May 22-26, 2005
[25] Animesh Kr. Trivedi, Rishi Kapoor, Rajan Arora,
Sudip Sanyal, Sugata Sanyal, "RISM - Reputation
Based Intrusion Detection System for Mobile Ad hoc
Networks", Third International Conference on
Computers and Devices for Communications
CODEC-06, pages 234-237, 2006
[26] Divyata Dal, Siby Abraham, Ajith Abraham, Sugata
Sanyal, Mukund Sanglikar, "Evolution induced
secondary immunity: An artificial immune system
based intrusion detection system", Computer
Information Systems and Industrial Management
Applications, Pages 65-70, IEEE, 2008