The growth of Internet and other web technologies requires the development of new algorithms and architectures for parallel and distributed computing. International journal of Distributed and parallel systems is a bi monthly open access peer-reviewed journal aims to publish high quality scientific papers arising from original research and development from the international community in the areas of parallel and distributed systems. IJDPS serves as a platform for engineers and researchers to present new ideas and system technology, with an interactive and friendly, but strongly professional atmosphere.
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Top Cited Articles - International Journal of Distributed and Parallel systems (IJDPS)
1. TToopp CCiitteedd AArrttiicclleess
International Journal of Distributed and Parallel
systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
2. Citation Count – 278
MOBILE-ASSISTED LANGUAGE LEARNING
Tayebeh Mosavi Miangah1
and Amin Nezarat2
1
English Language Department, Payame Noor University, Yazd, Iran
2
Information Technology Department, Shiraz University, Shiraz, Iran
ABSTRACT
The main characteristics of mobile learning (m-learning) are recognized as the potential for
learning process to be personalized, spontaneous, informal and ubiquitous. Although learning
through mobile phones may take longer time compared to computers, the learners feel a greater
sense of freedom of time and place, so that they can take the advantage of spare time to learn a
second language when and where they are. Mobile-Assisted Language Learning (MALL) deals
with the use of mobile technology in language learning. In contrast to classroom learning, in
MALL there is no need for the learners to sit in a classroom or at a computer to get learning
materials. In fact, MALL can be considered an ideal solution to language learning barriers in
terms of time and place. In this paper by looking at some applications of m-learning as well as
some examples across various aspects of it, we observe the advantages and disadvantages
derived from using mobile technologies for students as well as professionals. Here, it has been
tried to demonstrate the benefits of using mobile phones in learning English as a second
language. Areas of mobile-based language learning discussed in this paper are vocabulary,
listening, grammar, phonetics, and reading comprehension.
KEYWORDS
e-learning, mobile-assisted language learning, mobile technology, second language learning,
wireless communication
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
3. REFERENCES
[1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content
representation type on mobile language learning”. Language Learning & Technology, 12(3), pp.
93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf
[2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for
Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-
180.
[3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless
computing in collaborative learning environments”. International Journal of Human-Computer
Interaction, 13(2), pp. 257-276.
[4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia
English listening exercises in daily life”. In: The International Conference on Computer and
Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/
[5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’
language learning”. ReCALL, 20(3), pp. 315–350.
[6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a
window into a virtual simulated world." In: Proceedings of IEEE International Workshop on
Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp.
95-98
[7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile
learning: Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press.
[8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language
Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?”
http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009.
[9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and
trainers”. London: Routledge, 2005.
[10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL
21(2), pp. 157-165.
[11] Microsoft research program. (2010).
At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010
[12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next
Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010.
4. [13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”.
Computers & Education, 34(3-4), pp. 177-193.
[14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile
learning”. ReCALL, 20(3), pp. 253–270.
[15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan.
Journal of Computer Assisted Learning”, 21(3), pp. 217–228.
[16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”.
http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010.
[17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”.
http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010.
[18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language
learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp.
327-339.
5. Citation Count – 183
MOBILE LEARNING (M-LEARNING) AND EDUCATIONAL ENVIRONMENTS
Mohamed Sarrab1
, Laila Elgamel2
, Hamza Aldabbas2
1
Communication and Information Research,Center, Sultan Qaboos University,Al-Khodh
Muscat,123,Sultanate of Oman
2
Software Technology Research Laboratory, De Montfort University, LE1 9BH, Leicester, UK
ABSTRACT
Mobile devices show a dramatic departure from old-fashion of computing platforms as they no
more represent a static or fixed notion of context, where changes are small, absent, or
predictable. With this dramatic departure, the expansion and continued evolution of modern
mobile devices an opportunity has arisen for much more comprehensive integration of these
modern devices into educational environments. Mobile learning is a new research area, that has
become an emerging tool for our education system. The mobile learning can be used to enhance
the overall learning experience of our students and teachers. This paper discusses the background
of mobile learning and how it can be used to enhance the whole eLearning system. The paper
presents the M-learning approach as the next generation of eLearning, whereas the next
generation of the learning systems will provide easy access and widely available to all who wish
to be part of it. The paper also highlights the benefits and future challenges of mobile learning in
our educational environments.
KEYWORDS
Mobile Learning, eLearning, Educational Environments.
For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps04.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
6. REFERENCES
[1] Gartner Group, “Gartner Says More than 1 Billion PCs In Use Worldwide and Headed to 2
Billion Units by 2014,” 2008. [Online]. Available:
http://www.gartner.com/it/page.jsp?id=703807. [Accessed: 11-Sep-2011].
[2] Oulasvirta, M. Wahlström, and K. Anders Ericsson, “What does it mean to be good at using a
mobile device? An investigation of three levels of experience and skill,” International Journal of
Human-Computer Studies, vol. 69, no. 3, pp. 155-169, Mar. 2011.
[3] I. Wasserman, “Software engineering issues for mobile application development,” in
Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10,
2010, pp. 397-400.
[4] F. Balagtas-Fernandez, J. Forrai, and H. Hussmann, “Evaluation of user interface design and
input methods for applications on mobile touch screen devices,” Human-Computer Interaction,
pp. 243–246, 2009.
[5] Moodle Corp, 2008. An overview of MOODLE. 20 Nov. 2008. http://moodle.org/about
[6] T. Hofer, W. Schwinger, M. Pichler, G. Leonhartsberger, J. Altmann, and W. Retschitzegger,
“Context-awareness on mobile devices - the hydrogen approach,” in 36th Annual Hawaii
International Conference on System Sciences, 2003. Proceedings of the, 2003.
[7] J. Dey, Anind K., Hakkila, “Context-Awareness and Mobile Devices,” 2008.
[8] N. Jennings, “Agent-oriented software engineering,” Multi-Agent System Engineering, pp.
1–7, 1999.
[9] M. Brault, “Disability status and the characteristics of people in group quarters: a brief
analysis of disability prevalence among the civilian noninstitutionalized and total populations in
the American community survey,” US Census Bureau, 2008.
[10] Apple Inc., “iOS Human Interface Guidelines: Introduction.” [Online]. Available:
http://developer.apple.com/library/ios/#DOCUMENTATION/UserExperience/Conceptual/Mobil
eHIG/Introduction/Introduction.html. [Accessed: 13-Sep-2011].
[11] J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J.-M. Bruel, “RELAX: a language
to address uncertainty in self-adaptive systems requirement,” Requirements Engineering, vol. 15,
no. 2, pp. 177-196, Mar. 2010.
[12] Nadire Cavus & Dogan Ibrahim, “m-Learning: An experiment in using SMS to support
learning new English language words,” British Journal of Educational Technology, Volume 40
Issue 1, Pages 78 –91, Feb 2008.
7. [13] McConatha Douglas, Praul Matt and Lynch Michael J. “Mobile Learning in Higher
Education: An Empirical Assessment of a New Educational Tool,” Turkish Online Journal of
Educational Technology . vol.7,n3 article 2, Jul 2008.
[14] Quinn C. “M-Learning: Mobile , Wireless , In-Your-Pocket Learning,”
http://www.linezine.com/2.1/features/cqmmwiyp.htm ,2000.
[15] Kristiansen, T. “M-learning. Experiences from the use of WAP as a
supplementoinolearning,”http://www.nadenff.no/nadenff/konferanse/vettre02/TK010430%20Erf
aringsr apport.pdf, 2009.
[16] Chabra T. and Figueiredo J., “How To Design and Deploy And held Learning,”
ohttp://www.empoweringtechnologies.net/eLearning/eLearning_exPov5_files/frame.htm, 2002.
[17] A Dye, B E Solstad. “J A K Odingo. Mobile Educa-tion-A Glance atoTheoFuture,”o
http://www.nettskolen.com/forskning/mobile_education.pdf ,2009.
[18] Yuan Jiugen1, Xing Ruonan2, Wang Jianmin, Applying Research of Mobile Learning Mode
in Teaching. International Forum on Information Technology and Applications, 16-18 July 2010.
[19] Farooq, U, Schafer, W, Rosson, M.B and Caroll, J.M. M-Education: Bridging the Gap of
Mobile and Desktop Computing. Centre for Human-Computer Interaction and Department of
Computer Science. Virginia Polytechnic Institute and State University, pp. 1-2, 2002.
[20] Giuseppe Laria, Mobile and nomadic user in e-learning: the Akogrimo case, sixth
framework programme, Information Society, Fisciano, Italy, 2002.
[21] Devinder Singh & Zaitun A.B, Mobile Learning In Wireless Classrooms, Malaysian Online
Journal of Instructional Technology (MOJIT) Vol. 3, No.2, pp 26-42, August 2006.
[22] Rashmi Padiadpu, Towards Mobile Learning: A SCORM Player for the Google Android
Platform Hamburg university of applied science, Master Thesis, Information Engineering, 2008.
[23] Cohen, A. Japan loves wireless. PC Magazine, Vol.21, No.18, p. 136. 2002.
[24] Thornton, P. & Houser, C. Using Mobile Phones in Education. IEEE International
Workshop on Wireless and Mobile Technologies in Education. 2004.
[25] Wains, S. I., & Mahmood, D. W. Integrating M-Learning with E-Learning. Cincinnati,
Ohio, USA. 2008.
[26] Parson D., Ryu H. and Cranshaw M. 2006, “A Study of Design Requirements for Mobile
Learning Environments”, Proceedings of the sixth International Conference on Advance
Learning Technologies.
8. [27] Sharma S. and Kitchens F. 2004, “Web Service Architecture for MLearning”, Electronic
Journal on E-Learning Volume 2 Issue 1.
[28] Barker A., Krull G. and Mallinson B. 2005, “A Proposed Theoretical Model for M-Learning
Adoption in Developing Countries”, 4th World Conference of M-Learning.
[29] Robert Yu-Liang Ting 2005, “Mobile Learning-Current Trend and Future Challenges”,
Proceedings of the fifth IEEE ICALT’05.
[30] Saipunidzam Mahamad, Mohammad Noor Ibrahim, Mohamad Izzriq Ab Malek Foad, and
Shakirah Mohd Taib. Open Source Implementation of M-Learning for Primary School in
Malaysia. International Journal of Human and Social Sciences 3:4 2008
[31] Barkhuus, L. and Dourish, P., 2004. Everyday encounters with context-aware computing in
a campus environment. Proceeding of the International Conference on Ubiquitous Computing,
Sept. 2004, Springer, Berlin/Heidelberg, pp: 232-249. DOI: 978-3-540- 22955-1
[32] Jihen, M., L. Mona, D. Alain and H.B. Ghezala, 2007. A context aware mobile and
collaborative learning scenario. IEEE Multidiscip. Engineering Educ. Mag., 2: 65-69.
[33] Houser, C. and P. Thornton, 2005. Poodle a course management system for mobile phones.
Proceedings of the IEEE International Workshop on Wireless and Mobile Technologies in
Education, Nov. 2005, IEEE Computer Society, Japan, pp: 211-215. DOI:
10.1109/WMTE.2005.51.
AUTHORS
Dr. Mohamed Sarrab has Ph.D. in Computer Science from De Montfort
University 2011. He received his B.Sc. in computer science from 7th April
University Libya and also received M.Sc in Computer Science from VSB
Technical University of Ostrava Czech Republic. His main research
interests are Mobile Applications, M-learning, Computer security, Runtime
Verification, Computer forensic.
Eng. Laila Elgamel has M.Sc. in Software Engineering from De Montfort University 2011. She
received her B.Sc. in computer science from 7th April University Libya a. Her main research
interests are Mobile Applications, M-learning, Software Engineering.
Eng. Hamza Aldabbas has M.Sc in computer science from Al-Balqa’a
Applied University-Jordan. And B.Sc. in Computer Information System
from the same university. His research interests are Human-computer
interaction, E-commerce, E-government and M-Learning.
9. Citation Count – 149
SURVEY ON QOEQOS CORRELATION MODELS FORMULTIMEDIA SERVICES
Mohammed Alreshoodi1
and John Woods2
1
School of Computer Science and Electronic Engineering, University of Essex, UK
2
School of Computer Science and Electronic Engineering, University of Essex, UK
ABSTRACT
This paper presents a brief review of some existing correlation models which attempt to map
Quality of Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS
refers to deterministic network behaviour, so that data can be transported with a minimum of
packet loss, delay and maximum bandwidth. QoE is a subjective measure that involves human
dimensions; it ties together user perception, expectations, and experience of the application and
network performance. The Holy Grail of subjective measurement is to predict it from the
objective measurements; in other words predict QoE from a given set of QoS parameters or vice
versa. Whilst there are many quality models for multimedia, most of them are only partial
solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the
QoS/QoE mapping.
KEYWORDS
QoE, QoS, Perceived Quality, Quality Metrics.
For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
10. REFERENCES
[1] Nokia white paper, (2004), “Quality of Experience (QoE) of mobile services: Can it be
measured and improved?”
[2] Edson Gallo, Mario Siller, &John Woods, (2007), “An Ontology for the Quality of
Experience Framework”, IEEE International Conference on Systems, Montreal Canada
[3] Bauer, B., & Patrick, A. S. (2004). “A Human Factors Extension to the Seven-Layer OSI
Reference Model”
[4] Lopez, D., Gonzalez, F., Bellido, L., & Alonso, A. (2006). “Adaptive multimedia streaming
over IP based on customer oriented metrics”, [Conference Paper], Proceedings of ISCN'06 7th
International Symposium on Computer Networks.
[5] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, &W. Weiss, (1998)“An architecture for
differentiated services”. Internet Standards Track RFC 2475, IETF.
[6] Braden, R., Clark, D., &Shenker, S., (1994) “Integrated Services in the Internet Architecture:
an Overview”, RFC 1633.
[7] E. Rosen, A. Viswanathan, &R. Callon, (2001) “Multiprotocol Label Switching Architecture
(MPLS)”, IETF RFC 3031.
[8] M. Fiedler, T. Hossfeld, &P. Tran-Gia, (2010) “A generic quantitative relationship between
quality of experience and quality of service”, IEEE Network, vol. 24, no. 2, pp. 36–41.
[9] ITU-T Recommendation, (2003) “ITU-T Rec. P.800.1: Mean Opinion Score (MOS)
Terminology”.
[10] S. Winkler, (2007) “Video Quality and Beyond, Symmetricom”.
[11] Kalpana Seshadrinathan, Rajiv Soundararajan, Alan C. Bovik, &Lawrence K. Cormack,
(2009) “Study of Subjective and Objective Quality Assessment of Video”, IEEE
TRANSACTIONS ON IMAGE PROCESSING.
[12] O. Nemethova, M. Ries, E. Siffel, &M. Rupp, (2004) “Quality Assessment for H.264 Coded
Low-rate Low-resolution Video Sequences”, Proc. of Conference on Internet and Information
Technologies.
[13] Z. Wang, A. C. Bovik, H. R. Sheikh, &E. P. Simoncelli, (2004 ) “Image quality assessment:
From error visibility to structural similarity,” IEEE Transactions on Image Processing.
[14] ANSI T1.801.03 Standard, (2003) “Digital Transport of One-Way Video Signals -
Parameters for Objective Performance Assessment”.
11. [15] ITU-T Recommendation, “ITU-T Rec. P.862.1: Mapping function for transforming P.862
raw result scores to MOS-LQO,” 2003.
[16] Brooks, P., & Hestnes, B. (2010). “User measures of quality of experience: Why being
objective and quantitative is important”. IEEE Network, 24(2), 8–13.
[17] A. Takahashi, D. Hands, &V. Barriac, (2008) “Standardization activities in the ITU for a
QoE assessment of IPTV”, Communications Magazine, IEEE, vol. 46, pp. 78-84.
[18] Jari Korhonen, Nino Burini, Junyong You, and Ehsan Nadernejad, (2012) “HOW TO
EVALUATE OBJECTIVE VIDEO QUALITY METRICS RELIABLY”, QoMEX IEEE
[19] S. Khirman &P. Henriksen, (2002) “Relationship between quality-of-service and quality-
ofexperience for public internet service,” in Workshop on Passive and Active Measurement,
USA.
[20] Mark Carson, &Darrin Santay, (2003), “NIST Net – A Linux-based Network Emulation
Tool”, National Institute of Standards and Technology (NIST). (http://snad.ncsl.nist.gov/nistnet/)
[21] H. J. Kim &S. G. Choi, (2010) “A study on a QoS/QoE correlation model for QoE
evaluation on IPTV service,” in Proceedings of the 12th International Conference on Advanced
Communication Technology (ICACT ’10), pp. 1377–1382.
[22] H. Koumaras, C-H. Lin, C-K. Shieh, &A. Kourtis, (2009) “A Framework for End-to-End
Video Quality Prediction of MPEG Video”, J. Vis. Commun. Image R, doi:
10.1016/j.jvcir.2009.07.005
[23] Ricky K. P. Mok, Edmond W. W. Chan, &Rocky K. C. Chang, (2011) “Measuring the
Quality of Experience of HTTP Video Streaming”, 12th IFIP/IEEE 1M.
[24] Tianyi Wang, Anjum Pervez2, &Hua Zou1, (2010) “VQM-BASED QOS/QOE MAPPING
FOR STREAMING VIDEO”.
[25] M.H. Pinson, &S.Wolf, (2004) “A New Standardized Method for Objectively Measuring
Video Quality”, IEEE Transactions on Broadcasting, Vol. 50, pp. 312-322.
[26] NTIA General Model (aka VQM) and Full Reference Calibration Standards,
[http://www.its.bldrdoc.gov]
[27] IstOpt (First Optimization), 7D-Soft High Technology Inc. Available:
http://www.7dsoft.comlcnlindex.htm
[28] P. Ramos, J. Salmerón, R. Leal, &F. Vidal, (2012) “Estimating Perceived Video Quality
from Objective Parameters in Video over IP Services”, Copyright (c) IARIA, ISBN: 978-1-
61208-193-9
13. [42] A. Khan, L. Sun, E. Ifeachor, J. Fajardo, F. Liberal &H. Koumaras, (2010) “Video Quality
Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks”,
International Journal of Digital Multimedia Broadcasting.
[43] J.-S. R. Jang, (1993) “ANFIS: adaptive-network-based fuzzy inference system,” IEEE
Transactions on Systems, Man and Cybernetics, vol. 23, no. 3, pp. 665–685.
[44] T. Malinovski, T. Vasileva-Stojanovska, &V.Trajkovik, (2011)“Quality-of-Experience
Perception for VideoStreaming Services: Preliminary Subjective andObjective Results,
International Journal of Research and Reviews in Next Generation Networks (IJRRNGN) Vol. 1.
[45] T. Hoßfeld, R. Schatz, M. Seufert, M. Hirth, T. Zinner, &P. Tran-Gia, (2011)
“Quantification of YouTube QoE via Crowdsourcing,” in IEEE International Workshop on
Multimedia Quality of Experience - Modeling, Evaluation, and Directions (MQoE), Dana Point,
CA, USA.
[46] M. Hirth, T. Hoßfeld, &P. Tran-Gia, (2011) “Anatomy of a crowdsourcing platform - using
the example of microworkers.com,” in Workshop on Future Internet and Next Generation
Networks, Seoul, Korea.
[47] T. Hoßfeld, R. Schatz, &S. Egger, (2011) “SOS: The MOS is not enough!” in QoMEX,
Mechelen, Belgium.
[48] M. Siller &J. Woods, (2003) “Improving Quality of Experience for Multimedia Services by
QoS arbitration on a QoE Framework,” in IEEE Packet Video, Nantes.
[49] Watson, A. &Sasse, M.A., (1998) “Measuring Perceived Quality of Speech and Video in
Multimedia Conferencing Applications”, Proceedings of ACM Multimedia. Bristol, UK, pp 55-
60.
[50] B. Han, X. Zhang, Y. Qi, Y. Gao &D. Yang, (2012) “QoE Model Based Optimization for
Streaming Media Service Considering Equipment and Environment Factors”, Wireless Pers
Commun.
[51] Khalil UrRehmanLaghari, Imran Khan&Noel Crespi, (2012) “Quantitative and Qualitative
Assessment of QoE for Multimedia Services in Wireless Environment”, MoVid’12, North
Carolina, USA
[52] Pawlak, Z., Grzymala–Busse, J.W., Slowiriski, R. & Ziarko, W, (1995) “Rough Sets”,
Comm of the ACM. vol.38 (11). pp. 88— 95.
[53] Le Callet P, MöllerS&Perkis A. (eds). (2012) Qualinet White paper on Definitions of
Quality of Experience (QoE).
14. [54] Skorin-Kapov L & Varela M, (2012) “A Multi-Dimensional View of QoE: the ARCU
Model”, Proceedings of the 35th Jubilee International Convention on Information and
Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.
[55] Kestutis Mintauckis, (2010) “Empirical studies of Quality of Experience (QoE) – A
Systematic Literature Survey”, Master of Science Thesis in computer science, University of
Oslo.
[56] Schwarz, H. Marpe, D. &Wiegand, T. (2007) “Overview of the Scalable Video Coding
Extension of the H.264/AVC Standard”, IEEE Trans. Circuits Syst. Video Technol.,vol. 17, No.
9, pp. 1103- 1120.
[57] Jain, R, (2004) “Quality of Experience”. IEEE Multimedia, Vol. 11(1), 96-97.
15. Citation Count – 97
EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING
V.Ramya1
, B. Palaniappan2
1
Assistant Professor, Department of CSE, Annamalai University, Chidambaram, India.
2
Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India.
ABSTRACT
Safety plays a major role in today’s world and it is necessary that good safety systems are to be
implemented in places of education and work. This work modifies the existing safety model
installed in industries and this system also be used in homes and offices. The main objective of
the work is designing microcontroller based toxic gas detecting and alerting system. The
hazardous gases like LPG and propane were sensed and displayed each and every second in the
LCD display. If these gases exceed the normal level then an alarm is generated immediately and
also an alert message (SMS) is sent to the authorized person through the GSM. The advantage
of this automated detection and alerting system over the manual method is that it offers quick
response time and accurate detection of an emergency and in turn leading faster diffusion of the
critical situation.
KEYWORDS
Air pollution Monitoring, gas sensors, GSM module, wireless networks.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
16. REFERENCES
[1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE,
“A Mobile GPRS-sensors array for Air Pollution Monitoring” vol.6, pp.410-422,
Oct.2010.
[2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An
Environment Air Pollution Monitoring System Based on the IEEE1451 Standard for Low
Cost Requirements” IEEE Sensors J., Vol. 8, pp.415-422, Apr. 2008.
[3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air
Pollution mapper for cities”, in Proc. IEEE Innovations in Information Technology Conf.,
Dubai, UAE, Nov.2006, pp.1-5.
[4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring
system based on geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing
Symp., 2008, vol. 3, pp. 1370-1373.
[5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh
network based on Embedded System”, in proc. 5th IEEE Int. Symp. Embedded
Computing, 2008, pp. 174-179.
[6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring
system Using ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf.
Convergence Information Technology, 2007, pp.1024-1031.
[7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor
System Based on Wireless Sensor Network”, Journal of Xihua University, Natural
Science, Vol. 26, no.4, pp. 44-46 ,2007.
[8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J.
Gandolf, and N. j. Tao, “A wearable and wireless sensor system for real-time monitoring
of toxic environmental volatile organic compounds”, IEEE sensors, J., vol. 9, pp. 1734-
1740, Dec.2009.
[9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module
for Room Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009.
[10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-
Graw Hill.
17. [11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring
system based on the IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J.,
Vol, 8, pp. 415-422, Apr, 2008.
[12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring
system based on geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing
Symp., 2008, vol, 3, pp.1370-1373.
18. Citation Count – 82
DATA MINING SYSTEM AND APPLICATIONS: A REVIEW
Mr. S. P. Deshpande1
and Dr. V. M. Thakare2
1
Department of MCA, D.C.P.E, H.V.P.Mandal Amravati, India
2
Post Graduate Deptt. of Computer Science,SGB, Amravati University, Amravati, India
ABSTRACT
In the Information Technology era information plays vital role in every sphere of the
human life. It is very important to gather data from different data sources, store and
maintain the data, generate information, generate knowledge and disseminate data,
information and knowledge to every stakeholder. Due to vast use of computers and
electronics devices and tremendous growth in computing power and storage capacity,
there is explosive growth in data collection. The storing of the data in data warehouse
enables entire enterprise to access a reliable current database. To analyze this vast amount
of data and drawing fruitful conclusions and inferences it needs the special tools called
data mining tools. This paper gives overview of the data mining systems and some of its
applications.
KEYWORDS
Data mining system architecture, Data mining application
For More Details : http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf
Volume Link : http://airccse.org/journal/ijdps/curissue.html
19. REFERENCES
[1]Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-
892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.),
1999.
[2]Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”,
ISBN 0-471-66657-2, John Wiley & Sons, Inc, 2005.
[3]Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”,
Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006.
[4].Chapman, P., Clinton, J., Kerber, R., Khabaza, T.,Reinartz, T., Shearer, C. and Wirth,
R.. “CRISP-DM 1.0 : Step-by-step data mining guide, NCR Systems Engineering
Copenhagen (USA and Denmark), DaimlerChrysler AG (Germany), SPSS Inc. (USA) and
OHRA Verzekeringenen Bank Group B.V (The Netherlands), 2000”.
[5]. Fayyad, U., Piatetsky-Shapiro, G., and Smyth P., “From Data Mining to Knowledge
Discovery in Databases,” AI Magazine, American Association for Artificial Intelligence,
1996.
[6]. Tan Pang-Ning, Steinbach, M., Vipin Kumar. “Introduction to Data Mining”, Pearson
Education, New Delhi, ISBN: 978-81-317-1472-0, 3rd Edition, 2009.
[7]. Bernstein, A. and Provost, F., “An Intelligent Assistant for the Knowledge Discovery
Process”, Working Paper of the Center for Digital Economy Research, New York
University and also presented at the IJCAI 2001 Workshop on Wrappers for Performance
Enhancement in Knowledge Discovery in Databases.
[8]. Baazaoui, Z., H., Faiz, S., and Ben Ghezala, H., “A Framework for Data Mining
Based Multi-Agent: An Application to Spatial Data, volume 5, ISSN 1307-6884,”
Proceedings of World Academy of Science, Engineering and Technology, April 2005.
[9]. Rantzau, R. and Schwarz, H., “A Multi-Tier Architecture for High-Performance Data
Mining, A Technical Project Report of ESPRIT project, The consortium of CRITIKAL
project, Attar Software Ltd. (UK), Gehe AG (Denmark); Lloyds TSB Group (UK),
Parallel Applications Centre, University of Southampton (UK), BWI, University of
Stuttgart (Denmark), IPVR, University of Stuttgart (Denmark)”.
[10]. Botia, J. A., Garijo, M. y Velasco, J. R., Skarmeta, A. F., “A Generic Data mining
System basic design and implementation guidelines”, A Technical Project Report of
CYCYT project of Spanish Government. 1998. Web Site:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1935
[11] Campos, M. M., Stengard, P. J., Boriana, L. M., “Data-Centric Automated Data
Mining”, , Web Site.:
20. www.oracle.com/technology/products/bi/odm/pdf/automated_data_mining_paper_1205.p
df
[12].Sirgo, J., Lopez, A., Janez, R., Blanco, R., Abajo, N., Tarrio, M., Perez, R., “A Data
Mining Engine based on Internet, Emerging Technologies and Factory Automation,”
Proceedings ETFA '03, IEEE Conference, 16-19 Sept. 2003. Web Site :
www.citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8955
[13] Bianca V. D.,Philippe Boula de Mareüil and Martine Adda-Decker, “Identification of
foreign-accented French using data mining techniques, Computer Sciences Laboratory for
Mechanics and Engineering Sciences (LIMSI)”. Web Site :
www.limsi.fr/Individu/bianca/article/Vieru&Boula&Madda_ParaLing07.pdf
[14]Halteren, H. van, “Linguistic Profiling for Author Recognition and Verification”,
Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics
USA, Barcelona, Spain, Article No. 199, Year of Publication: 2004.
[15]. Halteren, H. V., Oostdijk N., “Linguistic profiling of texts for the purpose of
language verification, The ILK research group, Tilburg centre for Creative Computing and
the Department of Communication and Information Sciences of the Faculty of
Humanities, Tilburg University, The Netherlands.” WebSite:
www.ilk.uvt.nl/~antalb/textmining/LingProfColingDef.pdf
[16]. Antonie, M. L., Zaiane, O. R.,Coman, A., “Application of Data Mining Techniques
for Medical Image Classification”, Proceedings of the Second International Workshop on
Multimedia Data Mining (MDM/KDD 2001) in conjunction with ACM SIGKDD
conference, San Francisco, August 26, 2001.
[17].Kusiak, A., Kernstine, K.H., Kern, J.A., McLaughlin, K.A., and Tseng, T.L., “Data
Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial
Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000.
[18].Luis, R., Redol, J., Simoes, D., Horta, N., “Data Warehousing and Data Mining
System Applied to ELearning, Proceedings of the II International Conference on
Multimedia and Information & Communication Technologies in Education, Badajoz,
Spain, December 3-6th 2003.
[19].Chen, H., Chung, W., Qin, Y., Chau, M., Xu, J. J., Wang, G., Zheng, R., Atabakhsh,
H., “Crime Data Mining: An Overview and Case Studies”, A project under NSF Digital
Government Programme, USA, “COPLINK Center: Information and Knowledge
Management for Law Enforcement,”, July 2000 – June 2003.
[20].Kay, J., Maisonneuve, N., Yacef, K., Zaiane O., “Mining patterns of events in
students’ teamwork data”, Proceedings of the ITS (Intelligent Tutoring Systems) 2006
Workshop on Educational Data Mining, pages 45-52, Jhongli, Taiwan, 2006.
21. [21]Rao, R. B., Krishnan, S. and Niculescu, R. S., “Data Mining for Improved Cardiac
Care” , SIGKDD Explorations Volume 8, Issue 1.
[22]Ghani, R., Probst, K., Liu, Y., Krema, M., Fano, A., “Text Mining for Product
Attribute Extraction”, SIGKDD Explorations Volume 8, Issue 1.
[23]DeBarr, D., Eyler-Walker, Z., “Closing the Gap: Automated Screening of Tax Returns
to Identify Egregious Tax Shelters”. SIGKDD Explorations Volume 8, Issue 1.
[24]Kanellopoulos, Y., Dimopulos, T., Tjortjis, C., Makris, C. “Mining Source Code
Elements for Comprehending Object-Oriented Systems and Evaluating Their
Maintainability”, SIGKDD Explorations Volume 8, Issue 1.
[25]Schultz, M. G., Eskin, Eleazar, Zadok, Erez, and Stolfo, Salvatore, J., “Data Mining
Methods for Detection of New Malicious Executables”. Proceedings of the 2001 IEEE
Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA ,
ISSN:1081-6011, 2001.
[26] Cai, W. and Li L., “Anomaly Detection using TCP Header Information, STAT753
Class Project Paper, May 2004.”. Web
Site:http://www.scs.gmu.edu/~wcai/stat753/stat753report.pdf
[27].Nandi, T., Rao, C. B. and Ramchandran, S., “Comparative genomics using data
mining tools, Journal of Bio-Science, Indian Academy of Sciences, Vol. 27,No. 1, Suppl.
1, page No. 15-25, February 2002”.
[28]Khreisat, L., “Arabic Text Classification Using N-Gram Frequency Statistics A
Comparative Study”. Proceedings of The 2006 International Conference on Data Mining,
DMIN'06, pp 78-82, Las Vegas, Nevada, USA, June 26-29, 2006.
[29] Onkamo, P. and Toivonen, H., “A survey of data mining methods for linkage dis-
equilibrium mapping”, Henry Stewart Publications 1473 – 9542. Human Genomics. VOL
2, NO 5, Page No. 336–340, MARCH 2006.
[30] Smith, L., Lipscomb, B., and Simkins, A., “Data Mining in Sports: Predicting Cy
Young Award Winners”. Journal of Computer Science, Vol. 22, Page No. 115-121,April
2007.
[31]Deng, B., Liu, X., “Data Mining in Quality Improvement”. Proceedings of the
Twenty-Seventh Annual SAS Users Group International Conference 2002 by SAS
Institute Inc., Cary, NC, USA. ISBN 1-59047-061- 3. Web Site
:http://www2.sas.com/proceedings/sugi27/Proceed27.pdf
[32]Cohen, J. J., Olivia, C., Rud, P., “Data Mining of Market Knowledge in The
Pharmaceutical Industry”. Proceeding of 13th Annual Conference of North-East SAS
Users Group Inc., NESUG2000, Philadelphia Pennsilvania, September 24-26 2000.
22. [33]Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O., “Using Data Mining
Techniques for Detecting Terror-Related Activities on the Web”. Web Site:
www.ise.bgu.ac.il/faculty/mlast/papers/JIW_Paper.pdf
[34] Solieman, O. K., “Data Mining in Sports: A Research Overview, A Technical Report,
MIS Masters Project, August 2006”. Web Site:
http://ai.arizona.edu/hchen/chencourse/Osama-DM_in_Sports.pdf
[35] Maciag, T., Hepting, D. H., Slezak, D., Hilderman, R. J., “Mining Associations for
Interface Design”. Lecture Notes in Computer Science, Springer Berlin / Heidelberg,
Volume 4481, pp. 109-117, June 26, 2007.
[36]Foster, D. P. and Stine, R. A., “Variable Selection in Data Mining: Building a
Predictive Model for Bankruptcy”. Journal of the American Statistical Association,
Alexandria, VA, ETATS-UNIS, vol. 99, ISSN 0162-1459, pp. 303-313 January 15, 2004
[37]Kraft, M. R., Desouza, K. C., Androwich, I., “Data Mining in Healthcare Information
Systems: Case Study of a Veterans’ Administration Spinal Cord Injury Population”. IEEE,
Proceedings of the 36th
Hawaii International Conference on System Sciences, 0-7695-
1874-5/03, 2002.
[38]Kusiak, A., Kernstine, K. H., Kern, J. A., McLaughlin, K. A., and Tseng, T. L., “Data
Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial
Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000.
[39]Ansari, S., Kohavi, R., Mason, L., and Zheng, Z., “Integrating E-Commerce and Data
Mining: Architecture and Challenges”. Proceedings of IEEE International Conference on
Data Mining, 2001.
[40] Jadhav, S. R., and Kumbargoudar, P., “Multimedia Data Mining in Digital Libraries:
Standards and Features”.Proceedings of conference Recent advances in Information
Science and Technology READIT – 2007, pp 54-59, Organized by Madras Library
Association - Kalpakkam Chapter & Scintific information Resource Division, Indira
Gandhi Center for Atomic research, Department of Atomic Energy, Kalpakkam,
Tamilnadu,India. 12-13 July 2007.
[41]Anjewierden, A., Koll¨offel, B., and Hulshof C., “Towards educational data mining:
Using data mining methods for automated chat analysis to understand and support inquiry
learning processes”. International Workshop on Applying Data Mining in e-Learning,
ADML'07, Vol-305, Page No 23-32, Sissi, Lassithi - Crete Greece, 18 September, 2007.
[42]Romero, C., Ventura, S. and De-Bra, P. “Knowledge Discovery with Genetic
Programming for Providing Feedback to Courseware Authors, Kluwer Academic
Publishers, Printed in the Netherlands, 30/08/2004”.
23. [43]Chen, H., Chung, W., Xu Jennifer, J., Wang, G., Qin, Y., Chau, M., “Crime Data
Mining: A General Framework and Some Examples”. Technical Report, Published by the
IEEE Computer Society, 0018-9162/04, pp 50-56, April 2004.
[44]Chodavarapu Y., “Using data-mining for effective (optimal) sports squad selections”.
Web Site: http://insightory.com/view/74//using_data-
mining_for_effective_(optimal)_sports_squad_selections
[45]Jensen, Christian, S., “Introduction to Temporal Database Research,” Web site:
http://www.cs.aau.dk/~csj/Thesis/pdf/chapter1.pdf
[46]Vajirkar, P., Singh, S., and Lee, Y., “Context-Aware Data Mining Framework for
Wireless Medical Application”. Lecture Notes in Computer Science (LNCS), Volume
2736, Springer-Verlag. ISBN 3-540-40806-1, pp. 381 – 391.
24. Citation Count – 78
PERFORMANCE ANALYSIS OF AODV, DSDV AND DSR IN MANETS
Akshai Aggarwal1
, Savita Gandhi2
, Nirbhay Chaubey3
1
Gujarat Technological University, Ahmedabad, Gujarat, India
2
Department of Computer Science, Gujarat University, Ahmedabad, Gujarat, India
3
Department of Computer Science, Institute of Science and Technology for Advanced Studies
and Research, Vallabh Vidyanagar, Gujarat, India
ABSTRACT
Mobile Ad hoc Networks (MANETs) are considered as a new paradigm of infrastructure-less
mobile wireless communication systems. MANETs are being widely studied and it is the
technology that is attracting a large variety of applications. Routing in MANETs is considered a
challenging task due to the unpredictable changes in the network topology, resulting from the
random and frequent movement of the nodes and due to the absence of any centralized control
[1][2]. In this paper, we evaluate the performance of reactive routing protocols, Ad hoc On
demand Distance Vector (AODV) and Dynamic Source Routing (DSR) and proactive routing
protocol Destination Sequenced Distance Vector (DSDV). The major goal of this study is to
analyze the performance of well known MANETs routing protocol in high mobility case under
low, medium and high density scenario. Unlike military applications, most of the other
applications of MANETs require moderate to high mobility. Hence it becomes important to
study the impact of high mobility on the performance of these routing protocols. The
performance is analyzed with respect to Average End-to-End Delay, Normalized Routing Load
(NRL), Packet Delivery Fraction (PDF) and Throughput. Simulation results verify that AODV
gives better performance as compared to DSR and DSDV.
KEYWORDS
MANETs, Routing Protocols, AODV, DSDV, DSR, NS-2.
For More Details : http://airccse.org/journal/ijdps/papers/1111ijdps15.pdf
Volume Link : http://airccse.org/journal/ijdps/current2011.html
25. REFERENCES
[1] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “A Study of Secure Routing
Protocol in Mobile Ad hoc Networks” in Proceedings of National Conferences on
Advancement in Wireless Technology and Applications, 18-19 December 2008, SVNIT,
Surat, India.
[2] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “Key Management
Consideration in MANETs” in Proceedings of National Conference on Cryptography and
Network Security (NCCNS),18-19 February 2009, VIT Unviersity, Vellore, India.
[3] Charles E. Perkins, Ad Hoc Networking, Addison-Wesley, March 2005.
[4] Charles E. Perkins and Pravin Bhagwat, “Highly Dynamic destination-sequenced
distance-vector routing (DSDV) for mobile computers . 1994.
[5] C. Perkins, E Royer and S. Das “Ad hoc On-demand Distance Vector (AODV)
Routing,” RFC 3561 , July 2003.
[6] David B. Johnson, David A. Maltz “Dynamic Source Routing in Ad Hoc Wireless
Networks, Mobile Computing, Thomasz Imielinski and Hank Korth (Editors) ,” Vol. 353,
Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
[7] NS-2 Network simulator http://www.isi.edu/nsnam/ns
[8] Chenna R. Chandrasekhar P., Reddy P “Performance Analysis of Adhoc Network
Routing Protocols, ISAUHC 2006 pp. 186-187
[9] Talooki, Ziarati VNK “Performance Comparison of Routing Protocols for Mobile Ad-
hoc Networks, APCC 2005 pp 1-5
[10] Lakshmikanth, Gaiwak G, Vyavahare MA,” Simulation based comparative
performance analysis of Adhoc routing protocols TENCON- 2008 pp 1-5
[11] Mahdipou E, Aminian E, Torabi M, Zare M “ CBR Performance Evaluation over
AODV and DSDV in RW Mobility Model, ICCAE 2009 pp 238-242.
[12] R. Misra, C. R. Manda (2005) “Performance Comparison of AODV/DSR On-
Demand Routing Protocols for Ad Hoc Networks in Constrained Situation”, IEEE
ICPWC 2005.
[13] S. R. Das, C. E. Perkins and E. M. Royer (2000), “Performance comparison of Two
On-Demand Routing protocols for Ad hoc Networks”, In Proc. of INFOCOM 2000, Tel
Aviv, Israel, March 2000.
[14] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns”.
http://www.isi.edu/nsnam/ns/tutorial/
26. [15] Network Simulator - 2 (NS-2) http://mohit.ueuo.com/NS-2.html
AUTHORS
Akshai Aggarwal (MIEEE’1966, SMIEEE’1992) is working as
Vice Chancellor, Gujarat Technological University, Ahmedabad,
India. Before joining as the Vice-Chancellor, he was working as
the Director of School of Computer Science, University of
Windsor, Canada. He worked as Professor and Head of
Department of Compu ter Science at Gujarat University for about
10 years. Before that he was Professor and Head, Department of
EE at M.S.University of Baroda. He was Chairman of IEEE India Council for two years.
He initiated IEEE activities in Gujarat by starting the first IEEE Student Branch at
M.S.University of Baroda. Later he initiated the establishment of the Student Branch at
Gujarat University. He was also the founder Chairman of IEEE Gujarat Section, the IEEE
Computer Society Chapter and the IEEE Joint Chapter of Industry Applications, Industrial
Electronics and Power Electronics. The Section conducted two International Conferences
and one national Seminar during his Chairmanship. He graduated with a B.Sc.(EE) from
Punjab Engg College and studied at MS University of Baroda for his Master’s and
Doctoral work.
Savita Gandhi (MIEEE’ 2003 SMIEEE’ 2005) is Professor &
Head at the Department of Computer Science, Gujarat University
and Joint Director, K.S. School of Business Management, Gujarat
University. She is with Gujarat University for about 20 years.
Before that she has worked with M.S. University of Baroda,
Department of Mathematics for about 10 years. She has been
actively associated with IEEE activities at Gujarat Section. She is M.Sc. (Mathematics),
Ph.D (Mathematics) and A.A.S.I.(Associate Member of Actuarial Society of India by the
virtue of having completed the "A" group examinations comprising six subjects conducted
by Institute of Actuaries , London). She was awarded Gold Medal for standing first class
first securing 93% marks in M.Sc. and several prizes at M.Sc. as well as B.Sc.
Examinations for obtaining highest marks.
Nirbhay Chaubey (SIEEE’ 2002 MIEEE’ 2004) is working as an
Assistant Professor of Computer Science at Institute of Science and
Technology for Advanced Studies and Research, Vallabh
Vidyanagar, Gujarat, India. Currently, he is pursuing Ph.D in
Computer Science at Department of Computer Science, Gujarat
University, Ahmedabad, India. He has been involved in IEEE
activities since 1994. His position held for IEEE Gujarat Section include Executive
Secretary (1998-2005), Treasurer (2005-2006), Secretary and Treasurer (2007) and
Treasurer for year 2008 onwards. He graduated from Ranchi Unviersity, Ranchi, and
Master in Computer Applications from Madurai Kamraj University, Madurai, India of
Baroda for his Master’s and Doctoral work.
27. Citation Count – 74
A REVIEW ON ROUTING PROTOCOLS FOR APPLICATION IN WIRELESS SENSOR
NETWORKS
Neha Rathi1
, Jyoti Saraswat2
and Partha Pratim Bhattacharya3
Department of Electronics and Communication Engineering Faculty of Engineering and
Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh,
Dist. Sikar, Rajasthan, Pin – 332311, India
ABSTRACT
Wireless sensor networks are harshly restricted by storage capacity, energy and computing
power. So it is essential to design effective and energy aware protocol in order to enhance the
network lifetime. In this paper, a review on routing protocol in WSNs is carried out which are
classified as data-centric, hierarchical and location based depending on the network structure.
Then some of the multipath routing protocols which are widely used in WSNs to improve
network performance are also discussed. Advantages and disadvantages of each routing
algorithm are discussed thereafter. Furthermore, this paper compares and summarizes the
performances of routing protocols.
KEYWORDS
Wireless sensor networks, nodes, energy-aware routing, routing protocols, network structure
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
28. REFERENCES
[1] WintYe Poe and Jens B. Schmitt, “Node Deployment in Large Wireless Sensor
Networks: Coverage, Energy consumption, and Worst–Case Delay”, Proceeding
AINTEC’09 Asian internet engineering college, pp. 77-84.
[2] Eunil Park and Kwangsu Cho, (2010) “Energy Efficient and Reliable Geographic
Routing in Wireless Sensor Networks”, World Academy of Science, Engineering and
Technology 37.
[3] John A. Stankovic, “Wireless Sensor Networks”, computer, vol. 41, pp. 92-95, Oct.
2008.
[4] Rajashree.V.Biradar, V. C. Patil,Dr. S. R. Sawan andDr. R. R. Mudholkar,
“Classification and Comparison of Routing Protocols in Wireless Sensor Networks”,
UbiCCJournal,Vol. 4.
[5] Jason Lester Hill and David E. Culler, (2003) “System Architecture for Wireless
Sensor Networks”, Proceedings of the Doctoral Dissertation System architecture for
wireless sensor networks.
[6] Jamal, N.Al-Karaki and Ahmed E. Kamal, “Routing techniques in wireless sensor
networks: a survey”, Wireless Communications, IEEE, vol. 11, pp. 6-28, Dec. 2004.
[7] Jim Farmer, “Managing Secure Data Delivery: A Data Roundhouse Model”, August.
2001.
[8] S. Muthukarpagam, V. Niveditta andNedunchelivan, (2010) “Design issues, Topology
issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research
Challenges”, IJCA Journal.
[9] Luis Javier GarcíaVillalba and Ana Lucila Sandoval Orozco, “Routing Protocols in
Wireless Sensor Networks”, October 2009.
[10] Sidra Aslam, Farrah Farooq and ShahzadSarwar, (2009) “Power Consumption in
Wireless Sensor Networks”, Proceedings of the 7th International Conference on Frontiers
of Information Technology.
[11] Nandini .S.Patil and P. R. Patil, “Data Aggregation in Wireless Sensor Network”,
IEEE International Conference on Computational Intelligence and Computing Research,
2010.
[12] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive Protocols
for Information Dissemination in Wireless Sensor Networks”, Proceedings on the 5th
annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.
174-185.
29. [13] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and
Fabio Silva, “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM
Transactions on Networking (TON), vol. 11, pp. 2-16, February 2003.
[14] D. Braginsky, D. Estrin, “Rumor routing algorithm for sensor networks”,
Proceedings of the First Workshop on Sensor Networks and Applications (WSNA),
Atlanta, GA, pp. 22-31, October 2002.
[15] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in
Wireless Sensor Networks”, Proceedings of the First international conference on
Embedded Software and Systems, pp. 318-325.
[16] KonradIwanicki and Maarten Van Steen, “On Hierarchical Routing in Wireless
Sensor Networks”, in Proceedings of the 2009 International Conference on Information
Processing in Sensor Networks, pp. 133-144.
[17] Ankita Joshi &Lakshmi Priya.M, “A Survey of Hierarchical Routing Protocols in
Wireless Sensor Network”, MES Journal of Technology and Management, pp. 67 – 71.
[18] Kemal Akkaya and Mohamed Younis, (2005) “A Survey on Routing Protocols for
Wireless Sensor Networks”, Ad Hoc Networks, pp. 325-349.
[19] S. Lindsey and C.S. Raghavendra, “ PEGASIS: Power Efficient Gathering in Sensor
Information Systems”, Proceedings of the IEEE Aerospace Conference, Big Sky,
Montana, March 2002, vol. 3.
[20] AratiManjeshwar and Dharma P. Agrawal, “ TEEN: A Routing Protocol for
Enhanced Efficiency in Wireless Sensor Networks”, Parallel and Distributed Processing
Symposium, proceedings 15th
International, pp. 2009-2015, April. 2009.
[21] AratiManjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for
Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor
Networks” Parallel and Distributed Processing Symposium, proceedings International,
IPDPS 2002, Abstracts, and CD-ROM, pp. 195-202.
[22] Jyh-Huei Chang and Rong-Hong Jan, (2005) “An Energy-Aware, Cluster-Based
Routing Algorithm for Wireless Sensor Networks”, International Federation for
Information Processing, pp. 255- 266.
[23] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE
Journal of Selected Areas in Communications 17 (8) (1999) 1333–1344.
[24] L. Li, J. Y Halpern, “Minimum energy mobile wireless networks
revisited”,Proceedings of IEEE International Conference on Communications (ICC_01),
Helsinki, Finland, June 2001.
30. [25] Yan Yu and Ramesh Govindan, “Geographical and Energy Aware Routing:a
recursive data dissemination protocol for wireless sensor networks”, 2001.
[26] Tokuya Inagaki and Susumu Ishihara, “HGAF: A power saving scheme for wireless
sensor network”, Journal of Information Processing, vol. 17, pp. 255-266, Oct. 2009.
[27] KaushikGhosh, ParthaPratim Bhattacharya and P. K. Das, “Effect of Multipath
Fading and Propogation Environment on the Performance of a Fermat Point Based Energy
Efficient Geocast Routing Protocol”, International Journal of Wireless & Mobile
Networks (IJWMN), Vol. 4, No. 1, February 2012.
[28]. M. Radi, B. Dezfouli and K. A. Bakar, “Multipath Routing in Wireless Sensor
Networks: Survey andResearch Challenges”,Sensors, Jan 2012.
[29] Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”,
Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor
System(MASS ’05), Washington, DC, USA, 7–10 November 2005, pp. 672–680.
[30] Felemban, Lee and C.G., Ekici, “ MMSPEED: Multipath Multi-SPEED Protocol for
QoS Guarantee of Reliability and Timeliness in Wireless Sensor Network”, IEEE Trans.
MobileComput. 2006, 5,pp. 738–754.
[31] Tian, H, Stankovic, J.A., Chenyang, L., Abdelzaher, “ T. SPEED: A Stateless
Protocol forReal-Time Communication in Sensor Networks.”, Proceedings of the 23rd
InternationalConference on Distributed Computing Systems, Providence, RI, USA, May
2003; pp. 46–55.
[32] Woo, Culler, D. Taming , “The Underlying Challenges of Reliable Multihop Routing
in Sensor Networks”, Proceedings of the 1st International Conference on Embedded
NetworkedSensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 14–27.
[33] Ganesan, Govindan, Shenker, Estrin, D, “ Highly-Resilient, Energy-Efficient
Multipath Routing in Wireless Sensor Networks”, Mobile Comput. Commun.Rev. 2001,
pp.11–25.
[34] R. Vidhyapriya, “Energy Aware Routing for Wireless Sensor Networks”, Signal
Processing, Communication and Networking, pp. 545-550, Feb. 2007.
AUTHORS
NehaRathi was born in India on 16 July,1987. She received her B. Tech
degree in Electronics and Communication Engineering from Uttar
Pradesh Technical Univers ity, India in 2010 and currently is a M. Tech
(Signal Processing) student in Mody Institute of Technology and Science
(Deemed University), Rajasthan, India.
31. JyotiSaraswat was born in India on November 26,1987. She received her
B.Tech degree in Electronics and Communication Engineering from
Modi Institute of Engin eering and Technology, Rajasthan University,
India in 2010and currently is a M. Tech (Signal Processing) studentin
ModyInstitute of Technology and Science (Deemed University),
Rajasthan, India.
Dr. ParthaPratim Bhattacharya was born in India on January 3, 1971. He
has 15 years of experience in teaching and research. He served many
reputed educational Institutes in India in various positions starting from
Lecturer to Professor and Principal. At present he is working as
Professor in Department of Electronics and Communicati on
Engineering in the Faculty of Engineering and Technology, Mody
Institute of Technology and Science (Deemed University), Rajasthan,
India. He worked on Microwave devices and systems and mobile cellular communication
systems. He has published a good number of papers in refereed journals and conferences.
His present research interest includes wireless sensor networks, mobile communication
and cognitive radio.
Dr. Bhattacharya is a member of The Institution of Electronics and
TelecommunicationEngineers, India and The Institution of Engineers, India. He is the
recipient of Young Scientist Awardfrom International Union of Radio Science in 2005. He
is working as the chief editor, editorial boardmember and reviewer in many reputed
journals.
32. Citation Count – 68
A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
Monica R Mundada1
, Savan Kiran1
, Shivanand Khobanna1
, Raja Nahusha Varsha1
and Seira
Ann George1
1
Department of Computer Science and Engineering, M S Ramaiah Institute of Technology,
Bangalore
ABSTRACT
A wireless sensor network (WSN) consists of low cost, low power, small in size and multi
functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited
battery power and bandwidth constraints in order to facilitate efficient working of the network,
thereby increasing the lifetime of the network. Routing protocols in WSNs are also application
specific which has led to the development of a variety of protocols. Based on the underlying
network structure, routing techniques can be classified into three categories: data-centric,
hierarchical and location based routing. WSN has a design trade-off between energy and
communication overhead which forms the nerve center of the routing techniques. In this paper
we present a survey of state-of-the-art routing techniques in WSNs under all the three
categories. We epitomize these routing techniques and bring out the advantages and
disadvantages followed by their application domain. The paper concludes with issues open for
research.
KEYWORDS
Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric
protocols, Hierarchical Protocols and Location Based Protocols.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
33. REFERENCES
[1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer
Networks, V Vol. 38, pp. 393-422.
[2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor
network,” I IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27.
[3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation
Conference o on VLSI Design, Bangalore, India.
[4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless
e networking," IEEE Computer, Vol. 33, pp. 42-48.
[5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for
Smart Dust,” 5th Annual ACM/IEEE International Conference on Mobile Computing and
Networking (MobiCom’99), Seattle, WA.
[6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor
Networks:A survey”, Elsevier science B.V.
[7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-
Efficient Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of
Advanced Networking and Applications Volume:02, Issue:02, Pages:570-580.
[8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l.
Conf. Sys. Sci.
[9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless
Sensor Networks with the Internet," - Department of Electrical Engineering, UNiversity of
Southern California.
[10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy
consumption of routings in wireless sensor nodes” WiOpt'04: Modeling and Optimization
in Mobile, Ad Hoc and Wireless Networks,” Cambridge, UK.
[11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,”
ACM Mobile Computing and Communications Review (MC2R).
[12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE
Mobicom, Seattle, WA, pp. 174–85.
[13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based
Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless
34. Networks, vol. 8, pp. 169–85.
[14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion:
A scalable and robust communication paradigm for sensor networks", Proceedings of the
6th Annual ACM/IEEE International Conference on Mobile Computing and Networking
(MobiCom'00), Boston, MA.
[15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in
Sensor Networks,” 5th annual ACM/IEEE international conference on Mobile Computing
and Networking (MobiCom’99), Seattle, WA.
[16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor
Networks", Proceedings of the First Workshop on Sensor Networks and Applications
(WSNA), Atlanta, GA.
[17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network,
http://irl.cs.ucla.edu/papers/grab-techreport.ps
[18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying
in sensor networks,” Proceedings of the First International Workshop on Sensor Network
Protocol and Applications, Anchorage, Alaska.
[19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint
Gradients in Sensor Networks,” Pervasive Services, ICPS, IEEE/ACS International
Conference on .
[20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing
Co.
[21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice
Hall.
[22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data
Dissemination Protocol for Periodic Updates in Sensor Networks”, Distributed Computing
System Workshop 23rd International Conference.
[23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based
Routing Algoritm for MANETS”, Proceedings of the International Conference on Parallel
Processing Workshops (ICPPW 02), IEEE.
[24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An
EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”.
[25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN
0262042193, MIT Press.
35. [26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-
efficient communication protocol for wireless sensor networks", Proceeding of the Hawaii
International Conference System Sciences, Hawaii.
[27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An
ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE
Trans. Wireless Commun., vol. 1, no. 4, pp. 660–70.
[28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient
GAthering in Sensor Information Systems," Proceedings of the IEEE Aerospace
Conference, Big Sky, Montana.
[29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in
Sensor Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in
Wireless Networks and Mobile Computing, San Francisco, C.
[30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced
Efficiency in Wireless Sensor Networks," Proceedings of the 1st International Workshop
on Parallel and Distributed Computing Issues in Wireless Networks and Mobile
Computing, San Francisco, CA.
[31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for
Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor
Networks," in the Proceedings of the 2nd International Workshop on Parallel and
Distributed Computing Issues in Wireless Networks and Mobile computing, Ft.
Lauderdale, FL.
[32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in
ClusterBased Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International
Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication
Systems (MASCOTS2002), Fort Worth, TX.
[33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham
O.FAPOJUWO, (March 2005), “ A Centralised Energy-Efficient Routing Protocol for
Wireless Sensor Networks,” IEEE Radio Communication.
[34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based
energy adaptive protocol for information dissemination and forwarding in wireless sensor
networks,” Int.J.Sensor Network. Vol. X, No. Y, XXXX.
[35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for
Wireless Sensor Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549.
[36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale
Wireless Sensor Networks,” Proc. ACM/IEEE MOBICOM.
36. [37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks
Revisited,” IEEE ICC, vol. 1, pp. 278–83.
[38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy
Conservation for Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile
Comp. and Net., pp. 70–84.
[39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing
for wireless sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE
International Conference on Mobile Computing and Networking (MobiCom '00), Boston,
MA.
[40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware
Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,”
UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023.
37. Citation Count – 58
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND
FUZZY LOGIC
Mostaque Md. Morshedur Hassan
LCB College, Maligaon, Guwahati, Assam, India
ABSTRACT
Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system
security is used to identify the malicious activities in a computer system or network. There are
different approaches being employed in intrusion detection systems, but unluckily each of the
technique so far is not entirely ideal. The prediction process may produce false alarms in many
anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate
in establishing intrusive activities can be reduced. A set of efficient fuzzy rules can be used to
define the normal and abnormal behaviors in a computer network. Therefore some strategy is
needed for best promising security to monitor the anomalous behavior in computer network. In
this paper I present a few research papers regarding the foundations of intrusion detection
systems, the methodologies and good fuzzy classifiers using genetic algorithm which are the
focus of current development efforts and the solution of the problem of Intrusion Detection
System to offer a realworld view of intrusion detection. Ultimately, a discussion of the
upcoming technologies and various methodologies which promise to improve the capability of
computer systems to detect intrusions is offered.
KEYWORDS
Intrusion Detection System (IDS), Anomaly based intrusion detection, Genetic algorithm,
Fuzzy logic
For More Details : http://airccse.org/journal/ijdps/papers/4213ijdps04.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
38. REFERENCES
[1] J. Gomez & D. Dasgupta, (2002) “Evolving Fuzzy Classifiers for Intrusion Detection”, IEEE
Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy,
West Point, NY.
[2] R. H. Gong, M. Zulkernine & P. Abolmaesumi, (2005) “A Software Implementation of a
Genetic Algorithm Based Approach to Network Intrusion Detection”, Proceedings of the Sixth
International Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling
Wireless Networks.
[3] T. Xia, G. Qu, S. Hariri & M. Yousif, (2005) “An Efficient Network Intrusion Detection
Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE
International Performance Computing and Communications Conference, Phoenix, AZ, USA.
[4] Yao, J. T., S.L. Zhao & L.V. Saxton, (2005) “A Study On Fuzzy Intrusion Detection”, In
Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data
Networks Security, SPIE, Vol. 5812, Orlando, Florida, USA , pp. 23-30.
[5] B. Abdullah, I. Abd-alghafar, Gouda I. Salama & A. Abd-alhafez, (2009) “Performance
Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”,
13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), May
26-28.
[6] Hemanta K. Baruah, (2011) “Towards Forming A Field Of Fuzzy Sets”, International Journal
of Energy, Information and Communications (IJEIC), Vol. 2, Issue 1, February, pp. 16-20.
[7] Hemanta K. Baruah, (2011) “The Theory of Fuzzy Sets: Beliefs and Realities”, International
Journal of Energy, Information and Communications (IJEIC), Vol. 2, Issue 2, pp. 1-22.
[8] Tridiv Jyoti Neog & Dushmanta Kumar Sut, (2011) “Complement of an Extended Fuzzy
Set”, International Journal of Computer Applications (IJCA), Vol. 29-No.3, September, pp. 39-
45.
[9] Zadeh L A, (1965) “Fuzzy Sets”, Information and Control, Vol.8, pp. 338-353.
[10] Y. Dhanalakshmi & Dr. I. Ramesh Babu, (2008) “Intrusion Detection Using Data Mining
Along Fuzzy Logic and Genetic Algorithms”, International Journal of Computer Science and
Network Security (IJCSNS), Vol.8, No.2, February, pp. 27-32.
[11] W. Lu & I. Traore, (2004) “Detecting New Forms of Network Intrusion Using Genetic
Programming”, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp.
475-494.
39. [12] Mohammad Sazzadul Hoque, Md. Abdul Mukit & Md. Abu Naser Bikas, (2012) “An
Implementation of Intrusion Detection System using Genetic Algorithm”, International Journal
of Network Security and Its Applications (IJNSA),Vol.4, No.2, March, pp. 109-120.
[13] W. Li, (2004) “A Genetic Algorithm Approach to Network Intrusion Detection”, SANS
Institute, USA.
[14] A. Sung & S. Mukkamala, (2003) “Identifying important features for intrusion detection
using support vector machines and neural networks”, in Symposium on Applications and the
Internet, pp.209– 216.
[15 J. P. Planquart, “Application of Neural Networks to Intrusion Detection”, SANS Institute
Reading Room.
[16] R. G. Bace, (2000) “Intrusion Detection”, Macmillan Technical Publishing.
[17] S. Kumar & E. Spafford, (1995) “A Software architecture to Support Misuse Intrusion
Detection”, in the 18th National Information Security Conference, pp. 194-204.
[18] K. Ilgun, R. Kemmerer & P. A. Porras, (1995) “State Transition Analysis: A Rule-Based
Intrusion Detection Approach”, IEEE Transaction on Software Engineering, pp. 181-199.
[19] S. Kumar, (1995) “Classification and Detection of Computer Intrusions”, Purdue
University.
[20] V. Bobor, (2006) “Efficient Intrusion Detection System Architecture Based on Neural
Networks and Genetic Algorithms”, Department of Computer and Systems Sciences, Stockholm
University/Royal Institute of Technology, KTH/DSV.
[21] KDD-CUP (99) Task Description; http://kdd.ics.uci.edu/databases/kddcup99/task.html
[22] KDD Cup (1999): Tasks;
http://www.kdd.org/kddcup/index.php?section=1999&method=task
[23] KDD Cup (1999): Data;
http://www.kdd.org/kddcup/index.php?section=1999&method=data
[24] H. G. Kayacık, A. N. Zincir-Heywood & M. I. Heywood, (2005) “Selecting Features for
Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”.
[25] G. Folino, C. Pizzuti & G. Spezzano, (2005) “GP Ensemble for Distributed Intrusion
Detection Systems”, ICAPR, pp. 54-62.
40. AUTHORS
Mostaque Md. Morshedur Hassan Mostaque Md. Morshedur Hassan is a
senior Assistant Professor of Computer Science in the department of
Computer Science and Information Technology at Lalit Chandra Bharali
College (LCBC), Maligaon, Guwahati, Assam, India. He holds his Master of
Computer Application (MCA) degree from Allahabad Agricultural Institute
Deemed University, Allahabad. His area of interests includes Network
Security, Intrusion Detection and Prevention, Wireless Security, Web
Security, Fuzzy Logic, and Social Networking Site.
41. Citation Count – 58
BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY
Nateq Be-Nazir Ibn Minar1
and Mohammed Tarique2
1
Department of Electrical and Electronic Engineering, American International
University, Bangladesh
2
Department of Electronic and Communication, Ajman University of Science and
Technology, United Arab Emirates
ABSTRACT
Bluetooth technology has become an integral part of this modern society. The availability of
mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has
made Bluetooth a popular technology for short range wireless communication. However, as the
Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing
which can be potentially dangerous to the privacy of a user’s personal information. The security
issues of Bluetooth have been an active area of research for the last few years. This paper
presents the vulnerabilities in the security protocols of this technology along with some past
security threats and possible countermeasures as reported in the literatures which have been
surveyed and summarized in this paper. It also presents some tips that end-users can implement
immediately to become more cautious about their private information. Finally, the paper
concludes with some recommendations for future security enhancements that can be
implemented in the Bluetooth standard.
KEYWORDS
Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth
enhancements
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
42. REFERENCES
[1] “The Bluetooth Blues”, available at http://www.information-
age.com/article/2001/may/the_bluetooth_blues
[2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb.
22, 2001. available at: https://www.bluetooth.org/About/bluetooth_sig.htm
[3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about-
bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html
[4] Monson, Heidi - "Bluetooth Technology and Implications" available at:
http://www.sysopt.com/features/ network/article.php/3532506 (1999-12- 14).
[5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth-
fonctionnement.php3.
[6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol
to provide location privacy in wireless body area networks”, International Journal of Network
Security and its Applications (IJNSA), Vol.3, No.2, March 2011
[7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device
pairing methods”, International Journal of Network Security & Its Applications (IJNSA), Vol.1,
No.3, October 2009
[8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”,
IEEE International Conference on Pervasive Computing and Communications (PerCom-09).
2009.
[9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications,
2003, pp. 290-292
[10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at:
http://www.palowireless.com/ infotooth/tutorial/profiles.asp
[11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available
at: http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf
[12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at:
http://www.bluetomorrow.com/about-bluetooth-technology/general-
bluetoothinformation/bluetooth-versions.html
[13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at:
http://www.bluetooth.com/Pages/High-Speed.aspx
43. [14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”,
Kuopio University Library, 2009, pp. 55-62
[15] “The BlueBug”, a Bluetooth virus, available at:
http://trifinite.org/trifinite_stuff_bluebug.html
[16] John Oates, “Virus attacks mobiles via Bluetooth”, available at:
http://www.theregister.co.uk/2004/06/15/symbian_virus/
[17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-
descs/lasco_a.shtml
[18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing
protocol”. University of Cambridge Computer Laboratory, available at:
http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf
[19] Phone pirates in seek and steal mission", Cambridge Evening News, available at:
http://www.cambridge-news.co.uk/news/region_wide/2005 /08/17/
[20] "Going Around with Bluetooth in Full Safety”, available at:
http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf
[21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical
Engineering Systems, Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-
wool-mobisys05/
[22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”,
Kuopio University Library, 2009, pp. 68-80
[23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9
[24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”,
Computer Security Division - National Institute of Standards and Technology, US Department of
Commerce, 2008, pp. 25-26
[25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and
Vulnerabilities”, Indiana University Bloomington, 2008, pp. 7-8
[26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth
Security”, Computer Security Division - National Institute of Standards and Technology, US
Department of Commerce, 2008, pp.24-25
44. AUTHORS
Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his
expertise independently to institutions and manufacturing industries. He
obtained his Bachelor of Science degree in Electrical and Electronics
Engineering, with a special interest in Robotics and Industrial Automation,
from American International University - Bangladesh in 2008 and later
obtained his Master of Science degree, in Telecommunication Engineering,
focusing on Wireless Networks. His research interests include satellite
communications, network security, low-powered wireless devices, industrial automation,
robotics and green technology. He is the CEO of EcoWave – a company dedicated to produce
green electronic products for the benefit of the environment. He is an active member of IEEE
and does volunteer work for several societies.
Mohammed Tarique is an Assistant Professor in the Department of
Electronic and Communication, Ajman University of Science and
Technology, in United Arab Emirates. His research int erests include Adhoc
Networks and wireless network security, network testing and simulations.
His research primarily focuses on the design of Wireless Adhoc Networks.