SlideShare a Scribd company logo
1 of 44
Download to read offline
TToopp CCiitteedd AArrttiicclleess
International Journal of Distributed and Parallel
systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
Citation Count – 278
MOBILE-ASSISTED LANGUAGE LEARNING
Tayebeh Mosavi Miangah1
and Amin Nezarat2
1
English Language Department, Payame Noor University, Yazd, Iran
2
Information Technology Department, Shiraz University, Shiraz, Iran
ABSTRACT
The main characteristics of mobile learning (m-learning) are recognized as the potential for
learning process to be personalized, spontaneous, informal and ubiquitous. Although learning
through mobile phones may take longer time compared to computers, the learners feel a greater
sense of freedom of time and place, so that they can take the advantage of spare time to learn a
second language when and where they are. Mobile-Assisted Language Learning (MALL) deals
with the use of mobile technology in language learning. In contrast to classroom learning, in
MALL there is no need for the learners to sit in a classroom or at a computer to get learning
materials. In fact, MALL can be considered an ideal solution to language learning barriers in
terms of time and place. In this paper by looking at some applications of m-learning as well as
some examples across various aspects of it, we observe the advantages and disadvantages
derived from using mobile technologies for students as well as professionals. Here, it has been
tried to demonstrate the benefits of using mobile phones in learning English as a second
language. Areas of mobile-based language learning discussed in this paper are vocabulary,
listening, grammar, phonetics, and reading comprehension.
KEYWORDS
e-learning, mobile-assisted language learning, mobile technology, second language learning,
wireless communication
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content
representation type on mobile language learning”. Language Learning & Technology, 12(3), pp.
93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf
[2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for
Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-
180.
[3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless
computing in collaborative learning environments”. International Journal of Human-Computer
Interaction, 13(2), pp. 257-276.
[4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia
English listening exercises in daily life”. In: The International Conference on Computer and
Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/
[5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’
language learning”. ReCALL, 20(3), pp. 315–350.
[6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a
window into a virtual simulated world." In: Proceedings of IEEE International Workshop on
Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp.
95-98
[7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile
learning: Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press.
[8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language
Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?”
http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009.
[9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and
trainers”. London: Routledge, 2005.
[10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL
21(2), pp. 157-165.
[11] Microsoft research program. (2010).
At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010
[12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next
Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010.
[13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”.
Computers & Education, 34(3-4), pp. 177-193.
[14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile
learning”. ReCALL, 20(3), pp. 253–270.
[15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan.
Journal of Computer Assisted Learning”, 21(3), pp. 217–228.
[16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”.
http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010.
[17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”.
http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010.
[18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language
learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp.
327-339.
Citation Count – 183
MOBILE LEARNING (M-LEARNING) AND EDUCATIONAL ENVIRONMENTS
Mohamed Sarrab1
, Laila Elgamel2
, Hamza Aldabbas2
1
Communication and Information Research,Center, Sultan Qaboos University,Al-Khodh
Muscat,123,Sultanate of Oman
2
Software Technology Research Laboratory, De Montfort University, LE1 9BH, Leicester, UK
ABSTRACT
Mobile devices show a dramatic departure from old-fashion of computing platforms as they no
more represent a static or fixed notion of context, where changes are small, absent, or
predictable. With this dramatic departure, the expansion and continued evolution of modern
mobile devices an opportunity has arisen for much more comprehensive integration of these
modern devices into educational environments. Mobile learning is a new research area, that has
become an emerging tool for our education system. The mobile learning can be used to enhance
the overall learning experience of our students and teachers. This paper discusses the background
of mobile learning and how it can be used to enhance the whole eLearning system. The paper
presents the M-learning approach as the next generation of eLearning, whereas the next
generation of the learning systems will provide easy access and widely available to all who wish
to be part of it. The paper also highlights the benefits and future challenges of mobile learning in
our educational environments.
KEYWORDS
Mobile Learning, eLearning, Educational Environments.
For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps04.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] Gartner Group, “Gartner Says More than 1 Billion PCs In Use Worldwide and Headed to 2
Billion Units by 2014,” 2008. [Online]. Available:
http://www.gartner.com/it/page.jsp?id=703807. [Accessed: 11-Sep-2011].
[2] Oulasvirta, M. Wahlström, and K. Anders Ericsson, “What does it mean to be good at using a
mobile device? An investigation of three levels of experience and skill,” International Journal of
Human-Computer Studies, vol. 69, no. 3, pp. 155-169, Mar. 2011.
[3] I. Wasserman, “Software engineering issues for mobile application development,” in
Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10,
2010, pp. 397-400.
[4] F. Balagtas-Fernandez, J. Forrai, and H. Hussmann, “Evaluation of user interface design and
input methods for applications on mobile touch screen devices,” Human-Computer Interaction,
pp. 243–246, 2009.
[5] Moodle Corp, 2008. An overview of MOODLE. 20 Nov. 2008. http://moodle.org/about
[6] T. Hofer, W. Schwinger, M. Pichler, G. Leonhartsberger, J. Altmann, and W. Retschitzegger,
“Context-awareness on mobile devices - the hydrogen approach,” in 36th Annual Hawaii
International Conference on System Sciences, 2003. Proceedings of the, 2003.
[7] J. Dey, Anind K., Hakkila, “Context-Awareness and Mobile Devices,” 2008.
[8] N. Jennings, “Agent-oriented software engineering,” Multi-Agent System Engineering, pp.
1–7, 1999.
[9] M. Brault, “Disability status and the characteristics of people in group quarters: a brief
analysis of disability prevalence among the civilian noninstitutionalized and total populations in
the American community survey,” US Census Bureau, 2008.
[10] Apple Inc., “iOS Human Interface Guidelines: Introduction.” [Online]. Available:
http://developer.apple.com/library/ios/#DOCUMENTATION/UserExperience/Conceptual/Mobil
eHIG/Introduction/Introduction.html. [Accessed: 13-Sep-2011].
[11] J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J.-M. Bruel, “RELAX: a language
to address uncertainty in self-adaptive systems requirement,” Requirements Engineering, vol. 15,
no. 2, pp. 177-196, Mar. 2010.
[12] Nadire Cavus & Dogan Ibrahim, “m-Learning: An experiment in using SMS to support
learning new English language words,” British Journal of Educational Technology, Volume 40
Issue 1, Pages 78 –91, Feb 2008.
[13] McConatha Douglas, Praul Matt and Lynch Michael J. “Mobile Learning in Higher
Education: An Empirical Assessment of a New Educational Tool,” Turkish Online Journal of
Educational Technology . vol.7,n3 article 2, Jul 2008.
[14] Quinn C. “M-Learning: Mobile , Wireless , In-Your-Pocket Learning,”
http://www.linezine.com/2.1/features/cqmmwiyp.htm ,2000.
[15] Kristiansen, T. “M-learning. Experiences from the use of WAP as a
supplementoinolearning,”http://www.nadenff.no/nadenff/konferanse/vettre02/TK010430%20Erf
aringsr apport.pdf, 2009.
[16] Chabra T. and Figueiredo J., “How To Design and Deploy And held Learning,”
ohttp://www.empoweringtechnologies.net/eLearning/eLearning_exPov5_files/frame.htm, 2002.
[17] A Dye, B E Solstad. “J A K Odingo. Mobile Educa-tion-A Glance atoTheoFuture,”o
http://www.nettskolen.com/forskning/mobile_education.pdf ,2009.
[18] Yuan Jiugen1, Xing Ruonan2, Wang Jianmin, Applying Research of Mobile Learning Mode
in Teaching. International Forum on Information Technology and Applications, 16-18 July 2010.
[19] Farooq, U, Schafer, W, Rosson, M.B and Caroll, J.M. M-Education: Bridging the Gap of
Mobile and Desktop Computing. Centre for Human-Computer Interaction and Department of
Computer Science. Virginia Polytechnic Institute and State University, pp. 1-2, 2002.
[20] Giuseppe Laria, Mobile and nomadic user in e-learning: the Akogrimo case, sixth
framework programme, Information Society, Fisciano, Italy, 2002.
[21] Devinder Singh & Zaitun A.B, Mobile Learning In Wireless Classrooms, Malaysian Online
Journal of Instructional Technology (MOJIT) Vol. 3, No.2, pp 26-42, August 2006.
[22] Rashmi Padiadpu, Towards Mobile Learning: A SCORM Player for the Google Android
Platform Hamburg university of applied science, Master Thesis, Information Engineering, 2008.
[23] Cohen, A. Japan loves wireless. PC Magazine, Vol.21, No.18, p. 136. 2002.
[24] Thornton, P. & Houser, C. Using Mobile Phones in Education. IEEE International
Workshop on Wireless and Mobile Technologies in Education. 2004.
[25] Wains, S. I., & Mahmood, D. W. Integrating M-Learning with E-Learning. Cincinnati,
Ohio, USA. 2008.
[26] Parson D., Ryu H. and Cranshaw M. 2006, “A Study of Design Requirements for Mobile
Learning Environments”, Proceedings of the sixth International Conference on Advance
Learning Technologies.
[27] Sharma S. and Kitchens F. 2004, “Web Service Architecture for MLearning”, Electronic
Journal on E-Learning Volume 2 Issue 1.
[28] Barker A., Krull G. and Mallinson B. 2005, “A Proposed Theoretical Model for M-Learning
Adoption in Developing Countries”, 4th World Conference of M-Learning.
[29] Robert Yu-Liang Ting 2005, “Mobile Learning-Current Trend and Future Challenges”,
Proceedings of the fifth IEEE ICALT’05.
[30] Saipunidzam Mahamad, Mohammad Noor Ibrahim, Mohamad Izzriq Ab Malek Foad, and
Shakirah Mohd Taib. Open Source Implementation of M-Learning for Primary School in
Malaysia. International Journal of Human and Social Sciences 3:4 2008
[31] Barkhuus, L. and Dourish, P., 2004. Everyday encounters with context-aware computing in
a campus environment. Proceeding of the International Conference on Ubiquitous Computing,
Sept. 2004, Springer, Berlin/Heidelberg, pp: 232-249. DOI: 978-3-540- 22955-1
[32] Jihen, M., L. Mona, D. Alain and H.B. Ghezala, 2007. A context aware mobile and
collaborative learning scenario. IEEE Multidiscip. Engineering Educ. Mag., 2: 65-69.
[33] Houser, C. and P. Thornton, 2005. Poodle a course management system for mobile phones.
Proceedings of the IEEE International Workshop on Wireless and Mobile Technologies in
Education, Nov. 2005, IEEE Computer Society, Japan, pp: 211-215. DOI:
10.1109/WMTE.2005.51.
AUTHORS
Dr. Mohamed Sarrab has Ph.D. in Computer Science from De Montfort
University 2011. He received his B.Sc. in computer science from 7th April
University Libya and also received M.Sc in Computer Science from VSB
Technical University of Ostrava Czech Republic. His main research
interests are Mobile Applications, M-learning, Computer security, Runtime
Verification, Computer forensic.
Eng. Laila Elgamel has M.Sc. in Software Engineering from De Montfort University 2011. She
received her B.Sc. in computer science from 7th April University Libya a. Her main research
interests are Mobile Applications, M-learning, Software Engineering.
Eng. Hamza Aldabbas has M.Sc in computer science from Al-Balqa’a
Applied University-Jordan. And B.Sc. in Computer Information System
from the same university. His research interests are Human-computer
interaction, E-commerce, E-government and M-Learning.
Citation Count – 149
SURVEY ON QOEQOS CORRELATION MODELS FORMULTIMEDIA SERVICES
Mohammed Alreshoodi1
and John Woods2
1
School of Computer Science and Electronic Engineering, University of Essex, UK
2
School of Computer Science and Electronic Engineering, University of Essex, UK
ABSTRACT
This paper presents a brief review of some existing correlation models which attempt to map
Quality of Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS
refers to deterministic network behaviour, so that data can be transported with a minimum of
packet loss, delay and maximum bandwidth. QoE is a subjective measure that involves human
dimensions; it ties together user perception, expectations, and experience of the application and
network performance. The Holy Grail of subjective measurement is to predict it from the
objective measurements; in other words predict QoE from a given set of QoS parameters or vice
versa. Whilst there are many quality models for multimedia, most of them are only partial
solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the
QoS/QoE mapping.
KEYWORDS
QoE, QoS, Perceived Quality, Quality Metrics.
For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
REFERENCES
[1] Nokia white paper, (2004), “Quality of Experience (QoE) of mobile services: Can it be
measured and improved?”
[2] Edson Gallo, Mario Siller, &John Woods, (2007), “An Ontology for the Quality of
Experience Framework”, IEEE International Conference on Systems, Montreal Canada
[3] Bauer, B., & Patrick, A. S. (2004). “A Human Factors Extension to the Seven-Layer OSI
Reference Model”
[4] Lopez, D., Gonzalez, F., Bellido, L., & Alonso, A. (2006). “Adaptive multimedia streaming
over IP based on customer oriented metrics”, [Conference Paper], Proceedings of ISCN'06 7th
International Symposium on Computer Networks.
[5] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, &W. Weiss, (1998)“An architecture for
differentiated services”. Internet Standards Track RFC 2475, IETF.
[6] Braden, R., Clark, D., &Shenker, S., (1994) “Integrated Services in the Internet Architecture:
an Overview”, RFC 1633.
[7] E. Rosen, A. Viswanathan, &R. Callon, (2001) “Multiprotocol Label Switching Architecture
(MPLS)”, IETF RFC 3031.
[8] M. Fiedler, T. Hossfeld, &P. Tran-Gia, (2010) “A generic quantitative relationship between
quality of experience and quality of service”, IEEE Network, vol. 24, no. 2, pp. 36–41.
[9] ITU-T Recommendation, (2003) “ITU-T Rec. P.800.1: Mean Opinion Score (MOS)
Terminology”.
[10] S. Winkler, (2007) “Video Quality and Beyond, Symmetricom”.
[11] Kalpana Seshadrinathan, Rajiv Soundararajan, Alan C. Bovik, &Lawrence K. Cormack,
(2009) “Study of Subjective and Objective Quality Assessment of Video”, IEEE
TRANSACTIONS ON IMAGE PROCESSING.
[12] O. Nemethova, M. Ries, E. Siffel, &M. Rupp, (2004) “Quality Assessment for H.264 Coded
Low-rate Low-resolution Video Sequences”, Proc. of Conference on Internet and Information
Technologies.
[13] Z. Wang, A. C. Bovik, H. R. Sheikh, &E. P. Simoncelli, (2004 ) “Image quality assessment:
From error visibility to structural similarity,” IEEE Transactions on Image Processing.
[14] ANSI T1.801.03 Standard, (2003) “Digital Transport of One-Way Video Signals -
Parameters for Objective Performance Assessment”.
[15] ITU-T Recommendation, “ITU-T Rec. P.862.1: Mapping function for transforming P.862
raw result scores to MOS-LQO,” 2003.
[16] Brooks, P., & Hestnes, B. (2010). “User measures of quality of experience: Why being
objective and quantitative is important”. IEEE Network, 24(2), 8–13.
[17] A. Takahashi, D. Hands, &V. Barriac, (2008) “Standardization activities in the ITU for a
QoE assessment of IPTV”, Communications Magazine, IEEE, vol. 46, pp. 78-84.
[18] Jari Korhonen, Nino Burini, Junyong You, and Ehsan Nadernejad, (2012) “HOW TO
EVALUATE OBJECTIVE VIDEO QUALITY METRICS RELIABLY”, QoMEX IEEE
[19] S. Khirman &P. Henriksen, (2002) “Relationship between quality-of-service and quality-
ofexperience for public internet service,” in Workshop on Passive and Active Measurement,
USA.
[20] Mark Carson, &Darrin Santay, (2003), “NIST Net – A Linux-based Network Emulation
Tool”, National Institute of Standards and Technology (NIST). (http://snad.ncsl.nist.gov/nistnet/)
[21] H. J. Kim &S. G. Choi, (2010) “A study on a QoS/QoE correlation model for QoE
evaluation on IPTV service,” in Proceedings of the 12th International Conference on Advanced
Communication Technology (ICACT ’10), pp. 1377–1382.
[22] H. Koumaras, C-H. Lin, C-K. Shieh, &A. Kourtis, (2009) “A Framework for End-to-End
Video Quality Prediction of MPEG Video”, J. Vis. Commun. Image R, doi:
10.1016/j.jvcir.2009.07.005
[23] Ricky K. P. Mok, Edmond W. W. Chan, &Rocky K. C. Chang, (2011) “Measuring the
Quality of Experience of HTTP Video Streaming”, 12th IFIP/IEEE 1M.
[24] Tianyi Wang, Anjum Pervez2, &Hua Zou1, (2010) “VQM-BASED QOS/QOE MAPPING
FOR STREAMING VIDEO”.
[25] M.H. Pinson, &S.Wolf, (2004) “A New Standardized Method for Objectively Measuring
Video Quality”, IEEE Transactions on Broadcasting, Vol. 50, pp. 312-322.
[26] NTIA General Model (aka VQM) and Full Reference Calibration Standards,
[http://www.its.bldrdoc.gov]
[27] IstOpt (First Optimization), 7D-Soft High Technology Inc. Available:
http://www.7dsoft.comlcnlindex.htm
[28] P. Ramos, J. Salmerón, R. Leal, &F. Vidal, (2012) “Estimating Perceived Video Quality
from Objective Parameters in Video over IP Services”, Copyright (c) IARIA, ISBN: 978-1-
61208-193-9
[29] F. Agboma &A. Liotta, (2008) “QoE-aware QoS management,” in Proceedings of the 6th
International Conference on Advances in Mobile Computing and Multimedia, pp. 111-116.
[30] G. T. Fechner, E. G. Boring, H. E. Adler, &D. H. Howes, (1966) “Elements of
psychophysics “, New York :: Holt, Rinehart and Winston.
[31] W. R. Klecka, (1980) “Discriminant analysis”. SAGE.
[32] Muslim Elkotob, Daniel Granlund, Karl Andersson &Christer Åhlund, (2010) “Multimedia
QoE optimized management using prediction and statistical learning”. LCN: 324-327
[33] V. Menkovski, A. Oredope, A. Liotta, &A. Cuadra Sánchez, “Predicting Quality of
Experience in Multimedia Streaming,” in Proceedings of the 7th International Conference on
Advances in Mobile Computing and Multimedia, pp. 52-59, 2009.
[34] J. Quinlan, (1986) “Induction of Decision Trees,” Machine Learning, vol. 1, no. 1, pp. 81-
106.
[35] A. J. Smola &B. Schölkopf, (2004) “A tutorial on support vector regression,” Statistics and
Computing, vol. 14, no. 3, pp. 199–222.
[36] R. Kohavi, (1995) “A study of cross-validation and bootstrap for accuracy estimation and
model selection”, in International Joint Conference on Artificial Intelligence, vol. 14, pp. 1137-
1145.
[37] V. Machado, C. Oliveira , A. Marcelino, S. Carlos, N. Vijaykumar, &C. Hirata, (2011) “A
New Proposal to Provide Estimation of QoS and QoE over WiMAX Networks”, 978-1-4673-
0279-1©IEEE
[38] Mushtaq, M.S., Augustin, B., &Mellouk, A., (2012) "Empirical study based on machine
learning approach to assess the QoS/QoE correlation", Networks and Optical Communications
(NOC), 17th
European Conference on, on page(s): 1 – 7
[39] Haiqing Du, Chang Guo, Yixi Liu& Yong Liu,(2009)“Research on Relationships between
QoE and QoS based on BP Neural Network”, In: Proceedings of IC-NIDC 2009, pp. 312-315.
[40] Pablo Frank &José Incera, (2006)“A neural network based test bed for evaluating the
quality of video streams in IP networks”, 0-7695-2569-5/06 © IEEE, Proceedings of the
Electronics, Robotics and Automotive Mechanics Conference (CERMA'06)
[41] P. Calyam, P. Chandrasekaran, G. Trueb, N. Howes, R. Ramnath, D. Yu, Y. Liu, L. Xiong,
&D. Yang, (2012) “Multi-ResolutionMultimedia QoEModels for IPTV Applications”, Volume
2012, Article ID 904072, 13 pages doi:10.1155//904072
[42] A. Khan, L. Sun, E. Ifeachor, J. Fajardo, F. Liberal &H. Koumaras, (2010) “Video Quality
Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks”,
International Journal of Digital Multimedia Broadcasting.
[43] J.-S. R. Jang, (1993) “ANFIS: adaptive-network-based fuzzy inference system,” IEEE
Transactions on Systems, Man and Cybernetics, vol. 23, no. 3, pp. 665–685.
[44] T. Malinovski, T. Vasileva-Stojanovska, &V.Trajkovik, (2011)“Quality-of-Experience
Perception for VideoStreaming Services: Preliminary Subjective andObjective Results,
International Journal of Research and Reviews in Next Generation Networks (IJRRNGN) Vol. 1.
[45] T. Hoßfeld, R. Schatz, M. Seufert, M. Hirth, T. Zinner, &P. Tran-Gia, (2011)
“Quantification of YouTube QoE via Crowdsourcing,” in IEEE International Workshop on
Multimedia Quality of Experience - Modeling, Evaluation, and Directions (MQoE), Dana Point,
CA, USA.
[46] M. Hirth, T. Hoßfeld, &P. Tran-Gia, (2011) “Anatomy of a crowdsourcing platform - using
the example of microworkers.com,” in Workshop on Future Internet and Next Generation
Networks, Seoul, Korea.
[47] T. Hoßfeld, R. Schatz, &S. Egger, (2011) “SOS: The MOS is not enough!” in QoMEX,
Mechelen, Belgium.
[48] M. Siller &J. Woods, (2003) “Improving Quality of Experience for Multimedia Services by
QoS arbitration on a QoE Framework,” in IEEE Packet Video, Nantes.
[49] Watson, A. &Sasse, M.A., (1998) “Measuring Perceived Quality of Speech and Video in
Multimedia Conferencing Applications”, Proceedings of ACM Multimedia. Bristol, UK, pp 55-
60.
[50] B. Han, X. Zhang, Y. Qi, Y. Gao &D. Yang, (2012) “QoE Model Based Optimization for
Streaming Media Service Considering Equipment and Environment Factors”, Wireless Pers
Commun.
[51] Khalil UrRehmanLaghari, Imran Khan&Noel Crespi, (2012) “Quantitative and Qualitative
Assessment of QoE for Multimedia Services in Wireless Environment”, MoVid’12, North
Carolina, USA
[52] Pawlak, Z., Grzymala–Busse, J.W., Slowiriski, R. & Ziarko, W, (1995) “Rough Sets”,
Comm of the ACM. vol.38 (11). pp. 88— 95.
[53] Le Callet P, MöllerS&Perkis A. (eds). (2012) Qualinet White paper on Definitions of
Quality of Experience (QoE).
[54] Skorin-Kapov L & Varela M, (2012) “A Multi-Dimensional View of QoE: the ARCU
Model”, Proceedings of the 35th Jubilee International Convention on Information and
Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.
[55] Kestutis Mintauckis, (2010) “Empirical studies of Quality of Experience (QoE) – A
Systematic Literature Survey”, Master of Science Thesis in computer science, University of
Oslo.
[56] Schwarz, H. Marpe, D. &Wiegand, T. (2007) “Overview of the Scalable Video Coding
Extension of the H.264/AVC Standard”, IEEE Trans. Circuits Syst. Video Technol.,vol. 17, No.
9, pp. 1103- 1120.
[57] Jain, R, (2004) “Quality of Experience”. IEEE Multimedia, Vol. 11(1), 96-97.
Citation Count – 97
EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING
V.Ramya1
, B. Palaniappan2
1
Assistant Professor, Department of CSE, Annamalai University, Chidambaram, India.
2
Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India.
ABSTRACT
Safety plays a major role in today’s world and it is necessary that good safety systems are to be
implemented in places of education and work. This work modifies the existing safety model
installed in industries and this system also be used in homes and offices. The main objective of
the work is designing microcontroller based toxic gas detecting and alerting system. The
hazardous gases like LPG and propane were sensed and displayed each and every second in the
LCD display. If these gases exceed the normal level then an alarm is generated immediately and
also an alert message (SMS) is sent to the authorized person through the GSM. The advantage
of this automated detection and alerting system over the manual method is that it offers quick
response time and accurate detection of an emergency and in turn leading faster diffusion of the
critical situation.
KEYWORDS
Air pollution Monitoring, gas sensors, GSM module, wireless networks.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE,
“A Mobile GPRS-sensors array for Air Pollution Monitoring” vol.6, pp.410-422,
Oct.2010.
[2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An
Environment Air Pollution Monitoring System Based on the IEEE1451 Standard for Low
Cost Requirements” IEEE Sensors J., Vol. 8, pp.415-422, Apr. 2008.
[3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air
Pollution mapper for cities”, in Proc. IEEE Innovations in Information Technology Conf.,
Dubai, UAE, Nov.2006, pp.1-5.
[4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring
system based on geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing
Symp., 2008, vol. 3, pp. 1370-1373.
[5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh
network based on Embedded System”, in proc. 5th IEEE Int. Symp. Embedded
Computing, 2008, pp. 174-179.
[6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring
system Using ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf.
Convergence Information Technology, 2007, pp.1024-1031.
[7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor
System Based on Wireless Sensor Network”, Journal of Xihua University, Natural
Science, Vol. 26, no.4, pp. 44-46 ,2007.
[8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J.
Gandolf, and N. j. Tao, “A wearable and wireless sensor system for real-time monitoring
of toxic environmental volatile organic compounds”, IEEE sensors, J., vol. 9, pp. 1734-
1740, Dec.2009.
[9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module
for Room Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009.
[10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-
Graw Hill.
[11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring
system based on the IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J.,
Vol, 8, pp. 415-422, Apr, 2008.
[12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring
system based on geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing
Symp., 2008, vol, 3, pp.1370-1373.
Citation Count – 82
DATA MINING SYSTEM AND APPLICATIONS: A REVIEW
Mr. S. P. Deshpande1
and Dr. V. M. Thakare2
1
Department of MCA, D.C.P.E, H.V.P.Mandal Amravati, India
2
Post Graduate Deptt. of Computer Science,SGB, Amravati University, Amravati, India
ABSTRACT
In the Information Technology era information plays vital role in every sphere of the
human life. It is very important to gather data from different data sources, store and
maintain the data, generate information, generate knowledge and disseminate data,
information and knowledge to every stakeholder. Due to vast use of computers and
electronics devices and tremendous growth in computing power and storage capacity,
there is explosive growth in data collection. The storing of the data in data warehouse
enables entire enterprise to access a reliable current database. To analyze this vast amount
of data and drawing fruitful conclusions and inferences it needs the special tools called
data mining tools. This paper gives overview of the data mining systems and some of its
applications.
KEYWORDS
Data mining system architecture, Data mining application
For More Details : http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf
Volume Link : http://airccse.org/journal/ijdps/curissue.html
REFERENCES
[1]Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-
892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.),
1999.
[2]Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”,
ISBN 0-471-66657-2, John Wiley & Sons, Inc, 2005.
[3]Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”,
Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006.
[4].Chapman, P., Clinton, J., Kerber, R., Khabaza, T.,Reinartz, T., Shearer, C. and Wirth,
R.. “CRISP-DM 1.0 : Step-by-step data mining guide, NCR Systems Engineering
Copenhagen (USA and Denmark), DaimlerChrysler AG (Germany), SPSS Inc. (USA) and
OHRA Verzekeringenen Bank Group B.V (The Netherlands), 2000”.
[5]. Fayyad, U., Piatetsky-Shapiro, G., and Smyth P., “From Data Mining to Knowledge
Discovery in Databases,” AI Magazine, American Association for Artificial Intelligence,
1996.
[6]. Tan Pang-Ning, Steinbach, M., Vipin Kumar. “Introduction to Data Mining”, Pearson
Education, New Delhi, ISBN: 978-81-317-1472-0, 3rd Edition, 2009.
[7]. Bernstein, A. and Provost, F., “An Intelligent Assistant for the Knowledge Discovery
Process”, Working Paper of the Center for Digital Economy Research, New York
University and also presented at the IJCAI 2001 Workshop on Wrappers for Performance
Enhancement in Knowledge Discovery in Databases.
[8]. Baazaoui, Z., H., Faiz, S., and Ben Ghezala, H., “A Framework for Data Mining
Based Multi-Agent: An Application to Spatial Data, volume 5, ISSN 1307-6884,”
Proceedings of World Academy of Science, Engineering and Technology, April 2005.
[9]. Rantzau, R. and Schwarz, H., “A Multi-Tier Architecture for High-Performance Data
Mining, A Technical Project Report of ESPRIT project, The consortium of CRITIKAL
project, Attar Software Ltd. (UK), Gehe AG (Denmark); Lloyds TSB Group (UK),
Parallel Applications Centre, University of Southampton (UK), BWI, University of
Stuttgart (Denmark), IPVR, University of Stuttgart (Denmark)”.
[10]. Botia, J. A., Garijo, M. y Velasco, J. R., Skarmeta, A. F., “A Generic Data mining
System basic design and implementation guidelines”, A Technical Project Report of
CYCYT project of Spanish Government. 1998. Web Site:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1935
[11] Campos, M. M., Stengard, P. J., Boriana, L. M., “Data-Centric Automated Data
Mining”, , Web Site.:
www.oracle.com/technology/products/bi/odm/pdf/automated_data_mining_paper_1205.p
df
[12].Sirgo, J., Lopez, A., Janez, R., Blanco, R., Abajo, N., Tarrio, M., Perez, R., “A Data
Mining Engine based on Internet, Emerging Technologies and Factory Automation,”
Proceedings ETFA '03, IEEE Conference, 16-19 Sept. 2003. Web Site :
www.citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8955
[13] Bianca V. D.,Philippe Boula de Mareüil and Martine Adda-Decker, “Identification of
foreign-accented French using data mining techniques, Computer Sciences Laboratory for
Mechanics and Engineering Sciences (LIMSI)”. Web Site :
www.limsi.fr/Individu/bianca/article/Vieru&Boula&Madda_ParaLing07.pdf
[14]Halteren, H. van, “Linguistic Profiling for Author Recognition and Verification”,
Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics
USA, Barcelona, Spain, Article No. 199, Year of Publication: 2004.
[15]. Halteren, H. V., Oostdijk N., “Linguistic profiling of texts for the purpose of
language verification, The ILK research group, Tilburg centre for Creative Computing and
the Department of Communication and Information Sciences of the Faculty of
Humanities, Tilburg University, The Netherlands.” WebSite:
www.ilk.uvt.nl/~antalb/textmining/LingProfColingDef.pdf
[16]. Antonie, M. L., Zaiane, O. R.,Coman, A., “Application of Data Mining Techniques
for Medical Image Classification”, Proceedings of the Second International Workshop on
Multimedia Data Mining (MDM/KDD 2001) in conjunction with ACM SIGKDD
conference, San Francisco, August 26, 2001.
[17].Kusiak, A., Kernstine, K.H., Kern, J.A., McLaughlin, K.A., and Tseng, T.L., “Data
Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial
Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000.
[18].Luis, R., Redol, J., Simoes, D., Horta, N., “Data Warehousing and Data Mining
System Applied to ELearning, Proceedings of the II International Conference on
Multimedia and Information & Communication Technologies in Education, Badajoz,
Spain, December 3-6th 2003.
[19].Chen, H., Chung, W., Qin, Y., Chau, M., Xu, J. J., Wang, G., Zheng, R., Atabakhsh,
H., “Crime Data Mining: An Overview and Case Studies”, A project under NSF Digital
Government Programme, USA, “COPLINK Center: Information and Knowledge
Management for Law Enforcement,”, July 2000 – June 2003.
[20].Kay, J., Maisonneuve, N., Yacef, K., Zaiane O., “Mining patterns of events in
students’ teamwork data”, Proceedings of the ITS (Intelligent Tutoring Systems) 2006
Workshop on Educational Data Mining, pages 45-52, Jhongli, Taiwan, 2006.
[21]Rao, R. B., Krishnan, S. and Niculescu, R. S., “Data Mining for Improved Cardiac
Care” , SIGKDD Explorations Volume 8, Issue 1.
[22]Ghani, R., Probst, K., Liu, Y., Krema, M., Fano, A., “Text Mining for Product
Attribute Extraction”, SIGKDD Explorations Volume 8, Issue 1.
[23]DeBarr, D., Eyler-Walker, Z., “Closing the Gap: Automated Screening of Tax Returns
to Identify Egregious Tax Shelters”. SIGKDD Explorations Volume 8, Issue 1.
[24]Kanellopoulos, Y., Dimopulos, T., Tjortjis, C., Makris, C. “Mining Source Code
Elements for Comprehending Object-Oriented Systems and Evaluating Their
Maintainability”, SIGKDD Explorations Volume 8, Issue 1.
[25]Schultz, M. G., Eskin, Eleazar, Zadok, Erez, and Stolfo, Salvatore, J., “Data Mining
Methods for Detection of New Malicious Executables”. Proceedings of the 2001 IEEE
Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA ,
ISSN:1081-6011, 2001.
[26] Cai, W. and Li L., “Anomaly Detection using TCP Header Information, STAT753
Class Project Paper, May 2004.”. Web
Site:http://www.scs.gmu.edu/~wcai/stat753/stat753report.pdf
[27].Nandi, T., Rao, C. B. and Ramchandran, S., “Comparative genomics using data
mining tools, Journal of Bio-Science, Indian Academy of Sciences, Vol. 27,No. 1, Suppl.
1, page No. 15-25, February 2002”.
[28]Khreisat, L., “Arabic Text Classification Using N-Gram Frequency Statistics A
Comparative Study”. Proceedings of The 2006 International Conference on Data Mining,
DMIN'06, pp 78-82, Las Vegas, Nevada, USA, June 26-29, 2006.
[29] Onkamo, P. and Toivonen, H., “A survey of data mining methods for linkage dis-
equilibrium mapping”, Henry Stewart Publications 1473 – 9542. Human Genomics. VOL
2, NO 5, Page No. 336–340, MARCH 2006.
[30] Smith, L., Lipscomb, B., and Simkins, A., “Data Mining in Sports: Predicting Cy
Young Award Winners”. Journal of Computer Science, Vol. 22, Page No. 115-121,April
2007.
[31]Deng, B., Liu, X., “Data Mining in Quality Improvement”. Proceedings of the
Twenty-Seventh Annual SAS Users Group International Conference 2002 by SAS
Institute Inc., Cary, NC, USA. ISBN 1-59047-061- 3. Web Site
:http://www2.sas.com/proceedings/sugi27/Proceed27.pdf
[32]Cohen, J. J., Olivia, C., Rud, P., “Data Mining of Market Knowledge in The
Pharmaceutical Industry”. Proceeding of 13th Annual Conference of North-East SAS
Users Group Inc., NESUG2000, Philadelphia Pennsilvania, September 24-26 2000.
[33]Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O., “Using Data Mining
Techniques for Detecting Terror-Related Activities on the Web”. Web Site:
www.ise.bgu.ac.il/faculty/mlast/papers/JIW_Paper.pdf
[34] Solieman, O. K., “Data Mining in Sports: A Research Overview, A Technical Report,
MIS Masters Project, August 2006”. Web Site:
http://ai.arizona.edu/hchen/chencourse/Osama-DM_in_Sports.pdf
[35] Maciag, T., Hepting, D. H., Slezak, D., Hilderman, R. J., “Mining Associations for
Interface Design”. Lecture Notes in Computer Science, Springer Berlin / Heidelberg,
Volume 4481, pp. 109-117, June 26, 2007.
[36]Foster, D. P. and Stine, R. A., “Variable Selection in Data Mining: Building a
Predictive Model for Bankruptcy”. Journal of the American Statistical Association,
Alexandria, VA, ETATS-UNIS, vol. 99, ISSN 0162-1459, pp. 303-313 January 15, 2004
[37]Kraft, M. R., Desouza, K. C., Androwich, I., “Data Mining in Healthcare Information
Systems: Case Study of a Veterans’ Administration Spinal Cord Injury Population”. IEEE,
Proceedings of the 36th
Hawaii International Conference on System Sciences, 0-7695-
1874-5/03, 2002.
[38]Kusiak, A., Kernstine, K. H., Kern, J. A., McLaughlin, K. A., and Tseng, T. L., “Data
Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial
Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000.
[39]Ansari, S., Kohavi, R., Mason, L., and Zheng, Z., “Integrating E-Commerce and Data
Mining: Architecture and Challenges”. Proceedings of IEEE International Conference on
Data Mining, 2001.
[40] Jadhav, S. R., and Kumbargoudar, P., “Multimedia Data Mining in Digital Libraries:
Standards and Features”.Proceedings of conference Recent advances in Information
Science and Technology READIT – 2007, pp 54-59, Organized by Madras Library
Association - Kalpakkam Chapter & Scintific information Resource Division, Indira
Gandhi Center for Atomic research, Department of Atomic Energy, Kalpakkam,
Tamilnadu,India. 12-13 July 2007.
[41]Anjewierden, A., Koll¨offel, B., and Hulshof C., “Towards educational data mining:
Using data mining methods for automated chat analysis to understand and support inquiry
learning processes”. International Workshop on Applying Data Mining in e-Learning,
ADML'07, Vol-305, Page No 23-32, Sissi, Lassithi - Crete Greece, 18 September, 2007.
[42]Romero, C., Ventura, S. and De-Bra, P. “Knowledge Discovery with Genetic
Programming for Providing Feedback to Courseware Authors, Kluwer Academic
Publishers, Printed in the Netherlands, 30/08/2004”.
[43]Chen, H., Chung, W., Xu Jennifer, J., Wang, G., Qin, Y., Chau, M., “Crime Data
Mining: A General Framework and Some Examples”. Technical Report, Published by the
IEEE Computer Society, 0018-9162/04, pp 50-56, April 2004.
[44]Chodavarapu Y., “Using data-mining for effective (optimal) sports squad selections”.
Web Site: http://insightory.com/view/74//using_data-
mining_for_effective_(optimal)_sports_squad_selections
[45]Jensen, Christian, S., “Introduction to Temporal Database Research,” Web site:
http://www.cs.aau.dk/~csj/Thesis/pdf/chapter1.pdf
[46]Vajirkar, P., Singh, S., and Lee, Y., “Context-Aware Data Mining Framework for
Wireless Medical Application”. Lecture Notes in Computer Science (LNCS), Volume
2736, Springer-Verlag. ISBN 3-540-40806-1, pp. 381 – 391.
Citation Count – 78
PERFORMANCE ANALYSIS OF AODV, DSDV AND DSR IN MANETS
Akshai Aggarwal1
, Savita Gandhi2
, Nirbhay Chaubey3
1
Gujarat Technological University, Ahmedabad, Gujarat, India
2
Department of Computer Science, Gujarat University, Ahmedabad, Gujarat, India
3
Department of Computer Science, Institute of Science and Technology for Advanced Studies
and Research, Vallabh Vidyanagar, Gujarat, India
ABSTRACT
Mobile Ad hoc Networks (MANETs) are considered as a new paradigm of infrastructure-less
mobile wireless communication systems. MANETs are being widely studied and it is the
technology that is attracting a large variety of applications. Routing in MANETs is considered a
challenging task due to the unpredictable changes in the network topology, resulting from the
random and frequent movement of the nodes and due to the absence of any centralized control
[1][2]. In this paper, we evaluate the performance of reactive routing protocols, Ad hoc On
demand Distance Vector (AODV) and Dynamic Source Routing (DSR) and proactive routing
protocol Destination Sequenced Distance Vector (DSDV). The major goal of this study is to
analyze the performance of well known MANETs routing protocol in high mobility case under
low, medium and high density scenario. Unlike military applications, most of the other
applications of MANETs require moderate to high mobility. Hence it becomes important to
study the impact of high mobility on the performance of these routing protocols. The
performance is analyzed with respect to Average End-to-End Delay, Normalized Routing Load
(NRL), Packet Delivery Fraction (PDF) and Throughput. Simulation results verify that AODV
gives better performance as compared to DSR and DSDV.
KEYWORDS
MANETs, Routing Protocols, AODV, DSDV, DSR, NS-2.
For More Details : http://airccse.org/journal/ijdps/papers/1111ijdps15.pdf
Volume Link : http://airccse.org/journal/ijdps/current2011.html
REFERENCES
[1] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “A Study of Secure Routing
Protocol in Mobile Ad hoc Networks” in Proceedings of National Conferences on
Advancement in Wireless Technology and Applications, 18-19 December 2008, SVNIT,
Surat, India.
[2] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “Key Management
Consideration in MANETs” in Proceedings of National Conference on Cryptography and
Network Security (NCCNS),18-19 February 2009, VIT Unviersity, Vellore, India.
[3] Charles E. Perkins, Ad Hoc Networking, Addison-Wesley, March 2005.
[4] Charles E. Perkins and Pravin Bhagwat, “Highly Dynamic destination-sequenced
distance-vector routing (DSDV) for mobile computers . 1994.
[5] C. Perkins, E Royer and S. Das “Ad hoc On-demand Distance Vector (AODV)
Routing,” RFC 3561 , July 2003.
[6] David B. Johnson, David A. Maltz “Dynamic Source Routing in Ad Hoc Wireless
Networks, Mobile Computing, Thomasz Imielinski and Hank Korth (Editors) ,” Vol. 353,
Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
[7] NS-2 Network simulator http://www.isi.edu/nsnam/ns
[8] Chenna R. Chandrasekhar P., Reddy P “Performance Analysis of Adhoc Network
Routing Protocols, ISAUHC 2006 pp. 186-187
[9] Talooki, Ziarati VNK “Performance Comparison of Routing Protocols for Mobile Ad-
hoc Networks, APCC 2005 pp 1-5
[10] Lakshmikanth, Gaiwak G, Vyavahare MA,” Simulation based comparative
performance analysis of Adhoc routing protocols TENCON- 2008 pp 1-5
[11] Mahdipou E, Aminian E, Torabi M, Zare M “ CBR Performance Evaluation over
AODV and DSDV in RW Mobility Model, ICCAE 2009 pp 238-242.
[12] R. Misra, C. R. Manda (2005) “Performance Comparison of AODV/DSR On-
Demand Routing Protocols for Ad Hoc Networks in Constrained Situation”, IEEE
ICPWC 2005.
[13] S. R. Das, C. E. Perkins and E. M. Royer (2000), “Performance comparison of Two
On-Demand Routing protocols for Ad hoc Networks”, In Proc. of INFOCOM 2000, Tel
Aviv, Israel, March 2000.
[14] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns”.
http://www.isi.edu/nsnam/ns/tutorial/
[15] Network Simulator - 2 (NS-2) http://mohit.ueuo.com/NS-2.html
AUTHORS
Akshai Aggarwal (MIEEE’1966, SMIEEE’1992) is working as
Vice Chancellor, Gujarat Technological University, Ahmedabad,
India. Before joining as the Vice-Chancellor, he was working as
the Director of School of Computer Science, University of
Windsor, Canada. He worked as Professor and Head of
Department of Compu ter Science at Gujarat University for about
10 years. Before that he was Professor and Head, Department of
EE at M.S.University of Baroda. He was Chairman of IEEE India Council for two years.
He initiated IEEE activities in Gujarat by starting the first IEEE Student Branch at
M.S.University of Baroda. Later he initiated the establishment of the Student Branch at
Gujarat University. He was also the founder Chairman of IEEE Gujarat Section, the IEEE
Computer Society Chapter and the IEEE Joint Chapter of Industry Applications, Industrial
Electronics and Power Electronics. The Section conducted two International Conferences
and one national Seminar during his Chairmanship. He graduated with a B.Sc.(EE) from
Punjab Engg College and studied at MS University of Baroda for his Master’s and
Doctoral work.
Savita Gandhi (MIEEE’ 2003 SMIEEE’ 2005) is Professor &
Head at the Department of Computer Science, Gujarat University
and Joint Director, K.S. School of Business Management, Gujarat
University. She is with Gujarat University for about 20 years.
Before that she has worked with M.S. University of Baroda,
Department of Mathematics for about 10 years. She has been
actively associated with IEEE activities at Gujarat Section. She is M.Sc. (Mathematics),
Ph.D (Mathematics) and A.A.S.I.(Associate Member of Actuarial Society of India by the
virtue of having completed the "A" group examinations comprising six subjects conducted
by Institute of Actuaries , London). She was awarded Gold Medal for standing first class
first securing 93% marks in M.Sc. and several prizes at M.Sc. as well as B.Sc.
Examinations for obtaining highest marks.
Nirbhay Chaubey (SIEEE’ 2002 MIEEE’ 2004) is working as an
Assistant Professor of Computer Science at Institute of Science and
Technology for Advanced Studies and Research, Vallabh
Vidyanagar, Gujarat, India. Currently, he is pursuing Ph.D in
Computer Science at Department of Computer Science, Gujarat
University, Ahmedabad, India. He has been involved in IEEE
activities since 1994. His position held for IEEE Gujarat Section include Executive
Secretary (1998-2005), Treasurer (2005-2006), Secretary and Treasurer (2007) and
Treasurer for year 2008 onwards. He graduated from Ranchi Unviersity, Ranchi, and
Master in Computer Applications from Madurai Kamraj University, Madurai, India of
Baroda for his Master’s and Doctoral work.
Citation Count – 74
A REVIEW ON ROUTING PROTOCOLS FOR APPLICATION IN WIRELESS SENSOR
NETWORKS
Neha Rathi1
, Jyoti Saraswat2
and Partha Pratim Bhattacharya3
Department of Electronics and Communication Engineering Faculty of Engineering and
Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh,
Dist. Sikar, Rajasthan, Pin – 332311, India
ABSTRACT
Wireless sensor networks are harshly restricted by storage capacity, energy and computing
power. So it is essential to design effective and energy aware protocol in order to enhance the
network lifetime. In this paper, a review on routing protocol in WSNs is carried out which are
classified as data-centric, hierarchical and location based depending on the network structure.
Then some of the multipath routing protocols which are widely used in WSNs to improve
network performance are also discussed. Advantages and disadvantages of each routing
algorithm are discussed thereafter. Furthermore, this paper compares and summarizes the
performances of routing protocols.
KEYWORDS
Wireless sensor networks, nodes, energy-aware routing, routing protocols, network structure
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] WintYe Poe and Jens B. Schmitt, “Node Deployment in Large Wireless Sensor
Networks: Coverage, Energy consumption, and Worst–Case Delay”, Proceeding
AINTEC’09 Asian internet engineering college, pp. 77-84.
[2] Eunil Park and Kwangsu Cho, (2010) “Energy Efficient and Reliable Geographic
Routing in Wireless Sensor Networks”, World Academy of Science, Engineering and
Technology 37.
[3] John A. Stankovic, “Wireless Sensor Networks”, computer, vol. 41, pp. 92-95, Oct.
2008.
[4] Rajashree.V.Biradar, V. C. Patil,Dr. S. R. Sawan andDr. R. R. Mudholkar,
“Classification and Comparison of Routing Protocols in Wireless Sensor Networks”,
UbiCCJournal,Vol. 4.
[5] Jason Lester Hill and David E. Culler, (2003) “System Architecture for Wireless
Sensor Networks”, Proceedings of the Doctoral Dissertation System architecture for
wireless sensor networks.
[6] Jamal, N.Al-Karaki and Ahmed E. Kamal, “Routing techniques in wireless sensor
networks: a survey”, Wireless Communications, IEEE, vol. 11, pp. 6-28, Dec. 2004.
[7] Jim Farmer, “Managing Secure Data Delivery: A Data Roundhouse Model”, August.
2001.
[8] S. Muthukarpagam, V. Niveditta andNedunchelivan, (2010) “Design issues, Topology
issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research
Challenges”, IJCA Journal.
[9] Luis Javier GarcíaVillalba and Ana Lucila Sandoval Orozco, “Routing Protocols in
Wireless Sensor Networks”, October 2009.
[10] Sidra Aslam, Farrah Farooq and ShahzadSarwar, (2009) “Power Consumption in
Wireless Sensor Networks”, Proceedings of the 7th International Conference on Frontiers
of Information Technology.
[11] Nandini .S.Patil and P. R. Patil, “Data Aggregation in Wireless Sensor Network”,
IEEE International Conference on Computational Intelligence and Computing Research,
2010.
[12] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive Protocols
for Information Dissemination in Wireless Sensor Networks”, Proceedings on the 5th
annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.
174-185.
[13] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and
Fabio Silva, “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM
Transactions on Networking (TON), vol. 11, pp. 2-16, February 2003.
[14] D. Braginsky, D. Estrin, “Rumor routing algorithm for sensor networks”,
Proceedings of the First Workshop on Sensor Networks and Applications (WSNA),
Atlanta, GA, pp. 22-31, October 2002.
[15] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in
Wireless Sensor Networks”, Proceedings of the First international conference on
Embedded Software and Systems, pp. 318-325.
[16] KonradIwanicki and Maarten Van Steen, “On Hierarchical Routing in Wireless
Sensor Networks”, in Proceedings of the 2009 International Conference on Information
Processing in Sensor Networks, pp. 133-144.
[17] Ankita Joshi &Lakshmi Priya.M, “A Survey of Hierarchical Routing Protocols in
Wireless Sensor Network”, MES Journal of Technology and Management, pp. 67 – 71.
[18] Kemal Akkaya and Mohamed Younis, (2005) “A Survey on Routing Protocols for
Wireless Sensor Networks”, Ad Hoc Networks, pp. 325-349.
[19] S. Lindsey and C.S. Raghavendra, “ PEGASIS: Power Efficient Gathering in Sensor
Information Systems”, Proceedings of the IEEE Aerospace Conference, Big Sky,
Montana, March 2002, vol. 3.
[20] AratiManjeshwar and Dharma P. Agrawal, “ TEEN: A Routing Protocol for
Enhanced Efficiency in Wireless Sensor Networks”, Parallel and Distributed Processing
Symposium, proceedings 15th
International, pp. 2009-2015, April. 2009.
[21] AratiManjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for
Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor
Networks” Parallel and Distributed Processing Symposium, proceedings International,
IPDPS 2002, Abstracts, and CD-ROM, pp. 195-202.
[22] Jyh-Huei Chang and Rong-Hong Jan, (2005) “An Energy-Aware, Cluster-Based
Routing Algorithm for Wireless Sensor Networks”, International Federation for
Information Processing, pp. 255- 266.
[23] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE
Journal of Selected Areas in Communications 17 (8) (1999) 1333–1344.
[24] L. Li, J. Y Halpern, “Minimum energy mobile wireless networks
revisited”,Proceedings of IEEE International Conference on Communications (ICC_01),
Helsinki, Finland, June 2001.
[25] Yan Yu and Ramesh Govindan, “Geographical and Energy Aware Routing:a
recursive data dissemination protocol for wireless sensor networks”, 2001.
[26] Tokuya Inagaki and Susumu Ishihara, “HGAF: A power saving scheme for wireless
sensor network”, Journal of Information Processing, vol. 17, pp. 255-266, Oct. 2009.
[27] KaushikGhosh, ParthaPratim Bhattacharya and P. K. Das, “Effect of Multipath
Fading and Propogation Environment on the Performance of a Fermat Point Based Energy
Efficient Geocast Routing Protocol”, International Journal of Wireless & Mobile
Networks (IJWMN), Vol. 4, No. 1, February 2012.
[28]. M. Radi, B. Dezfouli and K. A. Bakar, “Multipath Routing in Wireless Sensor
Networks: Survey andResearch Challenges”,Sensors, Jan 2012.
[29] Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”,
Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor
System(MASS ’05), Washington, DC, USA, 7–10 November 2005, pp. 672–680.
[30] Felemban, Lee and C.G., Ekici, “ MMSPEED: Multipath Multi-SPEED Protocol for
QoS Guarantee of Reliability and Timeliness in Wireless Sensor Network”, IEEE Trans.
MobileComput. 2006, 5,pp. 738–754.
[31] Tian, H, Stankovic, J.A., Chenyang, L., Abdelzaher, “ T. SPEED: A Stateless
Protocol forReal-Time Communication in Sensor Networks.”, Proceedings of the 23rd
InternationalConference on Distributed Computing Systems, Providence, RI, USA, May
2003; pp. 46–55.
[32] Woo, Culler, D. Taming , “The Underlying Challenges of Reliable Multihop Routing
in Sensor Networks”, Proceedings of the 1st International Conference on Embedded
NetworkedSensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 14–27.
[33] Ganesan, Govindan, Shenker, Estrin, D, “ Highly-Resilient, Energy-Efficient
Multipath Routing in Wireless Sensor Networks”, Mobile Comput. Commun.Rev. 2001,
pp.11–25.
[34] R. Vidhyapriya, “Energy Aware Routing for Wireless Sensor Networks”, Signal
Processing, Communication and Networking, pp. 545-550, Feb. 2007.
AUTHORS
NehaRathi was born in India on 16 July,1987. She received her B. Tech
degree in Electronics and Communication Engineering from Uttar
Pradesh Technical Univers ity, India in 2010 and currently is a M. Tech
(Signal Processing) student in Mody Institute of Technology and Science
(Deemed University), Rajasthan, India.
JyotiSaraswat was born in India on November 26,1987. She received her
B.Tech degree in Electronics and Communication Engineering from
Modi Institute of Engin eering and Technology, Rajasthan University,
India in 2010and currently is a M. Tech (Signal Processing) studentin
ModyInstitute of Technology and Science (Deemed University),
Rajasthan, India.
Dr. ParthaPratim Bhattacharya was born in India on January 3, 1971. He
has 15 years of experience in teaching and research. He served many
reputed educational Institutes in India in various positions starting from
Lecturer to Professor and Principal. At present he is working as
Professor in Department of Electronics and Communicati on
Engineering in the Faculty of Engineering and Technology, Mody
Institute of Technology and Science (Deemed University), Rajasthan,
India. He worked on Microwave devices and systems and mobile cellular communication
systems. He has published a good number of papers in refereed journals and conferences.
His present research interest includes wireless sensor networks, mobile communication
and cognitive radio.
Dr. Bhattacharya is a member of The Institution of Electronics and
TelecommunicationEngineers, India and The Institution of Engineers, India. He is the
recipient of Young Scientist Awardfrom International Union of Radio Science in 2005. He
is working as the chief editor, editorial boardmember and reviewer in many reputed
journals.
Citation Count – 68
A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
Monica R Mundada1
, Savan Kiran1
, Shivanand Khobanna1
, Raja Nahusha Varsha1
and Seira
Ann George1
1
Department of Computer Science and Engineering, M S Ramaiah Institute of Technology,
Bangalore
ABSTRACT
A wireless sensor network (WSN) consists of low cost, low power, small in size and multi
functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited
battery power and bandwidth constraints in order to facilitate efficient working of the network,
thereby increasing the lifetime of the network. Routing protocols in WSNs are also application
specific which has led to the development of a variety of protocols. Based on the underlying
network structure, routing techniques can be classified into three categories: data-centric,
hierarchical and location based routing. WSN has a design trade-off between energy and
communication overhead which forms the nerve center of the routing techniques. In this paper
we present a survey of state-of-the-art routing techniques in WSNs under all the three
categories. We epitomize these routing techniques and bring out the advantages and
disadvantages followed by their application domain. The paper concludes with issues open for
research.
KEYWORDS
Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric
protocols, Hierarchical Protocols and Location Based Protocols.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer
Networks, V Vol. 38, pp. 393-422.
[2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor
network,” I IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27.
[3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation
Conference o on VLSI Design, Bangalore, India.
[4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless
e networking," IEEE Computer, Vol. 33, pp. 42-48.
[5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for
Smart Dust,” 5th Annual ACM/IEEE International Conference on Mobile Computing and
Networking (MobiCom’99), Seattle, WA.
[6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor
Networks:A survey”, Elsevier science B.V.
[7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-
Efficient Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of
Advanced Networking and Applications Volume:02, Issue:02, Pages:570-580.
[8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l.
Conf. Sys. Sci.
[9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless
Sensor Networks with the Internet," - Department of Electrical Engineering, UNiversity of
Southern California.
[10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy
consumption of routings in wireless sensor nodes” WiOpt'04: Modeling and Optimization
in Mobile, Ad Hoc and Wireless Networks,” Cambridge, UK.
[11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,”
ACM Mobile Computing and Communications Review (MC2R).
[12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE
Mobicom, Seattle, WA, pp. 174–85.
[13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based
Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless
Networks, vol. 8, pp. 169–85.
[14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion:
A scalable and robust communication paradigm for sensor networks", Proceedings of the
6th Annual ACM/IEEE International Conference on Mobile Computing and Networking
(MobiCom'00), Boston, MA.
[15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in
Sensor Networks,” 5th annual ACM/IEEE international conference on Mobile Computing
and Networking (MobiCom’99), Seattle, WA.
[16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor
Networks", Proceedings of the First Workshop on Sensor Networks and Applications
(WSNA), Atlanta, GA.
[17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network,
http://irl.cs.ucla.edu/papers/grab-techreport.ps
[18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying
in sensor networks,” Proceedings of the First International Workshop on Sensor Network
Protocol and Applications, Anchorage, Alaska.
[19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint
Gradients in Sensor Networks,” Pervasive Services, ICPS, IEEE/ACS International
Conference on .
[20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing
Co.
[21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice
Hall.
[22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data
Dissemination Protocol for Periodic Updates in Sensor Networks”, Distributed Computing
System Workshop 23rd International Conference.
[23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based
Routing Algoritm for MANETS”, Proceedings of the International Conference on Parallel
Processing Workshops (ICPPW 02), IEEE.
[24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An
EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”.
[25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN
0262042193, MIT Press.
[26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-
efficient communication protocol for wireless sensor networks", Proceeding of the Hawaii
International Conference System Sciences, Hawaii.
[27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An
ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE
Trans. Wireless Commun., vol. 1, no. 4, pp. 660–70.
[28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient
GAthering in Sensor Information Systems," Proceedings of the IEEE Aerospace
Conference, Big Sky, Montana.
[29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in
Sensor Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in
Wireless Networks and Mobile Computing, San Francisco, C.
[30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced
Efficiency in Wireless Sensor Networks," Proceedings of the 1st International Workshop
on Parallel and Distributed Computing Issues in Wireless Networks and Mobile
Computing, San Francisco, CA.
[31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for
Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor
Networks," in the Proceedings of the 2nd International Workshop on Parallel and
Distributed Computing Issues in Wireless Networks and Mobile computing, Ft.
Lauderdale, FL.
[32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in
ClusterBased Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International
Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication
Systems (MASCOTS2002), Fort Worth, TX.
[33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham
O.FAPOJUWO, (March 2005), “ A Centralised Energy-Efficient Routing Protocol for
Wireless Sensor Networks,” IEEE Radio Communication.
[34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based
energy adaptive protocol for information dissemination and forwarding in wireless sensor
networks,” Int.J.Sensor Network. Vol. X, No. Y, XXXX.
[35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for
Wireless Sensor Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549.
[36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale
Wireless Sensor Networks,” Proc. ACM/IEEE MOBICOM.
[37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks
Revisited,” IEEE ICC, vol. 1, pp. 278–83.
[38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy
Conservation for Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile
Comp. and Net., pp. 70–84.
[39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing
for wireless sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE
International Conference on Mobile Computing and Networking (MobiCom '00), Boston,
MA.
[40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware
Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,”
UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023.
Citation Count – 58
CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND
FUZZY LOGIC
Mostaque Md. Morshedur Hassan
LCB College, Maligaon, Guwahati, Assam, India
ABSTRACT
Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system
security is used to identify the malicious activities in a computer system or network. There are
different approaches being employed in intrusion detection systems, but unluckily each of the
technique so far is not entirely ideal. The prediction process may produce false alarms in many
anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate
in establishing intrusive activities can be reduced. A set of efficient fuzzy rules can be used to
define the normal and abnormal behaviors in a computer network. Therefore some strategy is
needed for best promising security to monitor the anomalous behavior in computer network. In
this paper I present a few research papers regarding the foundations of intrusion detection
systems, the methodologies and good fuzzy classifiers using genetic algorithm which are the
focus of current development efforts and the solution of the problem of Intrusion Detection
System to offer a realworld view of intrusion detection. Ultimately, a discussion of the
upcoming technologies and various methodologies which promise to improve the capability of
computer systems to detect intrusions is offered.
KEYWORDS
Intrusion Detection System (IDS), Anomaly based intrusion detection, Genetic algorithm,
Fuzzy logic
For More Details : http://airccse.org/journal/ijdps/papers/4213ijdps04.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
REFERENCES
[1] J. Gomez & D. Dasgupta, (2002) “Evolving Fuzzy Classifiers for Intrusion Detection”, IEEE
Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy,
West Point, NY.
[2] R. H. Gong, M. Zulkernine & P. Abolmaesumi, (2005) “A Software Implementation of a
Genetic Algorithm Based Approach to Network Intrusion Detection”, Proceedings of the Sixth
International Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling
Wireless Networks.
[3] T. Xia, G. Qu, S. Hariri & M. Yousif, (2005) “An Efficient Network Intrusion Detection
Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE
International Performance Computing and Communications Conference, Phoenix, AZ, USA.
[4] Yao, J. T., S.L. Zhao & L.V. Saxton, (2005) “A Study On Fuzzy Intrusion Detection”, In
Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data
Networks Security, SPIE, Vol. 5812, Orlando, Florida, USA , pp. 23-30.
[5] B. Abdullah, I. Abd-alghafar, Gouda I. Salama & A. Abd-alhafez, (2009) “Performance
Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”,
13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), May
26-28.
[6] Hemanta K. Baruah, (2011) “Towards Forming A Field Of Fuzzy Sets”, International Journal
of Energy, Information and Communications (IJEIC), Vol. 2, Issue 1, February, pp. 16-20.
[7] Hemanta K. Baruah, (2011) “The Theory of Fuzzy Sets: Beliefs and Realities”, International
Journal of Energy, Information and Communications (IJEIC), Vol. 2, Issue 2, pp. 1-22.
[8] Tridiv Jyoti Neog & Dushmanta Kumar Sut, (2011) “Complement of an Extended Fuzzy
Set”, International Journal of Computer Applications (IJCA), Vol. 29-No.3, September, pp. 39-
45.
[9] Zadeh L A, (1965) “Fuzzy Sets”, Information and Control, Vol.8, pp. 338-353.
[10] Y. Dhanalakshmi & Dr. I. Ramesh Babu, (2008) “Intrusion Detection Using Data Mining
Along Fuzzy Logic and Genetic Algorithms”, International Journal of Computer Science and
Network Security (IJCSNS), Vol.8, No.2, February, pp. 27-32.
[11] W. Lu & I. Traore, (2004) “Detecting New Forms of Network Intrusion Using Genetic
Programming”, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp.
475-494.
[12] Mohammad Sazzadul Hoque, Md. Abdul Mukit & Md. Abu Naser Bikas, (2012) “An
Implementation of Intrusion Detection System using Genetic Algorithm”, International Journal
of Network Security and Its Applications (IJNSA),Vol.4, No.2, March, pp. 109-120.
[13] W. Li, (2004) “A Genetic Algorithm Approach to Network Intrusion Detection”, SANS
Institute, USA.
[14] A. Sung & S. Mukkamala, (2003) “Identifying important features for intrusion detection
using support vector machines and neural networks”, in Symposium on Applications and the
Internet, pp.209– 216.
[15 J. P. Planquart, “Application of Neural Networks to Intrusion Detection”, SANS Institute
Reading Room.
[16] R. G. Bace, (2000) “Intrusion Detection”, Macmillan Technical Publishing.
[17] S. Kumar & E. Spafford, (1995) “A Software architecture to Support Misuse Intrusion
Detection”, in the 18th National Information Security Conference, pp. 194-204.
[18] K. Ilgun, R. Kemmerer & P. A. Porras, (1995) “State Transition Analysis: A Rule-Based
Intrusion Detection Approach”, IEEE Transaction on Software Engineering, pp. 181-199.
[19] S. Kumar, (1995) “Classification and Detection of Computer Intrusions”, Purdue
University.
[20] V. Bobor, (2006) “Efficient Intrusion Detection System Architecture Based on Neural
Networks and Genetic Algorithms”, Department of Computer and Systems Sciences, Stockholm
University/Royal Institute of Technology, KTH/DSV.
[21] KDD-CUP (99) Task Description; http://kdd.ics.uci.edu/databases/kddcup99/task.html
[22] KDD Cup (1999): Tasks;
http://www.kdd.org/kddcup/index.php?section=1999&method=task
[23] KDD Cup (1999): Data;
http://www.kdd.org/kddcup/index.php?section=1999&method=data
[24] H. G. Kayacık, A. N. Zincir-Heywood & M. I. Heywood, (2005) “Selecting Features for
Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”.
[25] G. Folino, C. Pizzuti & G. Spezzano, (2005) “GP Ensemble for Distributed Intrusion
Detection Systems”, ICAPR, pp. 54-62.
AUTHORS
Mostaque Md. Morshedur Hassan Mostaque Md. Morshedur Hassan is a
senior Assistant Professor of Computer Science in the department of
Computer Science and Information Technology at Lalit Chandra Bharali
College (LCBC), Maligaon, Guwahati, Assam, India. He holds his Master of
Computer Application (MCA) degree from Allahabad Agricultural Institute
Deemed University, Allahabad. His area of interests includes Network
Security, Intrusion Detection and Prevention, Wireless Security, Web
Security, Fuzzy Logic, and Social Networking Site.
Citation Count – 58
BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY
Nateq Be-Nazir Ibn Minar1
and Mohammed Tarique2
1
Department of Electrical and Electronic Engineering, American International
University, Bangladesh
2
Department of Electronic and Communication, Ajman University of Science and
Technology, United Arab Emirates
ABSTRACT
Bluetooth technology has become an integral part of this modern society. The availability of
mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has
made Bluetooth a popular technology for short range wireless communication. However, as the
Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing
which can be potentially dangerous to the privacy of a user’s personal information. The security
issues of Bluetooth have been an active area of research for the last few years. This paper
presents the vulnerabilities in the security protocols of this technology along with some past
security threats and possible countermeasures as reported in the literatures which have been
surveyed and summarized in this paper. It also presents some tips that end-users can implement
immediately to become more cautious about their private information. Finally, the paper
concludes with some recommendations for future security enhancements that can be
implemented in the Bluetooth standard.
KEYWORDS
Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth
enhancements
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
REFERENCES
[1] “The Bluetooth Blues”, available at http://www.information-
age.com/article/2001/may/the_bluetooth_blues
[2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb.
22, 2001. available at: https://www.bluetooth.org/About/bluetooth_sig.htm
[3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about-
bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html
[4] Monson, Heidi - "Bluetooth Technology and Implications" available at:
http://www.sysopt.com/features/ network/article.php/3532506 (1999-12- 14).
[5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth-
fonctionnement.php3.
[6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol
to provide location privacy in wireless body area networks”, International Journal of Network
Security and its Applications (IJNSA), Vol.3, No.2, March 2011
[7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device
pairing methods”, International Journal of Network Security & Its Applications (IJNSA), Vol.1,
No.3, October 2009
[8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”,
IEEE International Conference on Pervasive Computing and Communications (PerCom-09).
2009.
[9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications,
2003, pp. 290-292
[10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at:
http://www.palowireless.com/ infotooth/tutorial/profiles.asp
[11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available
at: http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf
[12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at:
http://www.bluetomorrow.com/about-bluetooth-technology/general-
bluetoothinformation/bluetooth-versions.html
[13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at:
http://www.bluetooth.com/Pages/High-Speed.aspx
[14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”,
Kuopio University Library, 2009, pp. 55-62
[15] “The BlueBug”, a Bluetooth virus, available at:
http://trifinite.org/trifinite_stuff_bluebug.html
[16] John Oates, “Virus attacks mobiles via Bluetooth”, available at:
http://www.theregister.co.uk/2004/06/15/symbian_virus/
[17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-
descs/lasco_a.shtml
[18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing
protocol”. University of Cambridge Computer Laboratory, available at:
http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf
[19] Phone pirates in seek and steal mission", Cambridge Evening News, available at:
http://www.cambridge-news.co.uk/news/region_wide/2005 /08/17/
[20] "Going Around with Bluetooth in Full Safety”, available at:
http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf
[21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical
Engineering Systems, Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-
wool-mobisys05/
[22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”,
Kuopio University Library, 2009, pp. 68-80
[23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9
[24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”,
Computer Security Division - National Institute of Standards and Technology, US Department of
Commerce, 2008, pp. 25-26
[25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and
Vulnerabilities”, Indiana University Bloomington, 2008, pp. 7-8
[26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth
Security”, Computer Security Division - National Institute of Standards and Technology, US
Department of Commerce, 2008, pp.24-25
AUTHORS
Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his
expertise independently to institutions and manufacturing industries. He
obtained his Bachelor of Science degree in Electrical and Electronics
Engineering, with a special interest in Robotics and Industrial Automation,
from American International University - Bangladesh in 2008 and later
obtained his Master of Science degree, in Telecommunication Engineering,
focusing on Wireless Networks. His research interests include satellite
communications, network security, low-powered wireless devices, industrial automation,
robotics and green technology. He is the CEO of EcoWave – a company dedicated to produce
green electronic products for the benefit of the environment. He is an active member of IEEE
and does volunteer work for several societies.
Mohammed Tarique is an Assistant Professor in the Department of
Electronic and Communication, Ajman University of Science and
Technology, in United Arab Emirates. His research int erests include Adhoc
Networks and wireless network security, network testing and simulations.
His research primarily focuses on the design of Wireless Adhoc Networks.

More Related Content

What's hot

E learning-opportunities-&-prospects-in-higher
E learning-opportunities-&-prospects-in-higherE learning-opportunities-&-prospects-in-higher
E learning-opportunities-&-prospects-in-higher
Tariq Ghayyur
 
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
Maurice Dawson
 
CV Yavuz Samur_YOK
CV Yavuz Samur_YOKCV Yavuz Samur_YOK
CV Yavuz Samur_YOK
Yavuz Samur
 
List of scientific publications
List of scientific publicationsList of scientific publications
List of scientific publications
miride
 
Implementation of Information and Communication Technologies in Primary Schools
Implementation of Information and Communication Technologies in Primary SchoolsImplementation of Information and Communication Technologies in Primary Schools
Implementation of Information and Communication Technologies in Primary Schools
irjes
 
Kajian Tinjauan Tentang Penggunaan ICT
Kajian Tinjauan Tentang Penggunaan ICTKajian Tinjauan Tentang Penggunaan ICT
Kajian Tinjauan Tentang Penggunaan ICT
missng000
 

What's hot (19)

Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
 
Cv hasnain acad12
Cv hasnain acad12Cv hasnain acad12
Cv hasnain acad12
 
A Conceptual Understanding of how Educational Technology Coaches help Teache...
 A Conceptual Understanding of how Educational Technology Coaches help Teache... A Conceptual Understanding of how Educational Technology Coaches help Teache...
A Conceptual Understanding of how Educational Technology Coaches help Teache...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Indonesian Culture Learning Application based on Android
Indonesian Culture Learning Application based on Android Indonesian Culture Learning Application based on Android
Indonesian Culture Learning Application based on Android
 
21 Inspiring Quotes & Thoughts On Mobile Learning
21 Inspiring Quotes & Thoughts On Mobile Learning21 Inspiring Quotes & Thoughts On Mobile Learning
21 Inspiring Quotes & Thoughts On Mobile Learning
 
E learning-opportunities-&-prospects-in-higher
E learning-opportunities-&-prospects-in-higherE learning-opportunities-&-prospects-in-higher
E learning-opportunities-&-prospects-in-higher
 
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFEC...
 
CV Yavuz Samur_YOK
CV Yavuz Samur_YOKCV Yavuz Samur_YOK
CV Yavuz Samur_YOK
 
List of scientific publications
List of scientific publicationsList of scientific publications
List of scientific publications
 
Technology and Malaysian Education
Technology and Malaysian EducationTechnology and Malaysian Education
Technology and Malaysian Education
 
A comparative analysis of print versus electronic
A comparative analysis of print versus electronicA comparative analysis of print versus electronic
A comparative analysis of print versus electronic
 
Implementation of Information and Communication Technologies in Primary Schools
Implementation of Information and Communication Technologies in Primary SchoolsImplementation of Information and Communication Technologies in Primary Schools
Implementation of Information and Communication Technologies in Primary Schools
 
An e learning approach to secondary school education
An e learning approach to secondary school educationAn e learning approach to secondary school education
An e learning approach to secondary school education
 
Kajian Tinjauan Tentang Penggunaan ICT
Kajian Tinjauan Tentang Penggunaan ICTKajian Tinjauan Tentang Penggunaan ICT
Kajian Tinjauan Tentang Penggunaan ICT
 
The perceptions of teachers, parents and students on the effects of mobile ph...
The perceptions of teachers, parents and students on the effects of mobile ph...The perceptions of teachers, parents and students on the effects of mobile ph...
The perceptions of teachers, parents and students on the effects of mobile ph...
 
Literature review
Literature reviewLiterature review
Literature review
 
Profile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore MishraProfile of Dr. Brojo Kishore Mishra
Profile of Dr. Brojo Kishore Mishra
 
List of scientific publications
List of scientific publicationsList of scientific publications
List of scientific publications
 

Similar to Top Cited Articles - International Journal of Distributed and Parallel systems (IJDPS)

Hasnain ph d_gap analysis_pre
Hasnain ph d_gap analysis_preHasnain ph d_gap analysis_pre
Hasnain ph d_gap analysis_pre
Hasnain Zafar
 
MALL
MALL MALL
MALL
jgk27
 
Mobile technology presentationrr
Mobile technology presentationrrMobile technology presentationrr
Mobile technology presentationrr
ravits78
 
Research project presentation
Research project presentationResearch project presentation
Research project presentation
Lucia Morales
 

Similar to Top Cited Articles - International Journal of Distributed and Parallel systems (IJDPS) (20)

Exploring Sample Mobile Apps for English Language Learning, Abdellatif ZOUBAIR
Exploring Sample Mobile Apps for English Language  Learning, Abdellatif ZOUBAIRExploring Sample Mobile Apps for English Language  Learning, Abdellatif ZOUBAIR
Exploring Sample Mobile Apps for English Language Learning, Abdellatif ZOUBAIR
 
Exploring The Potential of Mobile Learning in Instruction, Mohamed KHARBACH
Exploring The Potential of Mobile Learning in Instruction, Mohamed KHARBACHExploring The Potential of Mobile Learning in Instruction, Mohamed KHARBACH
Exploring The Potential of Mobile Learning in Instruction, Mohamed KHARBACH
 
Mobile Learning Group
Mobile Learning GroupMobile Learning Group
Mobile Learning Group
 
4213ijsea05
4213ijsea054213ijsea05
4213ijsea05
 
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
 
UID for Mobile Learning
UID for Mobile LearningUID for Mobile Learning
UID for Mobile Learning
 
Mobile learning powerpoint
Mobile learning powerpointMobile learning powerpoint
Mobile learning powerpoint
 
Mobile learning to support teaching english as a second language
Mobile learning to support teaching english as a second languageMobile learning to support teaching english as a second language
Mobile learning to support teaching english as a second language
 
Hasnain ph d_gap analysis_pre
Hasnain ph d_gap analysis_preHasnain ph d_gap analysis_pre
Hasnain ph d_gap analysis_pre
 
MALL
MALL MALL
MALL
 
Mobile learning: Go for it!, Stavros Nikou
Mobile learning: Go for it!, Stavros NikouMobile learning: Go for it!, Stavros Nikou
Mobile learning: Go for it!, Stavros Nikou
 
Context-Aware Adaptive and Personalized Mobile Learning
Context-Aware Adaptive and Personalized Mobile Learning Context-Aware Adaptive and Personalized Mobile Learning
Context-Aware Adaptive and Personalized Mobile Learning
 
Mobile technology presentationrr
Mobile technology presentationrrMobile technology presentationrr
Mobile technology presentationrr
 
Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies
 
Research project presentation
Research project presentationResearch project presentation
Research project presentation
 
Primjer esej
Primjer esejPrimjer esej
Primjer esej
 
Technology in the classroom: Mobile Devices
Technology in the classroom: Mobile DevicesTechnology in the classroom: Mobile Devices
Technology in the classroom: Mobile Devices
 
Research+proposal
Research+proposalResearch+proposal
Research+proposal
 
A Review on Mobile Cloud Learning In Higher Education
A Review on Mobile Cloud Learning In Higher EducationA Review on Mobile Cloud Learning In Higher Education
A Review on Mobile Cloud Learning In Higher Education
 
Mlearning
MlearningMlearning
Mlearning
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

Top Cited Articles - International Journal of Distributed and Parallel systems (IJDPS)

  • 1. TToopp CCiitteedd AArrttiicclleess International Journal of Distributed and Parallel systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html
  • 2. Citation Count – 278 MOBILE-ASSISTED LANGUAGE LEARNING Tayebeh Mosavi Miangah1 and Amin Nezarat2 1 English Language Department, Payame Noor University, Yazd, Iran 2 Information Technology Department, Shiraz University, Shiraz, Iran ABSTRACT The main characteristics of mobile learning (m-learning) are recognized as the potential for learning process to be personalized, spontaneous, informal and ubiquitous. Although learning through mobile phones may take longer time compared to computers, the learners feel a greater sense of freedom of time and place, so that they can take the advantage of spare time to learn a second language when and where they are. Mobile-Assisted Language Learning (MALL) deals with the use of mobile technology in language learning. In contrast to classroom learning, in MALL there is no need for the learners to sit in a classroom or at a computer to get learning materials. In fact, MALL can be considered an ideal solution to language learning barriers in terms of time and place. In this paper by looking at some applications of m-learning as well as some examples across various aspects of it, we observe the advantages and disadvantages derived from using mobile technologies for students as well as professionals. Here, it has been tried to demonstrate the benefits of using mobile phones in learning English as a second language. Areas of mobile-based language learning discussed in this paper are vocabulary, listening, grammar, phonetics, and reading comprehension. KEYWORDS e-learning, mobile-assisted language learning, mobile technology, second language learning, wireless communication For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 3. REFERENCES [1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content representation type on mobile language learning”. Language Learning & Technology, 12(3), pp. 93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf [2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153- 180. [3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless computing in collaborative learning environments”. International Journal of Human-Computer Interaction, 13(2), pp. 257-276. [4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia English listening exercises in daily life”. In: The International Conference on Computer and Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/ [5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’ language learning”. ReCALL, 20(3), pp. 315–350. [6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a window into a virtual simulated world." In: Proceedings of IEEE International Workshop on Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp. 95-98 [7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile learning: Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press. [8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?” http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009. [9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and trainers”. London: Routledge, 2005. [10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL 21(2), pp. 157-165. [11] Microsoft research program. (2010). At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010 [12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010.
  • 4. [13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”. Computers & Education, 34(3-4), pp. 177-193. [14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile learning”. ReCALL, 20(3), pp. 253–270. [15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan. Journal of Computer Assisted Learning”, 21(3), pp. 217–228. [16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”. http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010. [17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”. http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010. [18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp. 327-339.
  • 5. Citation Count – 183 MOBILE LEARNING (M-LEARNING) AND EDUCATIONAL ENVIRONMENTS Mohamed Sarrab1 , Laila Elgamel2 , Hamza Aldabbas2 1 Communication and Information Research,Center, Sultan Qaboos University,Al-Khodh Muscat,123,Sultanate of Oman 2 Software Technology Research Laboratory, De Montfort University, LE1 9BH, Leicester, UK ABSTRACT Mobile devices show a dramatic departure from old-fashion of computing platforms as they no more represent a static or fixed notion of context, where changes are small, absent, or predictable. With this dramatic departure, the expansion and continued evolution of modern mobile devices an opportunity has arisen for much more comprehensive integration of these modern devices into educational environments. Mobile learning is a new research area, that has become an emerging tool for our education system. The mobile learning can be used to enhance the overall learning experience of our students and teachers. This paper discusses the background of mobile learning and how it can be used to enhance the whole eLearning system. The paper presents the M-learning approach as the next generation of eLearning, whereas the next generation of the learning systems will provide easy access and widely available to all who wish to be part of it. The paper also highlights the benefits and future challenges of mobile learning in our educational environments. KEYWORDS Mobile Learning, eLearning, Educational Environments. For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps04.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 6. REFERENCES [1] Gartner Group, “Gartner Says More than 1 Billion PCs In Use Worldwide and Headed to 2 Billion Units by 2014,” 2008. [Online]. Available: http://www.gartner.com/it/page.jsp?id=703807. [Accessed: 11-Sep-2011]. [2] Oulasvirta, M. Wahlström, and K. Anders Ericsson, “What does it mean to be good at using a mobile device? An investigation of three levels of experience and skill,” International Journal of Human-Computer Studies, vol. 69, no. 3, pp. 155-169, Mar. 2011. [3] I. Wasserman, “Software engineering issues for mobile application development,” in Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10, 2010, pp. 397-400. [4] F. Balagtas-Fernandez, J. Forrai, and H. Hussmann, “Evaluation of user interface design and input methods for applications on mobile touch screen devices,” Human-Computer Interaction, pp. 243–246, 2009. [5] Moodle Corp, 2008. An overview of MOODLE. 20 Nov. 2008. http://moodle.org/about [6] T. Hofer, W. Schwinger, M. Pichler, G. Leonhartsberger, J. Altmann, and W. Retschitzegger, “Context-awareness on mobile devices - the hydrogen approach,” in 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003. [7] J. Dey, Anind K., Hakkila, “Context-Awareness and Mobile Devices,” 2008. [8] N. Jennings, “Agent-oriented software engineering,” Multi-Agent System Engineering, pp. 1–7, 1999. [9] M. Brault, “Disability status and the characteristics of people in group quarters: a brief analysis of disability prevalence among the civilian noninstitutionalized and total populations in the American community survey,” US Census Bureau, 2008. [10] Apple Inc., “iOS Human Interface Guidelines: Introduction.” [Online]. Available: http://developer.apple.com/library/ios/#DOCUMENTATION/UserExperience/Conceptual/Mobil eHIG/Introduction/Introduction.html. [Accessed: 13-Sep-2011]. [11] J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J.-M. Bruel, “RELAX: a language to address uncertainty in self-adaptive systems requirement,” Requirements Engineering, vol. 15, no. 2, pp. 177-196, Mar. 2010. [12] Nadire Cavus & Dogan Ibrahim, “m-Learning: An experiment in using SMS to support learning new English language words,” British Journal of Educational Technology, Volume 40 Issue 1, Pages 78 –91, Feb 2008.
  • 7. [13] McConatha Douglas, Praul Matt and Lynch Michael J. “Mobile Learning in Higher Education: An Empirical Assessment of a New Educational Tool,” Turkish Online Journal of Educational Technology . vol.7,n3 article 2, Jul 2008. [14] Quinn C. “M-Learning: Mobile , Wireless , In-Your-Pocket Learning,” http://www.linezine.com/2.1/features/cqmmwiyp.htm ,2000. [15] Kristiansen, T. “M-learning. Experiences from the use of WAP as a supplementoinolearning,”http://www.nadenff.no/nadenff/konferanse/vettre02/TK010430%20Erf aringsr apport.pdf, 2009. [16] Chabra T. and Figueiredo J., “How To Design and Deploy And held Learning,” ohttp://www.empoweringtechnologies.net/eLearning/eLearning_exPov5_files/frame.htm, 2002. [17] A Dye, B E Solstad. “J A K Odingo. Mobile Educa-tion-A Glance atoTheoFuture,”o http://www.nettskolen.com/forskning/mobile_education.pdf ,2009. [18] Yuan Jiugen1, Xing Ruonan2, Wang Jianmin, Applying Research of Mobile Learning Mode in Teaching. International Forum on Information Technology and Applications, 16-18 July 2010. [19] Farooq, U, Schafer, W, Rosson, M.B and Caroll, J.M. M-Education: Bridging the Gap of Mobile and Desktop Computing. Centre for Human-Computer Interaction and Department of Computer Science. Virginia Polytechnic Institute and State University, pp. 1-2, 2002. [20] Giuseppe Laria, Mobile and nomadic user in e-learning: the Akogrimo case, sixth framework programme, Information Society, Fisciano, Italy, 2002. [21] Devinder Singh & Zaitun A.B, Mobile Learning In Wireless Classrooms, Malaysian Online Journal of Instructional Technology (MOJIT) Vol. 3, No.2, pp 26-42, August 2006. [22] Rashmi Padiadpu, Towards Mobile Learning: A SCORM Player for the Google Android Platform Hamburg university of applied science, Master Thesis, Information Engineering, 2008. [23] Cohen, A. Japan loves wireless. PC Magazine, Vol.21, No.18, p. 136. 2002. [24] Thornton, P. & Houser, C. Using Mobile Phones in Education. IEEE International Workshop on Wireless and Mobile Technologies in Education. 2004. [25] Wains, S. I., & Mahmood, D. W. Integrating M-Learning with E-Learning. Cincinnati, Ohio, USA. 2008. [26] Parson D., Ryu H. and Cranshaw M. 2006, “A Study of Design Requirements for Mobile Learning Environments”, Proceedings of the sixth International Conference on Advance Learning Technologies.
  • 8. [27] Sharma S. and Kitchens F. 2004, “Web Service Architecture for MLearning”, Electronic Journal on E-Learning Volume 2 Issue 1. [28] Barker A., Krull G. and Mallinson B. 2005, “A Proposed Theoretical Model for M-Learning Adoption in Developing Countries”, 4th World Conference of M-Learning. [29] Robert Yu-Liang Ting 2005, “Mobile Learning-Current Trend and Future Challenges”, Proceedings of the fifth IEEE ICALT’05. [30] Saipunidzam Mahamad, Mohammad Noor Ibrahim, Mohamad Izzriq Ab Malek Foad, and Shakirah Mohd Taib. Open Source Implementation of M-Learning for Primary School in Malaysia. International Journal of Human and Social Sciences 3:4 2008 [31] Barkhuus, L. and Dourish, P., 2004. Everyday encounters with context-aware computing in a campus environment. Proceeding of the International Conference on Ubiquitous Computing, Sept. 2004, Springer, Berlin/Heidelberg, pp: 232-249. DOI: 978-3-540- 22955-1 [32] Jihen, M., L. Mona, D. Alain and H.B. Ghezala, 2007. A context aware mobile and collaborative learning scenario. IEEE Multidiscip. Engineering Educ. Mag., 2: 65-69. [33] Houser, C. and P. Thornton, 2005. Poodle a course management system for mobile phones. Proceedings of the IEEE International Workshop on Wireless and Mobile Technologies in Education, Nov. 2005, IEEE Computer Society, Japan, pp: 211-215. DOI: 10.1109/WMTE.2005.51. AUTHORS Dr. Mohamed Sarrab has Ph.D. in Computer Science from De Montfort University 2011. He received his B.Sc. in computer science from 7th April University Libya and also received M.Sc in Computer Science from VSB Technical University of Ostrava Czech Republic. His main research interests are Mobile Applications, M-learning, Computer security, Runtime Verification, Computer forensic. Eng. Laila Elgamel has M.Sc. in Software Engineering from De Montfort University 2011. She received her B.Sc. in computer science from 7th April University Libya a. Her main research interests are Mobile Applications, M-learning, Software Engineering. Eng. Hamza Aldabbas has M.Sc in computer science from Al-Balqa’a Applied University-Jordan. And B.Sc. in Computer Information System from the same university. His research interests are Human-computer interaction, E-commerce, E-government and M-Learning.
  • 9. Citation Count – 149 SURVEY ON QOEQOS CORRELATION MODELS FORMULTIMEDIA SERVICES Mohammed Alreshoodi1 and John Woods2 1 School of Computer Science and Electronic Engineering, University of Essex, UK 2 School of Computer Science and Electronic Engineering, University of Essex, UK ABSTRACT This paper presents a brief review of some existing correlation models which attempt to map Quality of Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception, expectations, and experience of the application and network performance. The Holy Grail of subjective measurement is to predict it from the objective measurements; in other words predict QoE from a given set of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE mapping. KEYWORDS QoE, QoS, Perceived Quality, Quality Metrics. For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps05.pdf Volume Link : http://airccse.org/journal/ijdps/current2013.html
  • 10. REFERENCES [1] Nokia white paper, (2004), “Quality of Experience (QoE) of mobile services: Can it be measured and improved?” [2] Edson Gallo, Mario Siller, &John Woods, (2007), “An Ontology for the Quality of Experience Framework”, IEEE International Conference on Systems, Montreal Canada [3] Bauer, B., & Patrick, A. S. (2004). “A Human Factors Extension to the Seven-Layer OSI Reference Model” [4] Lopez, D., Gonzalez, F., Bellido, L., & Alonso, A. (2006). “Adaptive multimedia streaming over IP based on customer oriented metrics”, [Conference Paper], Proceedings of ISCN'06 7th International Symposium on Computer Networks. [5] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, &W. Weiss, (1998)“An architecture for differentiated services”. Internet Standards Track RFC 2475, IETF. [6] Braden, R., Clark, D., &Shenker, S., (1994) “Integrated Services in the Internet Architecture: an Overview”, RFC 1633. [7] E. Rosen, A. Viswanathan, &R. Callon, (2001) “Multiprotocol Label Switching Architecture (MPLS)”, IETF RFC 3031. [8] M. Fiedler, T. Hossfeld, &P. Tran-Gia, (2010) “A generic quantitative relationship between quality of experience and quality of service”, IEEE Network, vol. 24, no. 2, pp. 36–41. [9] ITU-T Recommendation, (2003) “ITU-T Rec. P.800.1: Mean Opinion Score (MOS) Terminology”. [10] S. Winkler, (2007) “Video Quality and Beyond, Symmetricom”. [11] Kalpana Seshadrinathan, Rajiv Soundararajan, Alan C. Bovik, &Lawrence K. Cormack, (2009) “Study of Subjective and Objective Quality Assessment of Video”, IEEE TRANSACTIONS ON IMAGE PROCESSING. [12] O. Nemethova, M. Ries, E. Siffel, &M. Rupp, (2004) “Quality Assessment for H.264 Coded Low-rate Low-resolution Video Sequences”, Proc. of Conference on Internet and Information Technologies. [13] Z. Wang, A. C. Bovik, H. R. Sheikh, &E. P. Simoncelli, (2004 ) “Image quality assessment: From error visibility to structural similarity,” IEEE Transactions on Image Processing. [14] ANSI T1.801.03 Standard, (2003) “Digital Transport of One-Way Video Signals - Parameters for Objective Performance Assessment”.
  • 11. [15] ITU-T Recommendation, “ITU-T Rec. P.862.1: Mapping function for transforming P.862 raw result scores to MOS-LQO,” 2003. [16] Brooks, P., & Hestnes, B. (2010). “User measures of quality of experience: Why being objective and quantitative is important”. IEEE Network, 24(2), 8–13. [17] A. Takahashi, D. Hands, &V. Barriac, (2008) “Standardization activities in the ITU for a QoE assessment of IPTV”, Communications Magazine, IEEE, vol. 46, pp. 78-84. [18] Jari Korhonen, Nino Burini, Junyong You, and Ehsan Nadernejad, (2012) “HOW TO EVALUATE OBJECTIVE VIDEO QUALITY METRICS RELIABLY”, QoMEX IEEE [19] S. Khirman &P. Henriksen, (2002) “Relationship between quality-of-service and quality- ofexperience for public internet service,” in Workshop on Passive and Active Measurement, USA. [20] Mark Carson, &Darrin Santay, (2003), “NIST Net – A Linux-based Network Emulation Tool”, National Institute of Standards and Technology (NIST). (http://snad.ncsl.nist.gov/nistnet/) [21] H. J. Kim &S. G. Choi, (2010) “A study on a QoS/QoE correlation model for QoE evaluation on IPTV service,” in Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT ’10), pp. 1377–1382. [22] H. Koumaras, C-H. Lin, C-K. Shieh, &A. Kourtis, (2009) “A Framework for End-to-End Video Quality Prediction of MPEG Video”, J. Vis. Commun. Image R, doi: 10.1016/j.jvcir.2009.07.005 [23] Ricky K. P. Mok, Edmond W. W. Chan, &Rocky K. C. Chang, (2011) “Measuring the Quality of Experience of HTTP Video Streaming”, 12th IFIP/IEEE 1M. [24] Tianyi Wang, Anjum Pervez2, &Hua Zou1, (2010) “VQM-BASED QOS/QOE MAPPING FOR STREAMING VIDEO”. [25] M.H. Pinson, &S.Wolf, (2004) “A New Standardized Method for Objectively Measuring Video Quality”, IEEE Transactions on Broadcasting, Vol. 50, pp. 312-322. [26] NTIA General Model (aka VQM) and Full Reference Calibration Standards, [http://www.its.bldrdoc.gov] [27] IstOpt (First Optimization), 7D-Soft High Technology Inc. Available: http://www.7dsoft.comlcnlindex.htm [28] P. Ramos, J. Salmerón, R. Leal, &F. Vidal, (2012) “Estimating Perceived Video Quality from Objective Parameters in Video over IP Services”, Copyright (c) IARIA, ISBN: 978-1- 61208-193-9
  • 12. [29] F. Agboma &A. Liotta, (2008) “QoE-aware QoS management,” in Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, pp. 111-116. [30] G. T. Fechner, E. G. Boring, H. E. Adler, &D. H. Howes, (1966) “Elements of psychophysics “, New York :: Holt, Rinehart and Winston. [31] W. R. Klecka, (1980) “Discriminant analysis”. SAGE. [32] Muslim Elkotob, Daniel Granlund, Karl Andersson &Christer Åhlund, (2010) “Multimedia QoE optimized management using prediction and statistical learning”. LCN: 324-327 [33] V. Menkovski, A. Oredope, A. Liotta, &A. Cuadra Sánchez, “Predicting Quality of Experience in Multimedia Streaming,” in Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 52-59, 2009. [34] J. Quinlan, (1986) “Induction of Decision Trees,” Machine Learning, vol. 1, no. 1, pp. 81- 106. [35] A. J. Smola &B. Schölkopf, (2004) “A tutorial on support vector regression,” Statistics and Computing, vol. 14, no. 3, pp. 199–222. [36] R. Kohavi, (1995) “A study of cross-validation and bootstrap for accuracy estimation and model selection”, in International Joint Conference on Artificial Intelligence, vol. 14, pp. 1137- 1145. [37] V. Machado, C. Oliveira , A. Marcelino, S. Carlos, N. Vijaykumar, &C. Hirata, (2011) “A New Proposal to Provide Estimation of QoS and QoE over WiMAX Networks”, 978-1-4673- 0279-1©IEEE [38] Mushtaq, M.S., Augustin, B., &Mellouk, A., (2012) "Empirical study based on machine learning approach to assess the QoS/QoE correlation", Networks and Optical Communications (NOC), 17th European Conference on, on page(s): 1 – 7 [39] Haiqing Du, Chang Guo, Yixi Liu& Yong Liu,(2009)“Research on Relationships between QoE and QoS based on BP Neural Network”, In: Proceedings of IC-NIDC 2009, pp. 312-315. [40] Pablo Frank &José Incera, (2006)“A neural network based test bed for evaluating the quality of video streams in IP networks”, 0-7695-2569-5/06 © IEEE, Proceedings of the Electronics, Robotics and Automotive Mechanics Conference (CERMA'06) [41] P. Calyam, P. Chandrasekaran, G. Trueb, N. Howes, R. Ramnath, D. Yu, Y. Liu, L. Xiong, &D. Yang, (2012) “Multi-ResolutionMultimedia QoEModels for IPTV Applications”, Volume 2012, Article ID 904072, 13 pages doi:10.1155//904072
  • 13. [42] A. Khan, L. Sun, E. Ifeachor, J. Fajardo, F. Liberal &H. Koumaras, (2010) “Video Quality Prediction Models Based on Video Content Dynamics for H.264 Video over UMTS Networks”, International Journal of Digital Multimedia Broadcasting. [43] J.-S. R. Jang, (1993) “ANFIS: adaptive-network-based fuzzy inference system,” IEEE Transactions on Systems, Man and Cybernetics, vol. 23, no. 3, pp. 665–685. [44] T. Malinovski, T. Vasileva-Stojanovska, &V.Trajkovik, (2011)“Quality-of-Experience Perception for VideoStreaming Services: Preliminary Subjective andObjective Results, International Journal of Research and Reviews in Next Generation Networks (IJRRNGN) Vol. 1. [45] T. Hoßfeld, R. Schatz, M. Seufert, M. Hirth, T. Zinner, &P. Tran-Gia, (2011) “Quantification of YouTube QoE via Crowdsourcing,” in IEEE International Workshop on Multimedia Quality of Experience - Modeling, Evaluation, and Directions (MQoE), Dana Point, CA, USA. [46] M. Hirth, T. Hoßfeld, &P. Tran-Gia, (2011) “Anatomy of a crowdsourcing platform - using the example of microworkers.com,” in Workshop on Future Internet and Next Generation Networks, Seoul, Korea. [47] T. Hoßfeld, R. Schatz, &S. Egger, (2011) “SOS: The MOS is not enough!” in QoMEX, Mechelen, Belgium. [48] M. Siller &J. Woods, (2003) “Improving Quality of Experience for Multimedia Services by QoS arbitration on a QoE Framework,” in IEEE Packet Video, Nantes. [49] Watson, A. &Sasse, M.A., (1998) “Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications”, Proceedings of ACM Multimedia. Bristol, UK, pp 55- 60. [50] B. Han, X. Zhang, Y. Qi, Y. Gao &D. Yang, (2012) “QoE Model Based Optimization for Streaming Media Service Considering Equipment and Environment Factors”, Wireless Pers Commun. [51] Khalil UrRehmanLaghari, Imran Khan&Noel Crespi, (2012) “Quantitative and Qualitative Assessment of QoE for Multimedia Services in Wireless Environment”, MoVid’12, North Carolina, USA [52] Pawlak, Z., Grzymala–Busse, J.W., Slowiriski, R. & Ziarko, W, (1995) “Rough Sets”, Comm of the ACM. vol.38 (11). pp. 88— 95. [53] Le Callet P, MöllerS&Perkis A. (eds). (2012) Qualinet White paper on Definitions of Quality of Experience (QoE).
  • 14. [54] Skorin-Kapov L & Varela M, (2012) “A Multi-Dimensional View of QoE: the ARCU Model”, Proceedings of the 35th Jubilee International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia. [55] Kestutis Mintauckis, (2010) “Empirical studies of Quality of Experience (QoE) – A Systematic Literature Survey”, Master of Science Thesis in computer science, University of Oslo. [56] Schwarz, H. Marpe, D. &Wiegand, T. (2007) “Overview of the Scalable Video Coding Extension of the H.264/AVC Standard”, IEEE Trans. Circuits Syst. Video Technol.,vol. 17, No. 9, pp. 1103- 1120. [57] Jain, R, (2004) “Quality of Experience”. IEEE Multimedia, Vol. 11(1), 96-97.
  • 15. Citation Count – 97 EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING V.Ramya1 , B. Palaniappan2 1 Assistant Professor, Department of CSE, Annamalai University, Chidambaram, India. 2 Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India. ABSTRACT Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented in places of education and work. This work modifies the existing safety model installed in industries and this system also be used in homes and offices. The main objective of the work is designing microcontroller based toxic gas detecting and alerting system. The hazardous gases like LPG and propane were sensed and displayed each and every second in the LCD display. If these gases exceed the normal level then an alarm is generated immediately and also an alert message (SMS) is sent to the authorized person through the GSM. The advantage of this automated detection and alerting system over the manual method is that it offers quick response time and accurate detection of an emergency and in turn leading faster diffusion of the critical situation. KEYWORDS Air pollution Monitoring, gas sensors, GSM module, wireless networks. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 16. REFERENCES [1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE, “A Mobile GPRS-sensors array for Air Pollution Monitoring” vol.6, pp.410-422, Oct.2010. [2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An Environment Air Pollution Monitoring System Based on the IEEE1451 Standard for Low Cost Requirements” IEEE Sensors J., Vol. 8, pp.415-422, Apr. 2008. [3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air Pollution mapper for cities”, in Proc. IEEE Innovations in Information Technology Conf., Dubai, UAE, Nov.2006, pp.1-5. [4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring system based on geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp. 1370-1373. [5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh network based on Embedded System”, in proc. 5th IEEE Int. Symp. Embedded Computing, 2008, pp. 174-179. [6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring system Using ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf. Convergence Information Technology, 2007, pp.1024-1031. [7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor System Based on Wireless Sensor Network”, Journal of Xihua University, Natural Science, Vol. 26, no.4, pp. 44-46 ,2007. [8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J. Gandolf, and N. j. Tao, “A wearable and wireless sensor system for real-time monitoring of toxic environmental volatile organic compounds”, IEEE sensors, J., vol. 9, pp. 1734- 1740, Dec.2009. [9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module for Room Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009. [10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc- Graw Hill.
  • 17. [11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring system based on the IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J., Vol, 8, pp. 415-422, Apr, 2008. [12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring system based on geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol, 3, pp.1370-1373.
  • 18. Citation Count – 82 DATA MINING SYSTEM AND APPLICATIONS: A REVIEW Mr. S. P. Deshpande1 and Dr. V. M. Thakare2 1 Department of MCA, D.C.P.E, H.V.P.Mandal Amravati, India 2 Post Graduate Deptt. of Computer Science,SGB, Amravati University, Amravati, India ABSTRACT In the Information Technology era information plays vital role in every sphere of the human life. It is very important to gather data from different data sources, store and maintain the data, generate information, generate knowledge and disseminate data, information and knowledge to every stakeholder. Due to vast use of computers and electronics devices and tremendous growth in computing power and storage capacity, there is explosive growth in data collection. The storing of the data in data warehouse enables entire enterprise to access a reliable current database. To analyze this vast amount of data and drawing fruitful conclusions and inferences it needs the special tools called data mining tools. This paper gives overview of the data mining systems and some of its applications. KEYWORDS Data mining system architecture, Data mining application For More Details : http://airccse.org/journal/ijdps/papers/0910ijdps03.pdf Volume Link : http://airccse.org/journal/ijdps/curissue.html
  • 19. REFERENCES [1]Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1- 892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999. [2]Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, John Wiley & Sons, Inc, 2005. [3]Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006. [4].Chapman, P., Clinton, J., Kerber, R., Khabaza, T.,Reinartz, T., Shearer, C. and Wirth, R.. “CRISP-DM 1.0 : Step-by-step data mining guide, NCR Systems Engineering Copenhagen (USA and Denmark), DaimlerChrysler AG (Germany), SPSS Inc. (USA) and OHRA Verzekeringenen Bank Group B.V (The Netherlands), 2000”. [5]. Fayyad, U., Piatetsky-Shapiro, G., and Smyth P., “From Data Mining to Knowledge Discovery in Databases,” AI Magazine, American Association for Artificial Intelligence, 1996. [6]. Tan Pang-Ning, Steinbach, M., Vipin Kumar. “Introduction to Data Mining”, Pearson Education, New Delhi, ISBN: 978-81-317-1472-0, 3rd Edition, 2009. [7]. Bernstein, A. and Provost, F., “An Intelligent Assistant for the Knowledge Discovery Process”, Working Paper of the Center for Digital Economy Research, New York University and also presented at the IJCAI 2001 Workshop on Wrappers for Performance Enhancement in Knowledge Discovery in Databases. [8]. Baazaoui, Z., H., Faiz, S., and Ben Ghezala, H., “A Framework for Data Mining Based Multi-Agent: An Application to Spatial Data, volume 5, ISSN 1307-6884,” Proceedings of World Academy of Science, Engineering and Technology, April 2005. [9]. Rantzau, R. and Schwarz, H., “A Multi-Tier Architecture for High-Performance Data Mining, A Technical Project Report of ESPRIT project, The consortium of CRITIKAL project, Attar Software Ltd. (UK), Gehe AG (Denmark); Lloyds TSB Group (UK), Parallel Applications Centre, University of Southampton (UK), BWI, University of Stuttgart (Denmark), IPVR, University of Stuttgart (Denmark)”. [10]. Botia, J. A., Garijo, M. y Velasco, J. R., Skarmeta, A. F., “A Generic Data mining System basic design and implementation guidelines”, A Technical Project Report of CYCYT project of Spanish Government. 1998. Web Site: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1935 [11] Campos, M. M., Stengard, P. J., Boriana, L. M., “Data-Centric Automated Data Mining”, , Web Site.:
  • 20. www.oracle.com/technology/products/bi/odm/pdf/automated_data_mining_paper_1205.p df [12].Sirgo, J., Lopez, A., Janez, R., Blanco, R., Abajo, N., Tarrio, M., Perez, R., “A Data Mining Engine based on Internet, Emerging Technologies and Factory Automation,” Proceedings ETFA '03, IEEE Conference, 16-19 Sept. 2003. Web Site : www.citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8955 [13] Bianca V. D.,Philippe Boula de Mareüil and Martine Adda-Decker, “Identification of foreign-accented French using data mining techniques, Computer Sciences Laboratory for Mechanics and Engineering Sciences (LIMSI)”. Web Site : www.limsi.fr/Individu/bianca/article/Vieru&Boula&Madda_ParaLing07.pdf [14]Halteren, H. van, “Linguistic Profiling for Author Recognition and Verification”, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics USA, Barcelona, Spain, Article No. 199, Year of Publication: 2004. [15]. Halteren, H. V., Oostdijk N., “Linguistic profiling of texts for the purpose of language verification, The ILK research group, Tilburg centre for Creative Computing and the Department of Communication and Information Sciences of the Faculty of Humanities, Tilburg University, The Netherlands.” WebSite: www.ilk.uvt.nl/~antalb/textmining/LingProfColingDef.pdf [16]. Antonie, M. L., Zaiane, O. R.,Coman, A., “Application of Data Mining Techniques for Medical Image Classification”, Proceedings of the Second International Workshop on Multimedia Data Mining (MDM/KDD 2001) in conjunction with ACM SIGKDD conference, San Francisco, August 26, 2001. [17].Kusiak, A., Kernstine, K.H., Kern, J.A., McLaughlin, K.A., and Tseng, T.L., “Data Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000. [18].Luis, R., Redol, J., Simoes, D., Horta, N., “Data Warehousing and Data Mining System Applied to ELearning, Proceedings of the II International Conference on Multimedia and Information & Communication Technologies in Education, Badajoz, Spain, December 3-6th 2003. [19].Chen, H., Chung, W., Qin, Y., Chau, M., Xu, J. J., Wang, G., Zheng, R., Atabakhsh, H., “Crime Data Mining: An Overview and Case Studies”, A project under NSF Digital Government Programme, USA, “COPLINK Center: Information and Knowledge Management for Law Enforcement,”, July 2000 – June 2003. [20].Kay, J., Maisonneuve, N., Yacef, K., Zaiane O., “Mining patterns of events in students’ teamwork data”, Proceedings of the ITS (Intelligent Tutoring Systems) 2006 Workshop on Educational Data Mining, pages 45-52, Jhongli, Taiwan, 2006.
  • 21. [21]Rao, R. B., Krishnan, S. and Niculescu, R. S., “Data Mining for Improved Cardiac Care” , SIGKDD Explorations Volume 8, Issue 1. [22]Ghani, R., Probst, K., Liu, Y., Krema, M., Fano, A., “Text Mining for Product Attribute Extraction”, SIGKDD Explorations Volume 8, Issue 1. [23]DeBarr, D., Eyler-Walker, Z., “Closing the Gap: Automated Screening of Tax Returns to Identify Egregious Tax Shelters”. SIGKDD Explorations Volume 8, Issue 1. [24]Kanellopoulos, Y., Dimopulos, T., Tjortjis, C., Makris, C. “Mining Source Code Elements for Comprehending Object-Oriented Systems and Evaluating Their Maintainability”, SIGKDD Explorations Volume 8, Issue 1. [25]Schultz, M. G., Eskin, Eleazar, Zadok, Erez, and Stolfo, Salvatore, J., “Data Mining Methods for Detection of New Malicious Executables”. Proceedings of the 2001 IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA , ISSN:1081-6011, 2001. [26] Cai, W. and Li L., “Anomaly Detection using TCP Header Information, STAT753 Class Project Paper, May 2004.”. Web Site:http://www.scs.gmu.edu/~wcai/stat753/stat753report.pdf [27].Nandi, T., Rao, C. B. and Ramchandran, S., “Comparative genomics using data mining tools, Journal of Bio-Science, Indian Academy of Sciences, Vol. 27,No. 1, Suppl. 1, page No. 15-25, February 2002”. [28]Khreisat, L., “Arabic Text Classification Using N-Gram Frequency Statistics A Comparative Study”. Proceedings of The 2006 International Conference on Data Mining, DMIN'06, pp 78-82, Las Vegas, Nevada, USA, June 26-29, 2006. [29] Onkamo, P. and Toivonen, H., “A survey of data mining methods for linkage dis- equilibrium mapping”, Henry Stewart Publications 1473 – 9542. Human Genomics. VOL 2, NO 5, Page No. 336–340, MARCH 2006. [30] Smith, L., Lipscomb, B., and Simkins, A., “Data Mining in Sports: Predicting Cy Young Award Winners”. Journal of Computer Science, Vol. 22, Page No. 115-121,April 2007. [31]Deng, B., Liu, X., “Data Mining in Quality Improvement”. Proceedings of the Twenty-Seventh Annual SAS Users Group International Conference 2002 by SAS Institute Inc., Cary, NC, USA. ISBN 1-59047-061- 3. Web Site :http://www2.sas.com/proceedings/sugi27/Proceed27.pdf [32]Cohen, J. J., Olivia, C., Rud, P., “Data Mining of Market Knowledge in The Pharmaceutical Industry”. Proceeding of 13th Annual Conference of North-East SAS Users Group Inc., NESUG2000, Philadelphia Pennsilvania, September 24-26 2000.
  • 22. [33]Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O., “Using Data Mining Techniques for Detecting Terror-Related Activities on the Web”. Web Site: www.ise.bgu.ac.il/faculty/mlast/papers/JIW_Paper.pdf [34] Solieman, O. K., “Data Mining in Sports: A Research Overview, A Technical Report, MIS Masters Project, August 2006”. Web Site: http://ai.arizona.edu/hchen/chencourse/Osama-DM_in_Sports.pdf [35] Maciag, T., Hepting, D. H., Slezak, D., Hilderman, R. J., “Mining Associations for Interface Design”. Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 4481, pp. 109-117, June 26, 2007. [36]Foster, D. P. and Stine, R. A., “Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy”. Journal of the American Statistical Association, Alexandria, VA, ETATS-UNIS, vol. 99, ISSN 0162-1459, pp. 303-313 January 15, 2004 [37]Kraft, M. R., Desouza, K. C., Androwich, I., “Data Mining in Healthcare Information Systems: Case Study of a Veterans’ Administration Spinal Cord Injury Population”. IEEE, Proceedings of the 36th Hawaii International Conference on System Sciences, 0-7695- 1874-5/03, 2002. [38]Kusiak, A., Kernstine, K. H., Kern, J. A., McLaughlin, K. A., and Tseng, T. L., “Data Mining: Medical and Engineering Case Studies”. Proceedings of the Industrial Engineering Research 2000 Conference, Cleveland, Ohio, pp. 1-7,May 21-23, 2000. [39]Ansari, S., Kohavi, R., Mason, L., and Zheng, Z., “Integrating E-Commerce and Data Mining: Architecture and Challenges”. Proceedings of IEEE International Conference on Data Mining, 2001. [40] Jadhav, S. R., and Kumbargoudar, P., “Multimedia Data Mining in Digital Libraries: Standards and Features”.Proceedings of conference Recent advances in Information Science and Technology READIT – 2007, pp 54-59, Organized by Madras Library Association - Kalpakkam Chapter & Scintific information Resource Division, Indira Gandhi Center for Atomic research, Department of Atomic Energy, Kalpakkam, Tamilnadu,India. 12-13 July 2007. [41]Anjewierden, A., Koll¨offel, B., and Hulshof C., “Towards educational data mining: Using data mining methods for automated chat analysis to understand and support inquiry learning processes”. International Workshop on Applying Data Mining in e-Learning, ADML'07, Vol-305, Page No 23-32, Sissi, Lassithi - Crete Greece, 18 September, 2007. [42]Romero, C., Ventura, S. and De-Bra, P. “Knowledge Discovery with Genetic Programming for Providing Feedback to Courseware Authors, Kluwer Academic Publishers, Printed in the Netherlands, 30/08/2004”.
  • 23. [43]Chen, H., Chung, W., Xu Jennifer, J., Wang, G., Qin, Y., Chau, M., “Crime Data Mining: A General Framework and Some Examples”. Technical Report, Published by the IEEE Computer Society, 0018-9162/04, pp 50-56, April 2004. [44]Chodavarapu Y., “Using data-mining for effective (optimal) sports squad selections”. Web Site: http://insightory.com/view/74//using_data- mining_for_effective_(optimal)_sports_squad_selections [45]Jensen, Christian, S., “Introduction to Temporal Database Research,” Web site: http://www.cs.aau.dk/~csj/Thesis/pdf/chapter1.pdf [46]Vajirkar, P., Singh, S., and Lee, Y., “Context-Aware Data Mining Framework for Wireless Medical Application”. Lecture Notes in Computer Science (LNCS), Volume 2736, Springer-Verlag. ISBN 3-540-40806-1, pp. 381 – 391.
  • 24. Citation Count – 78 PERFORMANCE ANALYSIS OF AODV, DSDV AND DSR IN MANETS Akshai Aggarwal1 , Savita Gandhi2 , Nirbhay Chaubey3 1 Gujarat Technological University, Ahmedabad, Gujarat, India 2 Department of Computer Science, Gujarat University, Ahmedabad, Gujarat, India 3 Department of Computer Science, Institute of Science and Technology for Advanced Studies and Research, Vallabh Vidyanagar, Gujarat, India ABSTRACT Mobile Ad hoc Networks (MANETs) are considered as a new paradigm of infrastructure-less mobile wireless communication systems. MANETs are being widely studied and it is the technology that is attracting a large variety of applications. Routing in MANETs is considered a challenging task due to the unpredictable changes in the network topology, resulting from the random and frequent movement of the nodes and due to the absence of any centralized control [1][2]. In this paper, we evaluate the performance of reactive routing protocols, Ad hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR) and proactive routing protocol Destination Sequenced Distance Vector (DSDV). The major goal of this study is to analyze the performance of well known MANETs routing protocol in high mobility case under low, medium and high density scenario. Unlike military applications, most of the other applications of MANETs require moderate to high mobility. Hence it becomes important to study the impact of high mobility on the performance of these routing protocols. The performance is analyzed with respect to Average End-to-End Delay, Normalized Routing Load (NRL), Packet Delivery Fraction (PDF) and Throughput. Simulation results verify that AODV gives better performance as compared to DSR and DSDV. KEYWORDS MANETs, Routing Protocols, AODV, DSDV, DSR, NS-2. For More Details : http://airccse.org/journal/ijdps/papers/1111ijdps15.pdf Volume Link : http://airccse.org/journal/ijdps/current2011.html
  • 25. REFERENCES [1] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “A Study of Secure Routing Protocol in Mobile Ad hoc Networks” in Proceedings of National Conferences on Advancement in Wireless Technology and Applications, 18-19 December 2008, SVNIT, Surat, India. [2] Akshai Aggarwal, Savita Gandhi and Nirbhay Chaubey “Key Management Consideration in MANETs” in Proceedings of National Conference on Cryptography and Network Security (NCCNS),18-19 February 2009, VIT Unviersity, Vellore, India. [3] Charles E. Perkins, Ad Hoc Networking, Addison-Wesley, March 2005. [4] Charles E. Perkins and Pravin Bhagwat, “Highly Dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers . 1994. [5] C. Perkins, E Royer and S. Das “Ad hoc On-demand Distance Vector (AODV) Routing,” RFC 3561 , July 2003. [6] David B. Johnson, David A. Maltz “Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Thomasz Imielinski and Hank Korth (Editors) ,” Vol. 353, Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996. [7] NS-2 Network simulator http://www.isi.edu/nsnam/ns [8] Chenna R. Chandrasekhar P., Reddy P “Performance Analysis of Adhoc Network Routing Protocols, ISAUHC 2006 pp. 186-187 [9] Talooki, Ziarati VNK “Performance Comparison of Routing Protocols for Mobile Ad- hoc Networks, APCC 2005 pp 1-5 [10] Lakshmikanth, Gaiwak G, Vyavahare MA,” Simulation based comparative performance analysis of Adhoc routing protocols TENCON- 2008 pp 1-5 [11] Mahdipou E, Aminian E, Torabi M, Zare M “ CBR Performance Evaluation over AODV and DSDV in RW Mobility Model, ICCAE 2009 pp 238-242. [12] R. Misra, C. R. Manda (2005) “Performance Comparison of AODV/DSR On- Demand Routing Protocols for Ad Hoc Networks in Constrained Situation”, IEEE ICPWC 2005. [13] S. R. Das, C. E. Perkins and E. M. Royer (2000), “Performance comparison of Two On-Demand Routing protocols for Ad hoc Networks”, In Proc. of INFOCOM 2000, Tel Aviv, Israel, March 2000. [14] Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns”. http://www.isi.edu/nsnam/ns/tutorial/
  • 26. [15] Network Simulator - 2 (NS-2) http://mohit.ueuo.com/NS-2.html AUTHORS Akshai Aggarwal (MIEEE’1966, SMIEEE’1992) is working as Vice Chancellor, Gujarat Technological University, Ahmedabad, India. Before joining as the Vice-Chancellor, he was working as the Director of School of Computer Science, University of Windsor, Canada. He worked as Professor and Head of Department of Compu ter Science at Gujarat University for about 10 years. Before that he was Professor and Head, Department of EE at M.S.University of Baroda. He was Chairman of IEEE India Council for two years. He initiated IEEE activities in Gujarat by starting the first IEEE Student Branch at M.S.University of Baroda. Later he initiated the establishment of the Student Branch at Gujarat University. He was also the founder Chairman of IEEE Gujarat Section, the IEEE Computer Society Chapter and the IEEE Joint Chapter of Industry Applications, Industrial Electronics and Power Electronics. The Section conducted two International Conferences and one national Seminar during his Chairmanship. He graduated with a B.Sc.(EE) from Punjab Engg College and studied at MS University of Baroda for his Master’s and Doctoral work. Savita Gandhi (MIEEE’ 2003 SMIEEE’ 2005) is Professor & Head at the Department of Computer Science, Gujarat University and Joint Director, K.S. School of Business Management, Gujarat University. She is with Gujarat University for about 20 years. Before that she has worked with M.S. University of Baroda, Department of Mathematics for about 10 years. She has been actively associated with IEEE activities at Gujarat Section. She is M.Sc. (Mathematics), Ph.D (Mathematics) and A.A.S.I.(Associate Member of Actuarial Society of India by the virtue of having completed the "A" group examinations comprising six subjects conducted by Institute of Actuaries , London). She was awarded Gold Medal for standing first class first securing 93% marks in M.Sc. and several prizes at M.Sc. as well as B.Sc. Examinations for obtaining highest marks. Nirbhay Chaubey (SIEEE’ 2002 MIEEE’ 2004) is working as an Assistant Professor of Computer Science at Institute of Science and Technology for Advanced Studies and Research, Vallabh Vidyanagar, Gujarat, India. Currently, he is pursuing Ph.D in Computer Science at Department of Computer Science, Gujarat University, Ahmedabad, India. He has been involved in IEEE activities since 1994. His position held for IEEE Gujarat Section include Executive Secretary (1998-2005), Treasurer (2005-2006), Secretary and Treasurer (2007) and Treasurer for year 2008 onwards. He graduated from Ranchi Unviersity, Ranchi, and Master in Computer Applications from Madurai Kamraj University, Madurai, India of Baroda for his Master’s and Doctoral work.
  • 27. Citation Count – 74 A REVIEW ON ROUTING PROTOCOLS FOR APPLICATION IN WIRELESS SENSOR NETWORKS Neha Rathi1 , Jyoti Saraswat2 and Partha Pratim Bhattacharya3 Department of Electronics and Communication Engineering Faculty of Engineering and Technology Mody Institute of Technology & Science (Deemed University) Lakshmangarh, Dist. Sikar, Rajasthan, Pin – 332311, India ABSTRACT Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. So it is essential to design effective and energy aware protocol in order to enhance the network lifetime. In this paper, a review on routing protocol in WSNs is carried out which are classified as data-centric, hierarchical and location based depending on the network structure. Then some of the multipath routing protocols which are widely used in WSNs to improve network performance are also discussed. Advantages and disadvantages of each routing algorithm are discussed thereafter. Furthermore, this paper compares and summarizes the performances of routing protocols. KEYWORDS Wireless sensor networks, nodes, energy-aware routing, routing protocols, network structure For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps05.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 28. REFERENCES [1] WintYe Poe and Jens B. Schmitt, “Node Deployment in Large Wireless Sensor Networks: Coverage, Energy consumption, and Worst–Case Delay”, Proceeding AINTEC’09 Asian internet engineering college, pp. 77-84. [2] Eunil Park and Kwangsu Cho, (2010) “Energy Efficient and Reliable Geographic Routing in Wireless Sensor Networks”, World Academy of Science, Engineering and Technology 37. [3] John A. Stankovic, “Wireless Sensor Networks”, computer, vol. 41, pp. 92-95, Oct. 2008. [4] Rajashree.V.Biradar, V. C. Patil,Dr. S. R. Sawan andDr. R. R. Mudholkar, “Classification and Comparison of Routing Protocols in Wireless Sensor Networks”, UbiCCJournal,Vol. 4. [5] Jason Lester Hill and David E. Culler, (2003) “System Architecture for Wireless Sensor Networks”, Proceedings of the Doctoral Dissertation System architecture for wireless sensor networks. [6] Jamal, N.Al-Karaki and Ahmed E. Kamal, “Routing techniques in wireless sensor networks: a survey”, Wireless Communications, IEEE, vol. 11, pp. 6-28, Dec. 2004. [7] Jim Farmer, “Managing Secure Data Delivery: A Data Roundhouse Model”, August. 2001. [8] S. Muthukarpagam, V. Niveditta andNedunchelivan, (2010) “Design issues, Topology issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research Challenges”, IJCA Journal. [9] Luis Javier GarcíaVillalba and Ana Lucila Sandoval Orozco, “Routing Protocols in Wireless Sensor Networks”, October 2009. [10] Sidra Aslam, Farrah Farooq and ShahzadSarwar, (2009) “Power Consumption in Wireless Sensor Networks”, Proceedings of the 7th International Conference on Frontiers of Information Technology. [11] Nandini .S.Patil and P. R. Patil, “Data Aggregation in Wireless Sensor Network”, IEEE International Conference on Computational Intelligence and Computing Research, 2010. [12] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks”, Proceedings on the 5th annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 174-185.
  • 29. [13] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and Fabio Silva, “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transactions on Networking (TON), vol. 11, pp. 2-16, February 2003. [14] D. Braginsky, D. Estrin, “Rumor routing algorithm for sensor networks”, Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, pp. 22-31, October 2002. [15] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in Wireless Sensor Networks”, Proceedings of the First international conference on Embedded Software and Systems, pp. 318-325. [16] KonradIwanicki and Maarten Van Steen, “On Hierarchical Routing in Wireless Sensor Networks”, in Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, pp. 133-144. [17] Ankita Joshi &Lakshmi Priya.M, “A Survey of Hierarchical Routing Protocols in Wireless Sensor Network”, MES Journal of Technology and Management, pp. 67 – 71. [18] Kemal Akkaya and Mohamed Younis, (2005) “A Survey on Routing Protocols for Wireless Sensor Networks”, Ad Hoc Networks, pp. 325-349. [19] S. Lindsey and C.S. Raghavendra, “ PEGASIS: Power Efficient Gathering in Sensor Information Systems”, Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March 2002, vol. 3. [20] AratiManjeshwar and Dharma P. Agrawal, “ TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks”, Parallel and Distributed Processing Symposium, proceedings 15th International, pp. 2009-2015, April. 2009. [21] AratiManjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks” Parallel and Distributed Processing Symposium, proceedings International, IPDPS 2002, Abstracts, and CD-ROM, pp. 195-202. [22] Jyh-Huei Chang and Rong-Hong Jan, (2005) “An Energy-Aware, Cluster-Based Routing Algorithm for Wireless Sensor Networks”, International Federation for Information Processing, pp. 255- 266. [23] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE Journal of Selected Areas in Communications 17 (8) (1999) 1333–1344. [24] L. Li, J. Y Halpern, “Minimum energy mobile wireless networks revisited”,Proceedings of IEEE International Conference on Communications (ICC_01), Helsinki, Finland, June 2001.
  • 30. [25] Yan Yu and Ramesh Govindan, “Geographical and Energy Aware Routing:a recursive data dissemination protocol for wireless sensor networks”, 2001. [26] Tokuya Inagaki and Susumu Ishihara, “HGAF: A power saving scheme for wireless sensor network”, Journal of Information Processing, vol. 17, pp. 255-266, Oct. 2009. [27] KaushikGhosh, ParthaPratim Bhattacharya and P. K. Das, “Effect of Multipath Fading and Propogation Environment on the Performance of a Fermat Point Based Energy Efficient Geocast Routing Protocol”, International Journal of Wireless & Mobile Networks (IJWMN), Vol. 4, No. 1, February 2012. [28]. M. Radi, B. Dezfouli and K. A. Bakar, “Multipath Routing in Wireless Sensor Networks: Survey andResearch Challenges”,Sensors, Jan 2012. [29] Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”, Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor System(MASS ’05), Washington, DC, USA, 7–10 November 2005, pp. 672–680. [30] Felemban, Lee and C.G., Ekici, “ MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Network”, IEEE Trans. MobileComput. 2006, 5,pp. 738–754. [31] Tian, H, Stankovic, J.A., Chenyang, L., Abdelzaher, “ T. SPEED: A Stateless Protocol forReal-Time Communication in Sensor Networks.”, Proceedings of the 23rd InternationalConference on Distributed Computing Systems, Providence, RI, USA, May 2003; pp. 46–55. [32] Woo, Culler, D. Taming , “The Underlying Challenges of Reliable Multihop Routing in Sensor Networks”, Proceedings of the 1st International Conference on Embedded NetworkedSensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 14–27. [33] Ganesan, Govindan, Shenker, Estrin, D, “ Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks”, Mobile Comput. Commun.Rev. 2001, pp.11–25. [34] R. Vidhyapriya, “Energy Aware Routing for Wireless Sensor Networks”, Signal Processing, Communication and Networking, pp. 545-550, Feb. 2007. AUTHORS NehaRathi was born in India on 16 July,1987. She received her B. Tech degree in Electronics and Communication Engineering from Uttar Pradesh Technical Univers ity, India in 2010 and currently is a M. Tech (Signal Processing) student in Mody Institute of Technology and Science (Deemed University), Rajasthan, India.
  • 31. JyotiSaraswat was born in India on November 26,1987. She received her B.Tech degree in Electronics and Communication Engineering from Modi Institute of Engin eering and Technology, Rajasthan University, India in 2010and currently is a M. Tech (Signal Processing) studentin ModyInstitute of Technology and Science (Deemed University), Rajasthan, India. Dr. ParthaPratim Bhattacharya was born in India on January 3, 1971. He has 15 years of experience in teaching and research. He served many reputed educational Institutes in India in various positions starting from Lecturer to Professor and Principal. At present he is working as Professor in Department of Electronics and Communicati on Engineering in the Faculty of Engineering and Technology, Mody Institute of Technology and Science (Deemed University), Rajasthan, India. He worked on Microwave devices and systems and mobile cellular communication systems. He has published a good number of papers in refereed journals and conferences. His present research interest includes wireless sensor networks, mobile communication and cognitive radio. Dr. Bhattacharya is a member of The Institution of Electronics and TelecommunicationEngineers, India and The Institution of Engineers, India. He is the recipient of Young Scientist Awardfrom International Union of Radio Science in 2005. He is working as the chief editor, editorial boardmember and reviewer in many reputed journals.
  • 32. Citation Count – 68 A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS Monica R Mundada1 , Savan Kiran1 , Shivanand Khobanna1 , Raja Nahusha Varsha1 and Seira Ann George1 1 Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore ABSTRACT A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the network. Routing protocols in WSNs are also application specific which has led to the development of a variety of protocols. Based on the underlying network structure, routing techniques can be classified into three categories: data-centric, hierarchical and location based routing. WSN has a design trade-off between energy and communication overhead which forms the nerve center of the routing techniques. In this paper we present a survey of state-of-the-art routing techniques in WSNs under all the three categories. We epitomize these routing techniques and bring out the advantages and disadvantages followed by their application domain. The paper concludes with issues open for research. KEYWORDS Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric protocols, Hierarchical Protocols and Location Based Protocols. For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 33. REFERENCES [1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer Networks, V Vol. 38, pp. 393-422. [2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor network,” I IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27. [3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation Conference o on VLSI Design, Bangalore, India. [4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless e networking," IEEE Computer, Vol. 33, pp. 42-48. [5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for Smart Dust,” 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor Networks:A survey”, Elsevier science B.V. [7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy- Efficient Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of Advanced Networking and Applications Volume:02, Issue:02, Pages:570-580. [8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. [9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless Sensor Networks with the Internet," - Department of Electrical Engineering, UNiversity of Southern California. [10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy consumption of routings in wireless sensor nodes” WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks,” Cambridge, UK. [11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,” ACM Mobile Computing and Communications Review (MC2R). [12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle, WA, pp. 174–85. [13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks,” Wireless
  • 34. Networks, vol. 8, pp. 169–85. [14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA. [15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in Sensor Networks,” 5th annual ACM/IEEE international conference on Mobile Computing and Networking (MobiCom’99), Seattle, WA. [16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor Networks", Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA. [17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network, http://irl.cs.ucla.edu/papers/grab-techreport.ps [18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying in sensor networks,” Proceedings of the First International Workshop on Sensor Network Protocol and Applications, Anchorage, Alaska. [19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint Gradients in Sensor Networks,” Pervasive Services, ICPS, IEEE/ACS International Conference on . [20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing Co. [21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice Hall. [22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data Dissemination Protocol for Periodic Updates in Sensor Networks”, Distributed Computing System Workshop 23rd International Conference. [23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based Routing Algoritm for MANETS”, Proceedings of the International Conference on Parallel Processing Workshops (ICPPW 02), IEEE. [24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”. [25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN 0262042193, MIT Press.
  • 35. [26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy- efficient communication protocol for wireless sensor networks", Proceeding of the Hawaii International Conference System Sciences, Hawaii. [27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–70. [28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient GAthering in Sensor Information Systems," Proceedings of the IEEE Aerospace Conference, Big Sky, Montana. [29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in Sensor Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in Wireless Networks and Mobile Computing, San Francisco, C. [30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced Efficiency in Wireless Sensor Networks," Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA. [31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile computing, Ft. Lauderdale, FL. [32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in ClusterBased Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort Worth, TX. [33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham O.FAPOJUWO, (March 2005), “ A Centralised Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Radio Communication. [34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based energy adaptive protocol for information dissemination and forwarding in wireless sensor networks,” Int.J.Sensor Network. Vol. X, No. Y, XXXX. [35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for Wireless Sensor Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549. [36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks,” Proc. ACM/IEEE MOBICOM.
  • 36. [37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks Revisited,” IEEE ICC, vol. 1, pp. 278–83. [38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy Conservation for Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., pp. 70–84. [39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing for wireless sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), Boston, MA. [40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023.
  • 37. Citation Count – 58 CURRENT STUDIES ON INTRUSION DETECTION SYSTEM, GENETIC ALGORITHM AND FUZZY LOGIC Mostaque Md. Morshedur Hassan LCB College, Maligaon, Guwahati, Assam, India ABSTRACT Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system security is used to identify the malicious activities in a computer system or network. There are different approaches being employed in intrusion detection systems, but unluckily each of the technique so far is not entirely ideal. The prediction process may produce false alarms in many anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate in establishing intrusive activities can be reduced. A set of efficient fuzzy rules can be used to define the normal and abnormal behaviors in a computer network. Therefore some strategy is needed for best promising security to monitor the anomalous behavior in computer network. In this paper I present a few research papers regarding the foundations of intrusion detection systems, the methodologies and good fuzzy classifiers using genetic algorithm which are the focus of current development efforts and the solution of the problem of Intrusion Detection System to offer a realworld view of intrusion detection. Ultimately, a discussion of the upcoming technologies and various methodologies which promise to improve the capability of computer systems to detect intrusions is offered. KEYWORDS Intrusion Detection System (IDS), Anomaly based intrusion detection, Genetic algorithm, Fuzzy logic For More Details : http://airccse.org/journal/ijdps/papers/4213ijdps04.pdf Volume Link : http://airccse.org/journal/ijdps/current2013.html
  • 38. REFERENCES [1] J. Gomez & D. Dasgupta, (2002) “Evolving Fuzzy Classifiers for Intrusion Detection”, IEEE Proceedings of the IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY. [2] R. H. Gong, M. Zulkernine & P. Abolmaesumi, (2005) “A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection”, Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks. [3] T. Xia, G. Qu, S. Hariri & M. Yousif, (2005) “An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE International Performance Computing and Communications Conference, Phoenix, AZ, USA. [4] Yao, J. T., S.L. Zhao & L.V. Saxton, (2005) “A Study On Fuzzy Intrusion Detection”, In Proceedings of the Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, SPIE, Vol. 5812, Orlando, Florida, USA , pp. 23-30. [5] B. Abdullah, I. Abd-alghafar, Gouda I. Salama & A. Abd-alhafez, (2009) “Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System”, 13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), May 26-28. [6] Hemanta K. Baruah, (2011) “Towards Forming A Field Of Fuzzy Sets”, International Journal of Energy, Information and Communications (IJEIC), Vol. 2, Issue 1, February, pp. 16-20. [7] Hemanta K. Baruah, (2011) “The Theory of Fuzzy Sets: Beliefs and Realities”, International Journal of Energy, Information and Communications (IJEIC), Vol. 2, Issue 2, pp. 1-22. [8] Tridiv Jyoti Neog & Dushmanta Kumar Sut, (2011) “Complement of an Extended Fuzzy Set”, International Journal of Computer Applications (IJCA), Vol. 29-No.3, September, pp. 39- 45. [9] Zadeh L A, (1965) “Fuzzy Sets”, Information and Control, Vol.8, pp. 338-353. [10] Y. Dhanalakshmi & Dr. I. Ramesh Babu, (2008) “Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms”, International Journal of Computer Science and Network Security (IJCSNS), Vol.8, No.2, February, pp. 27-32. [11] W. Lu & I. Traore, (2004) “Detecting New Forms of Network Intrusion Using Genetic Programming”, Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494.
  • 39. [12] Mohammad Sazzadul Hoque, Md. Abdul Mukit & Md. Abu Naser Bikas, (2012) “An Implementation of Intrusion Detection System using Genetic Algorithm”, International Journal of Network Security and Its Applications (IJNSA),Vol.4, No.2, March, pp. 109-120. [13] W. Li, (2004) “A Genetic Algorithm Approach to Network Intrusion Detection”, SANS Institute, USA. [14] A. Sung & S. Mukkamala, (2003) “Identifying important features for intrusion detection using support vector machines and neural networks”, in Symposium on Applications and the Internet, pp.209– 216. [15 J. P. Planquart, “Application of Neural Networks to Intrusion Detection”, SANS Institute Reading Room. [16] R. G. Bace, (2000) “Intrusion Detection”, Macmillan Technical Publishing. [17] S. Kumar & E. Spafford, (1995) “A Software architecture to Support Misuse Intrusion Detection”, in the 18th National Information Security Conference, pp. 194-204. [18] K. Ilgun, R. Kemmerer & P. A. Porras, (1995) “State Transition Analysis: A Rule-Based Intrusion Detection Approach”, IEEE Transaction on Software Engineering, pp. 181-199. [19] S. Kumar, (1995) “Classification and Detection of Computer Intrusions”, Purdue University. [20] V. Bobor, (2006) “Efficient Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms”, Department of Computer and Systems Sciences, Stockholm University/Royal Institute of Technology, KTH/DSV. [21] KDD-CUP (99) Task Description; http://kdd.ics.uci.edu/databases/kddcup99/task.html [22] KDD Cup (1999): Tasks; http://www.kdd.org/kddcup/index.php?section=1999&method=task [23] KDD Cup (1999): Data; http://www.kdd.org/kddcup/index.php?section=1999&method=data [24] H. G. Kayacık, A. N. Zincir-Heywood & M. I. Heywood, (2005) “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets”. [25] G. Folino, C. Pizzuti & G. Spezzano, (2005) “GP Ensemble for Distributed Intrusion Detection Systems”, ICAPR, pp. 54-62.
  • 40. AUTHORS Mostaque Md. Morshedur Hassan Mostaque Md. Morshedur Hassan is a senior Assistant Professor of Computer Science in the department of Computer Science and Information Technology at Lalit Chandra Bharali College (LCBC), Maligaon, Guwahati, Assam, India. He holds his Master of Computer Application (MCA) degree from Allahabad Agricultural Institute Deemed University, Allahabad. His area of interests includes Network Security, Intrusion Detection and Prevention, Wireless Security, Web Security, Fuzzy Logic, and Social Networking Site.
  • 41. Citation Count – 58 BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY Nateq Be-Nazir Ibn Minar1 and Mohammed Tarique2 1 Department of Electrical and Electronic Engineering, American International University, Bangladesh 2 Department of Electronic and Communication, Ajman University of Science and Technology, United Arab Emirates ABSTRACT Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along with some past security threats and possible countermeasures as reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information. Finally, the paper concludes with some recommendations for future security enhancements that can be implemented in the Bluetooth standard. KEYWORDS Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth enhancements For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf Volume Link : http://airccse.org/journal/ijdps/current2012.html
  • 42. REFERENCES [1] “The Bluetooth Blues”, available at http://www.information- age.com/article/2001/may/the_bluetooth_blues [2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001. available at: https://www.bluetooth.org/About/bluetooth_sig.htm [3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about- bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html [4] Monson, Heidi - "Bluetooth Technology and Implications" available at: http://www.sysopt.com/features/ network/article.php/3532506 (1999-12- 14). [5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth- fonctionnement.php3. [6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol to provide location privacy in wireless body area networks”, International Journal of Network Security and its Applications (IJNSA), Vol.3, No.2, March 2011 [7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device pairing methods”, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009 [8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”, IEEE International Conference on Pervasive Computing and Communications (PerCom-09). 2009. [9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications, 2003, pp. 290-292 [10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at: http://www.palowireless.com/ infotooth/tutorial/profiles.asp [11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available at: http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf [12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at: http://www.bluetomorrow.com/about-bluetooth-technology/general- bluetoothinformation/bluetooth-versions.html [13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at: http://www.bluetooth.com/Pages/High-Speed.aspx
  • 43. [14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”, Kuopio University Library, 2009, pp. 55-62 [15] “The BlueBug”, a Bluetooth virus, available at: http://trifinite.org/trifinite_stuff_bluebug.html [16] John Oates, “Virus attacks mobiles via Bluetooth”, available at: http://www.theregister.co.uk/2004/06/15/symbian_virus/ [17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v- descs/lasco_a.shtml [18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University of Cambridge Computer Laboratory, available at: http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf [19] Phone pirates in seek and steal mission", Cambridge Evening News, available at: http://www.cambridge-news.co.uk/news/region_wide/2005 /08/17/ [20] "Going Around with Bluetooth in Full Safety”, available at: http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf [21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical Engineering Systems, Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked- wool-mobisys05/ [22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio University Library, 2009, pp. 68-80 [23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9 [24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp. 25-26 [25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”, Indiana University Bloomington, 2008, pp. 7-8 [26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth Security”, Computer Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp.24-25
  • 44. AUTHORS Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his expertise independently to institutions and manufacturing industries. He obtained his Bachelor of Science degree in Electrical and Electronics Engineering, with a special interest in Robotics and Industrial Automation, from American International University - Bangladesh in 2008 and later obtained his Master of Science degree, in Telecommunication Engineering, focusing on Wireless Networks. His research interests include satellite communications, network security, low-powered wireless devices, industrial automation, robotics and green technology. He is the CEO of EcoWave – a company dedicated to produce green electronic products for the benefit of the environment. He is an active member of IEEE and does volunteer work for several societies. Mohammed Tarique is an Assistant Professor in the Department of Electronic and Communication, Ajman University of Science and Technology, in United Arab Emirates. His research int erests include Adhoc Networks and wireless network security, network testing and simulations. His research primarily focuses on the design of Wireless Adhoc Networks.