NETWORK - MOST CITED - Top 20 PAPERS
1. Ubiquitous Smart Home System using Android Application
Shiu Kumar
January 2014 | Cited by 251
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a minimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.2. Delay-power Performance Comparison of Multipliers in VLSI Circuit Design
Sumit Vaidya and Deepak Dandekar
July 2010 | Cited by 147
A typical processor central processing unit devotes a considerable amount of processing time in performing arithmetic operations, particularly multiplication operations. Multiplication is one of the basic arithmetic operations and it requires substantially more hardware resources and processing time than addition and subtraction. In fact, 8.72% of all the instruction in typical processing units is multiplication. In this paper, comparative study of different multipliers is done for low power requirement and high speed. The paper gives information of “Urdhva Tiryakbhyam” algorithm of Ancient Indian Vedic Mathematics which is utilized for multiplication to improve the speed, area parameters of multipliers. Vedic Mathematics suggests one more formula for multiplication of large number i.e. “Nikhilam Sutra” which can increase the speed of multiplier by reducing the number of iterations.3. Energy Detection Technique for Spectrum Sensing in Cognitive Radio: A Survey
Mahmood A. Abdulsattar and Zahir A. Hussein
September 2012 | Cited by 141
Spectrum sensing is the basic and essential mechanisms of Cognitive Radio (CR) to find the unused spectrum. This paper presents an overview of CR architecture, discusses the characteristics and benefits of a CR. Energy detectionbased spectrum sensing has beenproposed and used widely because it doesn’t require transmitted signal properties, channel information, or even the type of modulation. In this paper, a surveyof energy detector over Additive White Gaussian Noise (AWGN), different fading channels for spectrum sensing methodologies in cognitive radio is presented.Theoretical analysis of time domain energy detection and threshold setting is investigated. Cooperative spectrum sensing and a multiple antenna processing based energy detector receptions are also discussed.4. Real Time Wireless Health Monitoring Application Using Mobile Devices
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique
May 2015| Cited by 115
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In addition the proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliability and accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.5. Wireless Sensor Networks Localization Algorithms: A Comprehensive Survey
Asma Mesmoudi , Mohammed Feham , Nabila Labraoui
November 2013 | Cited by 105
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters. Localization process is necessary to report the origin of events, routing and to answer questions on the network coverage ,assist group querying of sensors. In general, localization schemes are classified into two broad categories: range-based and range-free. However, it is difficult to classify hybrid solutions as range-based or range-free. In this paper we make this classification easy, where range-based schemes and range-free schemes are divided into two types: fully schemes and hybrid schemes. Moreover, we compare the most relevant localization algorithms and discuss the future research directions for wireless sensor networks localization schemes.-
Rajeev Piyare and Seong Ro Lee
September 2013 | Cited by 86
Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof of concept, we have implemented a REST based Web services on an IP based low power WSN test bed, which enables data access from anywhere. The alert feature has also been implemented to notify users via email or tweets for monitoring data when they exceed values and events of interest. 7. A Secure Data Communication System Using Cryptogaphy And Steganography
Saleh Saraireh
May 2013 | Cited by 72
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security.8. Correlation Based Feature Selection (CFS) Technique to Predict Student Perfromance
Mital Doshi , Dr.Setu K Chaturvedi, Ph.D
May 2014 | Cited by 66
Education data mining is an emerging stream which helps in mining academic data for solving various types of problems. One of the problems is the selection of a proper academic track. The admission of a student in engineering college depends on many factors. In this paper we have tried to implement a classification technique to assist students in predicting their success in admission in an engineering stream.We have analyzed the data set containing information about student’s academic as well as sociodemographic variables, with attributes such as family pressure, interest, gender, XII marks and CET rank in entrance examinations and historical data of previous batch of students. Feature selection is a process for removing irrelevant and redundant features which will help improve the predictive accuracy of classifiers. In this paper first we have used feature selection attribute algorithms Chi-square.InfoGain, and GainRatio to predict the relevant features. Then we have applied fast correlation base filter on given features. Later classification is done using NBTree, MultilayerPerceptron, NaiveBayes and Instance based –K- nearest neighbor. Results showed reduction in computational cost and time and increase in predictive accuracy for the student model9. A Predictive Framework for Cyber Security Analytics using Attack Graphs
Subil Abraham and Suku Nair
January 2015 | Cited by 63
Security metrics serve as a powerful tool for organizations to understand the effectiveness of protecting computer networks. However majority of these measurement techniques don’t adequately help corporations to make informed risk management decisions. In this paper we present a stochastic security framework for obtaining quantitative measures of security by taking into account the dynamic attributes associated with vulnerabilities that can change over time. Our model is novel as existing research in attack graph analysis do not consider the temporal aspects associated with the vulnerabilities, such as the availability of exploits and patches which can affect the overall network security based on how the vulnerabilities are interconnected and leveraged to compromise the system. In order to have a more realistic representation of how the security state of the network would vary over time, a nonhomogeneous model is developed which incorporates a time dependent covariate, namely the vulnerability age. The daily transition-probability matrices are estimated using Frei's Vulnerability Lifecycle model. We also leverage the trusted CVSS metric domain to analyze how the total exploitability and impact measures evolve over a time period for a given network.10. Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization
Indrajit Bhattacharya, Uttam Kumar Roy
November 2010 | Cited by 61
An RFID network consists of a set of tags and readers. The cost and the number of tags covered directly depend on the number of readers. So, finding optimal number of readers and their positions to cover all tags is one of the most important issues in an RFID network. In this paper, we have proposed a reader placement technique in a departmental store equipped with RFID network using Particle Swarm Optimization (PSO). The proposed algorithm finds minimal number of readers along with their position with 100% coverage of tagged items. Simulated results also show the algorithms effectiveness in achieving the optimal solution.11. Analyzing the Performance of Active Queue Management Algorithms
G. F. Ali Ahammed and Reshma Banu
March 2010 | Cited by 60
Congestion is an important issue which researchers focus on in the Transmission Control Protocol (TCP) network environment. To keep the stability of the whole network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important issues in the congestion control study. Active queue management (AQM) has been proposed as a router-based mechanism for early detection of congestion inside the network. In this paper we analyzed several active queue management algorithms with respect to their abilities of maintaining high resource utilization, identifying and restricting disproportionate bandwidth usage, and their deployment complexity. We compare the performance of FRED, BLUE, SFB, and CHOKe based on simulation results, using RED and Drop Tail as the evaluation baseline. The characteristics of different algorithms are also discussed and compared. Simulation is done by using Network Simulator(NS2) and the graphs are drawn using X- graph.12. Anomaly Intrusion Detection Design Using HYBRID of Unsupervised and Supervised Neural Network
M. Bahrololum, E. Salahi and M. Khaleghi
July 2009 | Cited by 54
This paper proposed a new approach to design the system using a hybrid of misuse and anomaly detection for training of normal and attack packets respectively. The utilized method for attack training is the combination of unsupervised and supervised Neural Network (NN) for Intrusion Detection System. By the unsupervised NN based on Self Organizing Map (SOM), attacks will be classified into smaller categories considering their similar features, and then unsupervised NN based on Backpropagation will be used for clustering. By misuse approach known packets would be identified fast and unknown attacks will be able to detect by this method..13. A Framework for Software-As-A-Service Selection and Provisioning
Elarbi Badidi
May 2013 | Cited by 50
As cloud computing is increasingly transforming the information technology landscape, organizations and businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them increase business agility and reduce their operational costs. They increasingly demand services that can meet their functional and non-functional requirements. Given the plethora and the variety of SaaS offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB) helps service consumers find the right SaaS providers that can fulfil their functional and non-functional requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers, and performing SLA compliance monitoring.14. Concepts and Evolution of Research in the Field of Wireless Sensor Networks
Ado Adamou ABBA ARI, Abdelhak GUEROUI, Nabila LABRAOUI and Blaise Omer YENKE
January 2015 | Cited by 48
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.15. Zigbee Technology and its Application in Wireless Home Automation Systems: A Survey
Thoraya Obaid, HaleemahRashed, Ali Abou-Elnour, Muhammad Rehan, Mussab Muhammad Saleh and Mohammed Tarique
July 2014 | Cited by 47
Wireless home automation systems have drawn considerable attentions of the researchers for more than a decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular because of its low cost and low power consumption. In this paper ZigBee based wireless home automation systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless home automation system has been presented. The performances of the ZigBee based systems have also been compared with those of other competing technologies based systems. In addition some future opportunities and challenges of the ZigBee based systems have been listed in this paper.16. Performance Analysis of the Routing Protocols for Video Streaming over Mobile Ad Hoc Networks
Muhammad Shaffatul Islam, Md. Adnan Riaz and Mohammed Tarique
May 2012 | Cited by 46
Mobile Ad hoc Networks (MANETs) are very considered attractive for many applications. Routing protocol is considered as the most important element of MANET. However, media streaming over MANET is a quite demanding task. In this paper the performances of MANET routing protocols have been investigated for video applications. Some popular routing protocols namely Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector (AODV), Temporally-Ordered Routing Algorithm (TORA), Optimized Link State Routing Protocol (OLSR), and Geographic Routing Protocol (GRP) have been considered in this paper. A comparative performance analysis of these routing protocols has been presented in this paper for supporting video streaming applications.17. An Overview of Visible Light Communication Systems
Taner Cevik and Serdar Yilmaz
November 2015 | Cited by 45
Visible Light Communication (VLC) has gained great interest in the last decade due to the rapid developments in Light Emitting Diodes (LEDs) fabrication. Efficiency, durability and long life span of LEDs make them a promising residential lighting equipment as well as an alternative cheap and fast data transfer equipment. Appliance of visual light in data communication by means of LEDs has been densely searched in academia. In this paper, we explore the fundamentals and challenges of indoor VLC systems. Basics of optical transmission such as transmitter, receiver, and links are investigated. Moreover, characteristics of channel models in indoor VLC systems are identified and theoretical details about channel modelling are presented in detail.18. Analysis of Wifi and Wimax and Wireless Network Coexistence
Shuang Song and Biju Issac
November 2014 | Cited by 45
Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown to most people. However compared to WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.19. A New Approach for Complex Encrypting and Decrypting Data
Obaida Mohammad Awad Al-Hazaimeh
March 2013 | Cited by 45
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encrypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.20. Effect of Duty Cycle on Energy Consumption in Wireless Sensor Networks
Jyoti Saraswat and Partha Pratim Bhattacharya
March 2013 | Cited by 44
Most studies define a common duty cycle value throughout the wireless sensor networks (WSNs) to achieve synchronization among the nodes. On the other hand, a few studies proposed adaptation of the duty cycle according to uniform traffic conditions to decrease the energy consumption and latency. In this paper, the lifetime of the nodes based on overall energy consumption are estimated and the effect of duty cycle on expected energy consumption is studied. The proposed scheme is compared with a standard scheme and is shown to perform significantly better for sufficient node density.