Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357707
Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh
Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.
{"title":"A theoretical workflow for the verification of embedded threats on mobile devices","authors":"Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh","doi":"10.1109/ICCAKM50778.2021.9357707","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357707","url":null,"abstract":"Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357729
R. Kanday, Ranbir Singh Batth
In the cryptography the most important part is the security of the wallet. The wallets are secured till date by some alphanumeric private keys. The generation of the private keys are playing most important role in the security of the whole system which is directly proportional to password security. Therefore the security of the password and also the usability of the password is the main concern for all the administrators. Several strategies are analyzed for password formation. In this research work we proposed a novel technology of using Hindi words for the development of the security keys makes them more strong as binary function works on Hindi dictionary are very few common. In this certain sets of algorithm has been developed for the selection of the Hindi words, their character length and there way of representation. This article introduced a technique of the words to be selected that will be used in future for the development of private keys and makes wallets more secure system. Hindi mnemonics aides joins the request for composing strokes of letters with secret phrase age to assist clients with making protected and essential passwords.
{"title":"Development of Hindi Mnemonics for generating private keys used in Hierarchical Deterministic wallets","authors":"R. Kanday, Ranbir Singh Batth","doi":"10.1109/ICCAKM50778.2021.9357729","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357729","url":null,"abstract":"In the cryptography the most important part is the security of the wallet. The wallets are secured till date by some alphanumeric private keys. The generation of the private keys are playing most important role in the security of the whole system which is directly proportional to password security. Therefore the security of the password and also the usability of the password is the main concern for all the administrators. Several strategies are analyzed for password formation. In this research work we proposed a novel technology of using Hindi words for the development of the security keys makes them more strong as binary function works on Hindi dictionary are very few common. In this certain sets of algorithm has been developed for the selection of the Hindi words, their character length and there way of representation. This article introduced a technique of the words to be selected that will be used in future for the development of private keys and makes wallets more secure system. Hindi mnemonics aides joins the request for composing strokes of letters with secret phrase age to assist clients with making protected and essential passwords.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"123 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357738
A. Sandhu, Ranbir Singh Batth
Software reuse not only reduces time-to-market but also improve productivity and reliability of the software. Developers can take the benefits of reusable modules of the software by simply accessing the software repository. To create these repositories Data Mining techniques are used and later to predict the reusability factor of the modules Artificial Intelligence comes into light. This integration of Data Mining with Artificial Intelligence to perform software engineering task is termed as software Intelligence. This paper provides a roadmap of conventional reuse approaches to Software Intelligence approaches. Intense survey is conducted on various Artificial Intelligence algorithms applied to measure reusability of the extracted component. From the survey it is concluded that Components Based Development fits best for modern applications as it supports object-oriented paradigm. Besides, the existing Artificial intelligence approaches lack is efficient prediction of reusable module.
{"title":"Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence","authors":"A. Sandhu, Ranbir Singh Batth","doi":"10.1109/iccakm50778.2021.9357738","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357738","url":null,"abstract":"Software reuse not only reduces time-to-market but also improve productivity and reliability of the software. Developers can take the benefits of reusable modules of the software by simply accessing the software repository. To create these repositories Data Mining techniques are used and later to predict the reusability factor of the modules Artificial Intelligence comes into light. This integration of Data Mining with Artificial Intelligence to perform software engineering task is termed as software Intelligence. This paper provides a roadmap of conventional reuse approaches to Software Intelligence approaches. Intense survey is conducted on various Artificial Intelligence algorithms applied to measure reusability of the extracted component. From the survey it is concluded that Components Based Development fits best for modern applications as it supports object-oriented paradigm. Besides, the existing Artificial intelligence approaches lack is efficient prediction of reusable module.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357754
Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar
Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Data mining has applications in various fields, for instance science and research. Associations can improve client connections as a use of data mining and execute systems identified with different business capacities and thus upgrade business in an increasingly ideal and compelling way. This encourages organizations draw nearer to arriving at their objectives and to settle on smarter decisions as well. Orange is segment based visual programming for data mining, Artificial Intelligence, and data examination. Work forms are made by interfacing predefined or customer organized parts called widgets. They read the data, process it, envision it, and do gathering, collect prescient models, and so on. Towards the start of December 2019, an erupt of coronavirus contamination 2019 (COVID-19), brought by a new critical intense respiratory issue coronavirus 2 transpired in Wuhan City, Hubei Province, China. On January 30, 2020 the World Health Organization announced the scene as a Public Health Emergency of International Concern. Several episodes forecast models for COVID-19 are being utilized by authorities internationally to settle on instructed decisions and authorize applicable precaution measures. Amidst the standard models for COVID-19 worldwide pandemic expectation, basic epidemiological and authentic models have gotten more consideration by specialists, and they are notable in the media. In this paper, we have taken COVID-19 dataset (downloaded June 2020) from Kaggle, related to India, and with the help of ORANGE tool we have visually represented to understand how certain relations can be depicted.
{"title":"Analyzing COVID-19 Dataset through Data Mining Tool “Orange”","authors":"Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar","doi":"10.1109/ICCAKM50778.2021.9357754","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357754","url":null,"abstract":"Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Data mining has applications in various fields, for instance science and research. Associations can improve client connections as a use of data mining and execute systems identified with different business capacities and thus upgrade business in an increasingly ideal and compelling way. This encourages organizations draw nearer to arriving at their objectives and to settle on smarter decisions as well. Orange is segment based visual programming for data mining, Artificial Intelligence, and data examination. Work forms are made by interfacing predefined or customer organized parts called widgets. They read the data, process it, envision it, and do gathering, collect prescient models, and so on. Towards the start of December 2019, an erupt of coronavirus contamination 2019 (COVID-19), brought by a new critical intense respiratory issue coronavirus 2 transpired in Wuhan City, Hubei Province, China. On January 30, 2020 the World Health Organization announced the scene as a Public Health Emergency of International Concern. Several episodes forecast models for COVID-19 are being utilized by authorities internationally to settle on instructed decisions and authorize applicable precaution measures. Amidst the standard models for COVID-19 worldwide pandemic expectation, basic epidemiological and authentic models have gotten more consideration by specialists, and they are notable in the media. In this paper, we have taken COVID-19 dataset (downloaded June 2020) from Kaggle, related to India, and with the help of ORANGE tool we have visually represented to understand how certain relations can be depicted.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Live the way you want to be remembered. Jeff Bezos founder of Amazon have very rightly quoted “Your brand is what people say about you when you're not in the room.” It is your reputation, how people feel about you. Though branding has been very popular since times immemorial and has always been associated with businesses, but personal branding has become fundamental with the arrival of social media and gig economy. There has been drastic cultural shift from shyness to look-at-me attitude. If you are not branding yourself, be assured that others would be doing that for you. The power of personal branding improves likelihood of career attainment. Individuals reach pinnacles of success when they find ways to continually grow and improve their brand. This paper discusses about the need of personal branding in the present scenario and focusses on the practical ways one can use to build his or her personal brand. It throws light on how personal branding leads to business success, financial security and business longevity. The tool is used sentiment analysis1 to see how strong brands of famous personalities are based on social media posts.
{"title":"Monetizing Personal Brand for Business Success, Financial Security and Career Longevity- Sentiment Analysis in COVID 19 Era","authors":"Navleen Kaur, Supriya Lamba Sahdev, Gurinder Singh, Nisha Tokas","doi":"10.1109/iccakm50778.2021.9357744","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357744","url":null,"abstract":"Live the way you want to be remembered. Jeff Bezos founder of Amazon have very rightly quoted “Your brand is what people say about you when you're not in the room.” It is your reputation, how people feel about you. Though branding has been very popular since times immemorial and has always been associated with businesses, but personal branding has become fundamental with the arrival of social media and gig economy. There has been drastic cultural shift from shyness to look-at-me attitude. If you are not branding yourself, be assured that others would be doing that for you. The power of personal branding improves likelihood of career attainment. Individuals reach pinnacles of success when they find ways to continually grow and improve their brand. This paper discusses about the need of personal branding in the present scenario and focusses on the practical ways one can use to build his or her personal brand. It throws light on how personal branding leads to business success, financial security and business longevity. The tool is used sentiment analysis1 to see how strong brands of famous personalities are based on social media posts.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This project is all about prediction of turnover of a company using machine learning. From this machine learning model, it can easily predict the next outcome in terms of turnover or whichever is equivalent to it. Future result prediction is very helpful for better understanding of market trends and stocks by using simple machine learning techniques. For this particular project, an Indian automobile industry has been selected for car sales prediction in the era of covid-19. This project shows, in the tough time of covid-19, if every other thing remains constant, what will be the sales trend for various automobile companies. will the graph go downwards or upwards? By using various machine learning techniques, it can predict the trend of graphs and in this project, it has been tried to show like this.
{"title":"Sales Forecast of Manufacturing Companies using Machine Learning navigating the Pandemic like COVID-19","authors":"Prabhat Sharma, Shreyansh Khater, Vasudha Vashisht","doi":"10.1109/iccakm50778.2021.9357751","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357751","url":null,"abstract":"This project is all about prediction of turnover of a company using machine learning. From this machine learning model, it can easily predict the next outcome in terms of turnover or whichever is equivalent to it. Future result prediction is very helpful for better understanding of market trends and stocks by using simple machine learning techniques. For this particular project, an Indian automobile industry has been selected for car sales prediction in the era of covid-19. This project shows, in the tough time of covid-19, if every other thing remains constant, what will be the sales trend for various automobile companies. will the graph go downwards or upwards? By using various machine learning techniques, it can predict the trend of graphs and in this project, it has been tried to show like this.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357700
K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi
In recent advancement in cloud computing, Traffic Redundancy Elimination (TRE) offers an effective solution to reduce the bandwidth cost. It is found that both short-term and long term data redundancy tends to appear in the network traffic and the TRE - trace driven approach captures both the data traffic redundancy. In this paper, we hence improve the design of a cooperative end-to-end TRE solution in order to improve the process of detection and removal of data redundancy between multiple layers, where the operations between them is in cooperative manner. The proposed method uses a self-adaptive prediction algorithm to increase the efficiency of TRE in multi-layer design that uses hit ratio of predictions to adjust dynamically the prediction window size. The experiment evaluation shows that proposed method reduces the operational cost in terms of reduced energy and makespan through proper scheduling.
{"title":"End-to-End Elimination of Traffic Elimination Using Self-Adaptive Prediction Model in Cloud","authors":"K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi","doi":"10.1109/ICCAKM50778.2021.9357700","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357700","url":null,"abstract":"In recent advancement in cloud computing, Traffic Redundancy Elimination (TRE) offers an effective solution to reduce the bandwidth cost. It is found that both short-term and long term data redundancy tends to appear in the network traffic and the TRE - trace driven approach captures both the data traffic redundancy. In this paper, we hence improve the design of a cooperative end-to-end TRE solution in order to improve the process of detection and removal of data redundancy between multiple layers, where the operations between them is in cooperative manner. The proposed method uses a self-adaptive prediction algorithm to increase the efficiency of TRE in multi-layer design that uses hit ratio of predictions to adjust dynamically the prediction window size. The experiment evaluation shows that proposed method reduces the operational cost in terms of reduced energy and makespan through proper scheduling.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357725
S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala
Quick Sort is a famous algorithm. It was the fastest algorithm at one point in time. However, sometimes it can give polynomial time complexity. The only thing that is important in this algorithm is the selection of Pivot Element. In this paper, we proposed a new algorithm, which is based on Quick Sort, and through our testing, we conclude that this algorithm is giving good results for small as well as large data sets.
{"title":"Quicker Sort Algorithm: Upgrading time complexity of Quick Sort to Linear Logarithmic","authors":"S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala","doi":"10.1109/iccakm50778.2021.9357725","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357725","url":null,"abstract":"Quick Sort is a famous algorithm. It was the fastest algorithm at one point in time. However, sometimes it can give polynomial time complexity. The only thing that is important in this algorithm is the selection of Pivot Element. In this paper, we proposed a new algorithm, which is based on Quick Sort, and through our testing, we conclude that this algorithm is giving good results for small as well as large data sets.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/iccakm50778.2021.9357723
Oussama Senouci, Z. Aliouat, S. Harous
Recently, many researches on Vehicular Ad Hoc Networks (VANETs) have been performed because of the many related applications. Data dissemination is among the challenging issues face by these kinds of networks to overcome several problems, such as broadcast storm, and network fragmentation. In this respect, the present work proposes a new Geocast-based Safety Information Dissemination protocol for VANETs, called Geo-SID. The proposed protocol is used for dissemination of safety information in a V2V scenario. It is specifically designed and suitable for an urban environment. The main goal of Geo-SID scheme is to perform the safety information dissemination process within a Zone of Relevance (ZoR) and without using the Zone of Forwarding (ZoF) similar to existing dissemination protocols in the literature. Furthermore, our solution aims to eliminate the broadcast storm problem by avoiding irrelevant alert messages and providing an efficient safety data dissemination across a ZoR area by extending the coverage area, reducing the network overhead and improving the latency. We simulate our proposed protocol using network simulator NS-3 and SUMO environment. Our proposed protocol outperforms similar protocols available in the literature based on the obtained simulation results.
近年来,由于车载自组织网络(Vehicular Ad Hoc Networks, vanet)的应用越来越广泛,引起了人们的广泛关注。数据传播是这类网络面临的挑战之一,需要克服广播风暴和网络碎片化等问题。在这方面,本工作提出了一种新的基于地质cast的VANETs安全信息传播协议,称为Geo-SID。提议的协议用于在V2V场景中传播安全信息。它是专门设计的,适合城市环境。Geo-SID方案的主要目标是在相关区域(ZoR)内执行安全信息传播过程,而不使用与文献中现有传播协议类似的转发区域(ZoF)。此外,我们的解决方案旨在通过避免不相关的警报消息来消除广播风暴问题,并通过扩展覆盖区域,减少网络开销和改善延迟,在ZoR区域内提供有效的安全数据传播。我们使用网络模拟器NS-3和SUMO环境对所提出的协议进行了仿真。基于获得的仿真结果,我们提出的协议优于文献中可用的类似协议。
{"title":"Geo-SID: A new Geocast Safety Information Dissemination protocol in VANET for urban areas","authors":"Oussama Senouci, Z. Aliouat, S. Harous","doi":"10.1109/iccakm50778.2021.9357723","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357723","url":null,"abstract":"Recently, many researches on Vehicular Ad Hoc Networks (VANETs) have been performed because of the many related applications. Data dissemination is among the challenging issues face by these kinds of networks to overcome several problems, such as broadcast storm, and network fragmentation. In this respect, the present work proposes a new Geocast-based Safety Information Dissemination protocol for VANETs, called Geo-SID. The proposed protocol is used for dissemination of safety information in a V2V scenario. It is specifically designed and suitable for an urban environment. The main goal of Geo-SID scheme is to perform the safety information dissemination process within a Zone of Relevance (ZoR) and without using the Zone of Forwarding (ZoF) similar to existing dissemination protocols in the literature. Furthermore, our solution aims to eliminate the broadcast storm problem by avoiding irrelevant alert messages and providing an efficient safety data dissemination across a ZoR area by extending the coverage area, reducing the network overhead and improving the latency. We simulate our proposed protocol using network simulator NS-3 and SUMO environment. Our proposed protocol outperforms similar protocols available in the literature based on the obtained simulation results.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-19DOI: 10.1109/ICCAKM50778.2021.9357762
Deghima Manel, Lemia Louail, S. Harous
In a wireless sensor network, the sensor nodes collect information from the environment where they are deployed and send it to the base station, also called the sink, to be delivered to the end user. Many metrics such as the latency of communications and the energy consumption can be affected by the position of the sink. This position should be found before exploiting the network and routing information. In this paper, we propose two sink placement techniques in a wireless sensor network using the position of the other nodes in the network in order to minimize the latency of communication and the energy consumption. The computed position of the sink is as close as possible to every node of the network. Simulation results show that the average latency of communication and the average energy consumption of both proposed sink placement techniques are better than similar works existing in the literature.
{"title":"Single sink position in wireless sensor networks","authors":"Deghima Manel, Lemia Louail, S. Harous","doi":"10.1109/ICCAKM50778.2021.9357762","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357762","url":null,"abstract":"In a wireless sensor network, the sensor nodes collect information from the environment where they are deployed and send it to the base station, also called the sink, to be delivered to the end user. Many metrics such as the latency of communications and the energy consumption can be affected by the position of the sink. This position should be found before exploiting the network and routing information. In this paper, we propose two sink placement techniques in a wireless sensor network using the position of the other nodes in the network in order to minimize the latency of communication and the energy consumption. The computed position of the sink is as close as possible to every node of the network. Simulation results show that the average latency of communication and the average energy consumption of both proposed sink placement techniques are better than similar works existing in the literature.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}