Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508127
Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell
The PingER project was started by the SLAC National Accelerator Laboratory, Stanford, California for the purpose of monitoring end to end network performance. For the last eighteen years PingER has generated an enormous amount of data that has been stored in space separated files. However due to the difficulties faced in retrieving data efficiently, it has been proposed that all the data be put into the form of RDF triples. Interpreting and analyzing such large volumes of data becomes a primary concern. By making using of clustering algorithms new and interesting patterns can be observed in the data sets. Outlier analysis can be performed giving insight to the exceptions occurring in the dataset and analyzing the probable causes of such. Patterns could be observed based on the country to which the data belongs and comparisons can be drawn between the patterns between the different countries.
{"title":"Analysis and clustering of PingER network data","authors":"Anwesha Mal, A. Sabitha, Abhay Bansal, B. White, L. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508127","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508127","url":null,"abstract":"The PingER project was started by the SLAC National Accelerator Laboratory, Stanford, California for the purpose of monitoring end to end network performance. For the last eighteen years PingER has generated an enormous amount of data that has been stored in space separated files. However due to the difficulties faced in retrieving data efficiently, it has been proposed that all the data be put into the form of RDF triples. Interpreting and analyzing such large volumes of data becomes a primary concern. By making using of clustering algorithms new and interesting patterns can be observed in the data sets. Outlier analysis can be performed giving insight to the exceptions occurring in the dataset and analyzing the probable causes of such. Patterns could be observed based on the country to which the data belongs and comparisons can be drawn between the patterns between the different countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126108374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508156
P. Sengar, Surabhi Singh, Naman Garg
In this paper, we present a technique to separate touching objects. This technique is divided into two stages; first separation of objects is achieved by successive threshold slicing, in this process most objects are reduced in size. Then, in order to regain the approximate size and shape the separated objects are re-grown to their original forms under the guidelines of a set of rules. Pixels having the potential for re-growth are identified. The pixel is re-grown only if its re-growth does-not disturb the established separation. We therefore allow separated objects to approximately regain their shape and size by constrained re-growing while maintaining the established separation. In this paper, we apply this algorithm to Synthetic Aperture Radar (SAR) images of sea ice floes.
{"title":"A constrained re-growing concept for object separation in sea images","authors":"P. Sengar, Surabhi Singh, Naman Garg","doi":"10.1109/CONFLUENCE.2016.7508156","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508156","url":null,"abstract":"In this paper, we present a technique to separate touching objects. This technique is divided into two stages; first separation of objects is achieved by successive threshold slicing, in this process most objects are reduced in size. Then, in order to regain the approximate size and shape the separated objects are re-grown to their original forms under the guidelines of a set of rules. Pixels having the potential for re-growth are identified. The pixel is re-grown only if its re-growth does-not disturb the established separation. We therefore allow separated objects to approximately regain their shape and size by constrained re-growing while maintaining the established separation. In this paper, we apply this algorithm to Synthetic Aperture Radar (SAR) images of sea ice floes.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"56 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508154
Surbhi Kapoor, Pushpendra Kumar Pateriya
Video surveillance is the most important issue in today's world as crime is increasing at an alarming rate. Moving object detection is first step in video surveillance. Analyzing video scenes is a challenging task for humans. So, efficient algorithms are deployed to do so. Detection and tracking of objects in videos is critical for wide solicitation fields such as crime detection, fight detection, person identification etc. Many methods exist to analyze the object behavior which includes background subtraction, foreground detection, cross scene abnormal detection etc. This work presents a review on available techniques for analyzing the behavior along with comparative study among various methods.
{"title":"A study on various methods used in automatic video surveillance","authors":"Surbhi Kapoor, Pushpendra Kumar Pateriya","doi":"10.1109/CONFLUENCE.2016.7508154","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508154","url":null,"abstract":"Video surveillance is the most important issue in today's world as crime is increasing at an alarming rate. Moving object detection is first step in video surveillance. Analyzing video scenes is a challenging task for humans. So, efficient algorithms are deployed to do so. Detection and tracking of objects in videos is critical for wide solicitation fields such as crime detection, fight detection, person identification etc. Many methods exist to analyze the object behavior which includes background subtraction, foreground detection, cross scene abnormal detection etc. This work presents a review on available techniques for analyzing the behavior along with comparative study among various methods.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508183
V. Bhargavi, M. Seetha, S. Viswanadharaju
A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.
{"title":"A trust based secure routing scheme for MANETS","authors":"V. Bhargavi, M. Seetha, S. Viswanadharaju","doi":"10.1109/CONFLUENCE.2016.7508183","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508183","url":null,"abstract":"A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508180
Mamata Rath
With an objective of study and analysis of power efficient routing protocols in Mobile Adhoc Network(MANET), this paper presents a report on performance of Adhoc On Demand Distant Vector (AODV) oriented MANET routing protocols which are founded on power aware techniques and also support quality of service parameters and resource reservation strategies. The comparison is based on the type and extent of delay management techniques, Quality of service conditions and resource reservation methods used by these important protocols while minimizing the end to end delay during transmission. Secondly the paper also presents a complete analysis on the mechanism of routing , advantages and scope for further improvement for research in these protocols which will provide sufficient information and scope for further research in this magnificent area of MANET.
{"title":"Group based analysis of AODV related protocols in MANET","authors":"Mamata Rath","doi":"10.1109/CONFLUENCE.2016.7508180","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508180","url":null,"abstract":"With an objective of study and analysis of power efficient routing protocols in Mobile Adhoc Network(MANET), this paper presents a report on performance of Adhoc On Demand Distant Vector (AODV) oriented MANET routing protocols which are founded on power aware techniques and also support quality of service parameters and resource reservation strategies. The comparison is based on the type and extent of delay management techniques, Quality of service conditions and resource reservation methods used by these important protocols while minimizing the end to end delay during transmission. Secondly the paper also presents a complete analysis on the mechanism of routing , advantages and scope for further improvement for research in these protocols which will provide sufficient information and scope for further research in this magnificent area of MANET.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508126
Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell
The PingER End-End performance monitoring of the Internet, is led by the SLAC National Accelerator Laboratory. It was created to answer the growing need to monitor the network both to analyze current performance and to designate resources to optimize execution between research centers, and the universities and institutes co-operating on present and future operations. The monitoring support reflects the broad geographical area of the collaborations and requires a comprehensive number of research and resources. The data architecture retrieval and methodology of the interpretation have emerged over numerous years. Analyzing this data is the main challenge due to its high volume. By using correlation analysis, we can make crucial conclusions about how the network data affects the performance of the hosts and how it depends from countries to countries.
{"title":"Correlation analysis on real-time tab-delimited network monitoring data","authors":"Aditya Pan, Jahin Majumdar, Abhay Bansal, B. White, R. Cottrell","doi":"10.1109/CONFLUENCE.2016.7508126","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508126","url":null,"abstract":"The PingER End-End performance monitoring of the Internet, is led by the SLAC National Accelerator Laboratory. It was created to answer the growing need to monitor the network both to analyze current performance and to designate resources to optimize execution between research centers, and the universities and institutes co-operating on present and future operations. The monitoring support reflects the broad geographical area of the collaborations and requires a comprehensive number of research and resources. The data architecture retrieval and methodology of the interpretation have emerged over numerous years. Analyzing this data is the main challenge due to its high volume. By using correlation analysis, we can make crucial conclusions about how the network data affects the performance of the hosts and how it depends from countries to countries.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508120
Nitika Gupta, Shailendra Narayan Singh
A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.
{"title":"Wormhole attacks in MANET","authors":"Nitika Gupta, Shailendra Narayan Singh","doi":"10.1109/CONFLUENCE.2016.7508120","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508120","url":null,"abstract":"A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508123
S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy
Noise has always been the most important constraint upon the sensing of Primary User in the frequency spectrum. Evaluation of various spectrum sensing schemes under noise gives us a fair idea about their robustness. Energy detection is fast but other Sensing techniques are better when it comes to the performing under Noise. Simulations are done for the three techniques at different noise levels. Detection result at different SNR levels are plotted. Response of the Eigen detection is the least effected with change in SNR(20 dB) and a change of 13.74% in case of matched filter detection is observed and it has been found that Cyclostationary is less affected by noise as compare to Matched Filter detection. Eigen value detection it remained almost constant.
{"title":"Performance evaluation of spectrum Sensing techniques under Noise","authors":"S. Dhanda, Mayank Gupta, Achyut Sharma, R. Roy","doi":"10.1109/CONFLUENCE.2016.7508123","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508123","url":null,"abstract":"Noise has always been the most important constraint upon the sensing of Primary User in the frequency spectrum. Evaluation of various spectrum sensing schemes under noise gives us a fair idea about their robustness. Energy detection is fast but other Sensing techniques are better when it comes to the performing under Noise. Simulations are done for the three techniques at different noise levels. Detection result at different SNR levels are plotted. Response of the Eigen detection is the least effected with change in SNR(20 dB) and a change of 13.74% in case of matched filter detection is observed and it has been found that Cyclostationary is less affected by noise as compare to Matched Filter detection. Eigen value detection it remained almost constant.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/CONFLUENCE.2016.7508209
Munib ur Rahman, Himanshi, V. Deep, S. Rahman
Educational institutes have gone beyond the traditional way of learning by accepting the latest technologies and modern trends, making learning more innovative. The interactive technologies and Instant communication services have transformed the methods adopted for education into a more interactive, visualizable and accessible means. Education institutes in India, are in a process of adopting innovative techniques for creating a smart learning environment to nurture young talent. But according to National Survey findings, 13 out of every 100 Indians between 5-29 years drop out or refrain from going to school, as they do not consider education “necessary”. In this paper, we will discuss about how academic learning can be made reachable and motivating for the students using ICT and IoT, besides introducing them to their core subjects with interactive ways of Smart learning. Information Communication Technology promises a wide range of applications and devices for learning environments, whereas Internet of things is all about connecting devices, making them smart and self-controllable.
{"title":"ICT and internet of things for creating smart learning environment for students at education institutes in India","authors":"Munib ur Rahman, Himanshi, V. Deep, S. Rahman","doi":"10.1109/CONFLUENCE.2016.7508209","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508209","url":null,"abstract":"Educational institutes have gone beyond the traditional way of learning by accepting the latest technologies and modern trends, making learning more innovative. The interactive technologies and Instant communication services have transformed the methods adopted for education into a more interactive, visualizable and accessible means. Education institutes in India, are in a process of adopting innovative techniques for creating a smart learning environment to nurture young talent. But according to National Survey findings, 13 out of every 100 Indians between 5-29 years drop out or refrain from going to school, as they do not consider education “necessary”. In this paper, we will discuss about how academic learning can be made reachable and motivating for the students using ICT and IoT, besides introducing them to their core subjects with interactive ways of Smart learning. Information Communication Technology promises a wide range of applications and devices for learning environments, whereas Internet of things is all about connecting devices, making them smart and self-controllable.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The process of a sensor network is to control by a big number of parameters, such as the wireless duty cycle, the frequency of neighbor discovery inspirations, and the rate of sample sensors. In this paper we propose a reduced-complexity Genetic Algorithm (GA) for optimization of multi-hop sensor networks in two stages such as randomized and circular bottleneck network node scheduling. The goal of the system is to generate optimal number of sensor clusters with Cluster-Heads (CHs). The GA is used to adaptively create various components such as cluster-members; Performance improvement by using GA namely; packet delivery ratio and average latency have also been investigated. A full theoretical analysis and simulation results have been providing to display the efficacy of the proposed approach improved x-OR using GA showing efficiency better as compare to basic XOR method and producing maximum packet delivery ratio.
{"title":"Improvement of lifetime duty cycle using genetic algorithm and network coding in wireless sensor networks","authors":"Paurush Bhulania, Nikhil Gaur, Keithellakpam Poirei Federick","doi":"10.1109/CONFLUENCE.2016.7508192","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508192","url":null,"abstract":"The process of a sensor network is to control by a big number of parameters, such as the wireless duty cycle, the frequency of neighbor discovery inspirations, and the rate of sample sensors. In this paper we propose a reduced-complexity Genetic Algorithm (GA) for optimization of multi-hop sensor networks in two stages such as randomized and circular bottleneck network node scheduling. The goal of the system is to generate optimal number of sensor clusters with Cluster-Heads (CHs). The GA is used to adaptively create various components such as cluster-members; Performance improvement by using GA namely; packet delivery ratio and average latency have also been investigated. A full theoretical analysis and simulation results have been providing to display the efficacy of the proposed approach improved x-OR using GA showing efficiency better as compare to basic XOR method and producing maximum packet delivery ratio.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}