Pub Date : 2012-02-29DOI: 10.5121/IJCSES.2012.3103
Z. Rezaei
A wireless sensor network (WSN) consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the network is equipped with a battery, but it is almost very difficult to change or recharge batteries; therefore, the crucial question is: “how to prolong the network lifetime to such a long time?” Hence, maximizing the lifetime of the network through minimizing the energy is an important challenge in WSN; sensors cannot be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. Considering that energy saving acts as one of the hottest topics in wireless sensor networks, we will survey the main techniques used for energy conservation in sensor networks. The main focus of this article is primarily on duty cycling schemes which represent the most compatible technique for energy saving and we also focus on the data-driven approaches that can be used to improve the energy efficiency. Finally, we will make a review on some communication protocols proposed for sensor networks.
{"title":"Energy Saving in Wireless Sensor Networks","authors":"Z. Rezaei","doi":"10.5121/IJCSES.2012.3103","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3103","url":null,"abstract":"A wireless sensor network (WSN) consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the network is equipped with a battery, but it is almost very difficult to change or recharge batteries; therefore, the crucial question is: “how to prolong the network lifetime to such a long time?” Hence, maximizing the lifetime of the network through minimizing the energy is an important challenge in WSN; sensors cannot be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. Considering that energy saving acts as one of the hottest topics in wireless sensor networks, we will survey the main techniques used for energy conservation in sensor networks. The main focus of this article is primarily on duty cycling schemes which represent the most compatible technique for energy saving and we also focus on the data-driven approaches that can be used to improve the energy efficiency. Finally, we will make a review on some communication protocols proposed for sensor networks.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-02-29DOI: 10.5121/IJCSES.2012.3107
K. Sudharson, N. Partheeban
Analyzing and predicting behavior of node can lead to more secure and more appropriate defense mechanism for attackers in the Mobile Adhoc Network. In this work, models for dynamic recommendation based on fuzzy clustering techniques, applicable to nodes that are currently participate in the transmission of Adhoc Network. The approach focuses on both aspects of MANET mining and behavioral mining. Applying fuzzy clustering and mining techniques, the model infers the node's preferences from transmission logs. The fuzzy clustering approach, in this study, provides the possibility of capturing the uncertainty among node's behaviors. The results shown are promising and proved that integrating fuzzy approach provide us with more interesting and useful patterns which consequently making the recommender system more functional and robust.
{"title":"A SURVEY ON DETECT - DISCOVERING AND EVALUATING TRUST USING EFFICIENT CLUSTERING TECHNIQUE FOR MANET S","authors":"K. Sudharson, N. Partheeban","doi":"10.5121/IJCSES.2012.3107","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3107","url":null,"abstract":"Analyzing and predicting behavior of node can lead to more secure and more appropriate defense mechanism for attackers in the Mobile Adhoc Network. In this work, models for dynamic recommendation based on fuzzy clustering techniques, applicable to nodes that are currently participate in the transmission of Adhoc Network. The approach focuses on both aspects of MANET mining and behavioral mining. Applying fuzzy clustering and mining techniques, the model infers the node's preferences from transmission logs. The fuzzy clustering approach, in this study, provides the possibility of capturing the uncertainty among node's behaviors. The results shown are promising and proved that integrating fuzzy approach provide us with more interesting and useful patterns which consequently making the recommender system more functional and robust.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2414
A. Azeem, K. Khan, Pramod
Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.
{"title":"Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey","authors":"A. Azeem, K. Khan, Pramod","doi":"10.5121/IJCSES.2011.2414","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2414","url":null,"abstract":"Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2413
A. Mittal, A. Shrivastava, M. Manoria
Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time, its commercial nature is causing increase vulnerability to enhance cyber crimes and there has been an enormous increase in the number of DDOS (distributed denial of service attack) attacks on the internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of DDoS attacks. In this paper basically summarizing different techniques of DDoS and its countermeasures by different methods such as Bloom Filter, Trace Back method, Independent Component Analysis and TCP Flow Analysis.
{"title":"A Review of DDOS Attack and its Countermeasures in TCP Based Networks","authors":"A. Mittal, A. Shrivastava, M. Manoria","doi":"10.5121/IJCSES.2011.2413","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2413","url":null,"abstract":"Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time, its commercial nature is causing increase vulnerability to enhance cyber crimes and there has been an enormous increase in the number of DDOS (distributed denial of service attack) attacks on the internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of DDoS attacks. In this paper basically summarizing different techniques of DDoS and its countermeasures by different methods such as Bloom Filter, Trace Back method, Independent Component Analysis and TCP Flow Analysis.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129911557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2405
S. Rao, S. V. Chalam, D. Rao
{"title":"A Survey On Mac Protocols For Wireless Multimedia Networks","authors":"S. Rao, S. V. Chalam, D. Rao","doi":"10.5121/IJCSES.2011.2405","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2405","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2401
AlaaYaseenTaqa, LiangShing Ng, A. Joshi
Displaying visual data in a graphical distributed application is one of the main challenges and constraints that should be studied in real time applications. Many problems could be reported in using multicomputing for real time visual applications. These problems are identified throughout this survey, and are classified into two main categories. The first is computation and transfer time while the second is display speed. The real bottleneck in using grid or cloud computing in such applications is whether the communication time between nodes (inside the cloud) increases to the point of degrading overall application performance. This survey paper describes the impact of time and communication speed on applying visual systems on a grid or in cloud computing.
{"title":"The Challenges Of Using Multicomputing In Real Time Visualapplications","authors":"AlaaYaseenTaqa, LiangShing Ng, A. Joshi","doi":"10.5121/IJCSES.2011.2401","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2401","url":null,"abstract":"Displaying visual data in a graphical distributed application is one of the main challenges and constraints that should be studied in real time applications. Many problems could be reported in using multicomputing for real time visual applications. These problems are identified throughout this survey, and are classified into two main categories. The first is computation and transfer time while the second is display speed. The real bottleneck in using grid or cloud computing in such applications is whether the communication time between nodes (inside the cloud) increases to the point of degrading overall application performance. This survey paper describes the impact of time and communication speed on applying visual systems on a grid or in cloud computing.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2404
P. Pahwa, Shweta Taneja, Garima Thakur
Data warehouse is used to provide effective results from multidimensional data analysis. The accuracy and correctness of these results depend on the quality of the data. To improve data quality, data must be properly extracted, transformed and loaded into the data warehouse. This ETL process is the key to the success of a data warehouse. In this paper we propose a conceptual ETL framework for an object oriented data warehouse design, the framework is called UCLEAN. This framework takes into account the concept of requirements of the users .The data is extracted from different UML sources and is converted into a multidimensional model. It is then cleaned and loaded in the data warehouse. We validate the effectiveness of the framework through a case study.
{"title":"UCLEAN : A REQUIREMENT BASED OBJECT - ORIENTED ETL FRAMEWORK","authors":"P. Pahwa, Shweta Taneja, Garima Thakur","doi":"10.5121/IJCSES.2011.2404","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2404","url":null,"abstract":"Data warehouse is used to provide effective results from multidimensional data analysis. The accuracy and correctness of these results depend on the quality of the data. To improve data quality, data must be properly extracted, transformed and loaded into the data warehouse. This ETL process is the key to the success of a data warehouse. In this paper we propose a conceptual ETL framework for an object oriented data warehouse design, the framework is called UCLEAN. This framework takes into account the concept of requirements of the users .The data is extracted from different UML sources and is converted into a multidimensional model. It is then cleaned and loaded in the data warehouse. We validate the effectiveness of the framework through a case study.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2412
S. Prabhu, S. Sophia
Wireless Sensor Networks (WSNs), is one of the most rapidly growing scientific domain. This is because of the development of advanced sensor nodes with extremely low cost and the potential applications of such sensor nodes are ever growing. WSNs are web of sensor nodes with a set of processors and limited memory unit embedded in it. Reliable routing of packets from sensor nodes to its base station is the most important task for these networks. Routing in WSN is bit more complex than other wired or wireless networks. The conventional routing protocols cannot be used here due to its battery powered nodes. To support scalability, energy efficiency and efficient routing, nodes are often grouped in to non-overlapping clusters. This paper gives a crisp introduction on clustering process in WSNs. The survey of different distributed clustering algorithms (adaptive clustering algorithms) used in WSNs, based on some metrics such as cluster count, cluster stability, cluster head mobility, cluster head role, clustering objective and cluster head selection is done. The study concludes with comparison of few distributed clustering algorithms in WSNs based on these metrics.
{"title":"A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks","authors":"S. Prabhu, S. Sophia","doi":"10.5121/IJCSES.2011.2412","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2412","url":null,"abstract":"Wireless Sensor Networks (WSNs), is one of the most rapidly growing scientific domain. This is because of the development of advanced sensor nodes with extremely low cost and the potential applications of such sensor nodes are ever growing. WSNs are web of sensor nodes with a set of processors and limited memory unit embedded in it. Reliable routing of packets from sensor nodes to its base station is the most important task for these networks. Routing in WSN is bit more complex than other wired or wireless networks. The conventional routing protocols cannot be used here due to its battery powered nodes. To support scalability, energy efficiency and efficient routing, nodes are often grouped in to non-overlapping clusters. This paper gives a crisp introduction on clustering process in WSNs. The survey of different distributed clustering algorithms (adaptive clustering algorithms) used in WSNs, based on some metrics such as cluster count, cluster stability, cluster head mobility, cluster head role, clustering objective and cluster head selection is done. The study concludes with comparison of few distributed clustering algorithms in WSNs based on these metrics.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2407
P. Latchoumy, P. Sheik, A. Khader
Grid computing is defined as a hardware and software infrastructure that enables coordinated resource sharing within dynamic organizations. In grid computing, the probability of a failure is much greater than in traditional parallel computing. Therefore, the fault tolerance is an important property in order to achieve reliability, availability and QOS. In this paper, we give a survey on various fault tolerance techniques, fault management in different systems and related issues. A fault tolerance service deals with various types of resource failures, which include process failure, processor failure and network failures. This survey provides the related research results about fault tolerance in distinct functional areas of grid infrastructure and also gave the future directions about fault tolerance techniques, and it is a good reference for researcher.
{"title":"SURVEY ON FAULT TOLERANCE IN GRID COMPUTING","authors":"P. Latchoumy, P. Sheik, A. Khader","doi":"10.5121/IJCSES.2011.2407","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2407","url":null,"abstract":"Grid computing is defined as a hardware and software infrastructure that enables coordinated resource sharing within dynamic organizations. In grid computing, the probability of a failure is much greater than in traditional parallel computing. Therefore, the fault tolerance is an important property in order to achieve reliability, availability and QOS. In this paper, we give a survey on various fault tolerance techniques, fault management in different systems and related issues. A fault tolerance service deals with various types of resource failures, which include process failure, processor failure and network failures. This survey provides the related research results about fault tolerance in distinct functional areas of grid infrastructure and also gave the future directions about fault tolerance techniques, and it is a good reference for researcher.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124663164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}