In a short time virtual position based routing has established itself as a potent research area in wireless sensor networks (WSN). Although GPS based routing solution are available but they have the disadvantages of being costly, have limited indoor operation and network unreliability in sensor networks creates significant overhead on geographical routing. Virtual routing protocols provide some remedial measures with desirable trade offs between performances and overhead that occur in the case of geographical routing. In this paper an improved localization method called VCP-M is proposed followed by a greedy routing method. A good localization method in wireless sensor network reduces overhead on nodes in terms of receiving and sending packets. A node in WSN has limited amount of energy, so proper utilization of energy is of utmost importance. The proposed localization method in the protocol reduces the number of packets generated in the network significantly. This results in less overhead on the nodes to process the packet. So energy of the nodes are utilized without much wastage.
{"title":"Virtual Coordinates Routing Using VCP-M in Wireless Sensor Network","authors":"Raj Anwit, Prabhat Kumar, M. Singh","doi":"10.1109/CICN.2014.95","DOIUrl":"https://doi.org/10.1109/CICN.2014.95","url":null,"abstract":"In a short time virtual position based routing has established itself as a potent research area in wireless sensor networks (WSN). Although GPS based routing solution are available but they have the disadvantages of being costly, have limited indoor operation and network unreliability in sensor networks creates significant overhead on geographical routing. Virtual routing protocols provide some remedial measures with desirable trade offs between performances and overhead that occur in the case of geographical routing. In this paper an improved localization method called VCP-M is proposed followed by a greedy routing method. A good localization method in wireless sensor network reduces overhead on nodes in terms of receiving and sending packets. A node in WSN has limited amount of energy, so proper utilization of energy is of utmost importance. The proposed localization method in the protocol reduces the number of packets generated in the network significantly. This results in less overhead on the nodes to process the packet. So energy of the nodes are utilized without much wastage.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"19 1","pages":"402-407"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79306944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaofang Hu, Gang Feng, Shukai Duan, W. Yin, Guanrong Chen
This paper proposes and investigates a memristor-based chaotic system by incorporating an HP TiO2 memristor into the canonical Chen's chaotic system. More precisely, a charge-controlled memristor model with some appropriate boundary conditions is introduced. The relationship between the electric charge and the flux passing through the memristor is formulated and then employed as a nonlinear term in the constructed chaotic system. The rich dynamical behaviors of the memristor-based system are demonstrated by calculating the Lyapunov exponent spectrum and Lyapunov dimension, observing the chaotic attractors, analyzing the bifurcations.
{"title":"A Memristor-Based Chaotic System with Bifurcation Analysis","authors":"Xiaofang Hu, Gang Feng, Shukai Duan, W. Yin, Guanrong Chen","doi":"10.1109/CICN.2014.81","DOIUrl":"https://doi.org/10.1109/CICN.2014.81","url":null,"abstract":"This paper proposes and investigates a memristor-based chaotic system by incorporating an HP TiO2 memristor into the canonical Chen's chaotic system. More precisely, a charge-controlled memristor model with some appropriate boundary conditions is introduced. The relationship between the electric charge and the flux passing through the memristor is formulated and then employed as a nonlinear term in the constructed chaotic system. The rich dynamical behaviors of the memristor-based system are demonstrated by calculating the Lyapunov exponent spectrum and Lyapunov dimension, observing the chaotic attractors, analyzing the bifurcations.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"329-333"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84792252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since last few years, users have been paying significant attention and interest towards the WiMAX Internet technology because of the salient features i.e. Higher data rate, broad coverage, quality of service (QoS), scalability, security, and mobility support to the subscribers. Mobile WiMAX (IEEE 802.16e) supports the handover process and mobility of subscriber stations. WiMAX network security is a vital requirement to increase the reliability and to prevent from the various attacks. Implementation of top level security is highly required to lessen the vulnerabilities. Jamming attack, scrambling attack and water-torture attack are among the most severe threats to the physical layer of mobile WiMAX. This paper presents a collaborative attack model based on the combination of scrambling and water-torture attacks. Analysis of the paper shows that the cooperation of two or more attacks/attackers may be more devastating for the network security.
{"title":"Collaborative Attack Model at Physical Layer of Mobile WiMAX Network","authors":"V. Jatav, Vrijendra Singh","doi":"10.1109/CICN.2014.169","DOIUrl":"https://doi.org/10.1109/CICN.2014.169","url":null,"abstract":"Since last few years, users have been paying significant attention and interest towards the WiMAX Internet technology because of the salient features i.e. Higher data rate, broad coverage, quality of service (QoS), scalability, security, and mobility support to the subscribers. Mobile WiMAX (IEEE 802.16e) supports the handover process and mobility of subscriber stations. WiMAX network security is a vital requirement to increase the reliability and to prevent from the various attacks. Implementation of top level security is highly required to lessen the vulnerabilities. Jamming attack, scrambling attack and water-torture attack are among the most severe threats to the physical layer of mobile WiMAX. This paper presents a collaborative attack model based on the combination of scrambling and water-torture attacks. Analysis of the paper shows that the cooperation of two or more attacks/attackers may be more devastating for the network security.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"51 1","pages":"787-792"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85082326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secure communication is a critical issue in wireless sensor network (WSN). Sensor networks are comprised of a huge number of battery operated general purpose sensor nodes with a small number gateway nodes or base stations. Gateways are more authoritative than ordinary sensor nodes. In this paper, an intensive hashing and symmetric key cryptography based approach is proposed to secure data communication in WSN to achieve preservation of data integrity and confidentiality. Results indicate that using this approach there is very small energy consumption in cluster based WSN.
{"title":"Secure Communication for Cluster Based Wireless Sensor Network","authors":"Koushik Banerjee, H. Sharma, B. Chaurasia","doi":"10.1109/CICN.2014.183","DOIUrl":"https://doi.org/10.1109/CICN.2014.183","url":null,"abstract":"Secure communication is a critical issue in wireless sensor network (WSN). Sensor networks are comprised of a huge number of battery operated general purpose sensor nodes with a small number gateway nodes or base stations. Gateways are more authoritative than ordinary sensor nodes. In this paper, an intensive hashing and symmetric key cryptography based approach is proposed to secure data communication in WSN to achieve preservation of data integrity and confidentiality. Results indicate that using this approach there is very small energy consumption in cluster based WSN.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"18 1","pages":"867-871"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81807801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CIMS is short for the computer information management system, which has been widely applied to the field of modern teaching since 2004s. Teaching industry is the area of strong planning. Especially in the depressed study environment and the fierce competition among the education departments, how to use modern tools, allocate the multimedia technology and seek for benefit is one of the measures which every education department has to take. Based on our university's actual application condition, this paper briefly describes the application of CIMS in the foreign linguistics teaching for higher education.
{"title":"The Development of CIMS in Foreign Linguistics Teaching for Higher Education","authors":"Wei Wei","doi":"10.1109/CICN.2014.234","DOIUrl":"https://doi.org/10.1109/CICN.2014.234","url":null,"abstract":"CIMS is short for the computer information management system, which has been widely applied to the field of modern teaching since 2004s. Teaching industry is the area of strong planning. Especially in the depressed study environment and the fierce competition among the education departments, how to use modern tools, allocate the multimedia technology and seek for benefit is one of the measures which every education department has to take. Based on our university's actual application condition, this paper briefly describes the application of CIMS in the foreign linguistics teaching for higher education.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"1117-1120"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80478699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.
{"title":"Real Time Detection System for Malicious URLs","authors":"Nupur S. Gawale, N. Patil","doi":"10.1109/CICN.2014.181","DOIUrl":"https://doi.org/10.1109/CICN.2014.181","url":null,"abstract":"Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"77 1","pages":"856-860"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80757216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a wideband circular micro strip patch antenna design is proposed and it will be suitable for wireless communication for GPS, GSM, CDMA, 3G, 4G, Wi-Fi, W-MAX, Bluetooth, and W-LAN. This antenna is designed on dielectric substrate that having the dielectric constant 3.2 and height of substrate is 0.762mm. The proposed structure of the antenna is simulated on CST simulation software and the simulated return loss is less than-10dB for the frequency range 1.6 - 15 GHz and higher frequencies. A circular micro strip antenna is a narrow band but with the modified ground plane, this antenna shows the wideband response because it's Q (Quality factor) and bandwidth is inversely proportional to Q, therefore a narrowband circular patch work as a wideband antenna. The proposed antenna can be used for GSM, GPS, PCS, Bluetooth, W-LAN and UWB spectrum.
{"title":"A Wideband Circular Patch Antenna with Low Pass Filter on a Same Substrate for Rectenna Application","authors":"T. Kumar, Mithilesh Kumar","doi":"10.1109/CICN.2014.15","DOIUrl":"https://doi.org/10.1109/CICN.2014.15","url":null,"abstract":"In this paper, a wideband circular micro strip patch antenna design is proposed and it will be suitable for wireless communication for GPS, GSM, CDMA, 3G, 4G, Wi-Fi, W-MAX, Bluetooth, and W-LAN. This antenna is designed on dielectric substrate that having the dielectric constant 3.2 and height of substrate is 0.762mm. The proposed structure of the antenna is simulated on CST simulation software and the simulated return loss is less than-10dB for the frequency range 1.6 - 15 GHz and higher frequencies. A circular micro strip antenna is a narrow band but with the modified ground plane, this antenna shows the wideband response because it's Q (Quality factor) and bandwidth is inversely proportional to Q, therefore a narrowband circular patch work as a wideband antenna. The proposed antenna can be used for GSM, GPS, PCS, Bluetooth, W-LAN and UWB spectrum.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"17-20"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81328354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Sensor Network consists of power-constrained sensing devices known as sensing nodes. The difference between WSN and other networks lies in the fact that senor nodes are energy constrained devices. In order to efficiently utilize the energy consumption of the sensor network various clustering algorithms are proposed. In this paper we have focused on two hierarchical clustering based routing protocol which are efficient clustering algorithms helps in extending the lifetime of the network. SEP and DEC are some proposed algorithms to achieve energy efficiency. In this paper, we will simulate the above algorithms in mat lab and analyse their results on various performance parameters, stability region, instable region, network lifetime throughput and reliability.
{"title":"Performance Study of SEP and DEC Hierarchical Clustering Algorithm for Heterogeneous WSN","authors":"M. Tewari, K. S. Vaisla","doi":"10.1109/CICN.2014.92","DOIUrl":"https://doi.org/10.1109/CICN.2014.92","url":null,"abstract":"Wireless Sensor Network consists of power-constrained sensing devices known as sensing nodes. The difference between WSN and other networks lies in the fact that senor nodes are energy constrained devices. In order to efficiently utilize the energy consumption of the sensor network various clustering algorithms are proposed. In this paper we have focused on two hierarchical clustering based routing protocol which are efficient clustering algorithms helps in extending the lifetime of the network. SEP and DEC are some proposed algorithms to achieve energy efficiency. In this paper, we will simulate the above algorithms in mat lab and analyse their results on various performance parameters, stability region, instable region, network lifetime throughput and reliability.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"38 1","pages":"385-389"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91262014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clustering can be used in MANET to enhance the network performance parameters such as its throughput and delay in the case when the number of hosts are in substantial quantity and are mobile. In this work, we demonstrate a clustering strategy that reduces the delay of the network and enhances the throughput using the cost based analysis. It also runs a re-clustering algorithm periodically where a new cluster is formed and helps in managing the scalable networks. Algorithms for clustering can be accomplished at routing stage or at higher levels. Formation of dynamic clusters assists in slenderizing overhead of a data packet, convolution of a node and Power Utilzation. Cost based Scalable Clustering is basically exploited to minimize network overhead. This work dispends an efficacious algorithm to volutes a cluster and its maintenance in Mobile ad-hoc networks by implementing Cost based Scalable Clustering.
{"title":"Cost Based Scalable Clustering in MANET","authors":"S. K. Gupta, P. Khatri, Prerna Agrawal","doi":"10.1109/CICN.2014.103","DOIUrl":"https://doi.org/10.1109/CICN.2014.103","url":null,"abstract":"Clustering can be used in MANET to enhance the network performance parameters such as its throughput and delay in the case when the number of hosts are in substantial quantity and are mobile. In this work, we demonstrate a clustering strategy that reduces the delay of the network and enhances the throughput using the cost based analysis. It also runs a re-clustering algorithm periodically where a new cluster is formed and helps in managing the scalable networks. Algorithms for clustering can be accomplished at routing stage or at higher levels. Formation of dynamic clusters assists in slenderizing overhead of a data packet, convolution of a node and Power Utilzation. Cost based Scalable Clustering is basically exploited to minimize network overhead. This work dispends an efficacious algorithm to volutes a cluster and its maintenance in Mobile ad-hoc networks by implementing Cost based Scalable Clustering.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"40 1","pages":"438-443"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89357654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An Organization need to understand their customers' behavior, preferences and future needs which depend upon past behavior. Web Usage Mining is an active research topic in which customers session clustering is done to understand the customers activities. This paper investigates the problem of mining frequent pattern and especially focuses on reducing the number of scans of the database and reflecting the importance of pages. In the present work a novel method of pattern mining is presented to solve the problem through FSTSOM. In this Paper, the proposed method is an improvement to the web log mining method and to the online navigational pattern forecasting. Here, Neural based approach i.e. Self Organizing Map (SOM) is used for clustering of sessions as a trend analysis. SOM depends on the clustering performance with the number of requests. In the proposed method, using the SOM algorithm for Frequent Sequential Traversal Pattern Mining called FSTSOM. In this method, first using SOM algorithm and getting some cluster of web-logs. Then loading that web-log cluster, which is nearly related to frequent pattern. After that applying Min-Max Weight of Page in Sequential Traversal Pattern. Finally, established good prediction with the number of data and the excellence of the results.
{"title":"An Enhancement in Clustering for Sequential Pattern Mining through Neural Algorithm Using Web Logs","authors":"Sheetal Sahu, P. Saurabh, Sandeep Rai","doi":"10.1109/CICN.2014.164","DOIUrl":"https://doi.org/10.1109/CICN.2014.164","url":null,"abstract":"An Organization need to understand their customers' behavior, preferences and future needs which depend upon past behavior. Web Usage Mining is an active research topic in which customers session clustering is done to understand the customers activities. This paper investigates the problem of mining frequent pattern and especially focuses on reducing the number of scans of the database and reflecting the importance of pages. In the present work a novel method of pattern mining is presented to solve the problem through FSTSOM. In this Paper, the proposed method is an improvement to the web log mining method and to the online navigational pattern forecasting. Here, Neural based approach i.e. Self Organizing Map (SOM) is used for clustering of sessions as a trend analysis. SOM depends on the clustering performance with the number of requests. In the proposed method, using the SOM algorithm for Frequent Sequential Traversal Pattern Mining called FSTSOM. In this method, first using SOM algorithm and getting some cluster of web-logs. Then loading that web-log cluster, which is nearly related to frequent pattern. After that applying Min-Max Weight of Page in Sequential Traversal Pattern. Finally, established good prediction with the number of data and the excellence of the results.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"758-764"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86766022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}