• No results found

Research Advancements in Computer Science and Communication

N/A
N/A
Protected

Academic year: 2021

Share "Research Advancements in Computer Science and Communication"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

(1)

Scanned by CamScanner

(2)

Paramount Publishing House



NEW DELHI



HYDERABAD Editor-in-Chief

Dr. A.Jagan

Convener, ICRACSC-2016 and HoD-CSE, BVRIT, Narsapur.

International Conference on

Research Advancements in

Computer Science and Communication

(ICRACSC-2016)

on 29 th & 30 th December 2016 Departments of CSE & IT

B.V. Raju Institute of Technology, Narsapur.

(3)

iv

International Conference on Research Advancements in Computer Science and Communication (ICRACSC-2016)

First Edition - 2016

Copyright ©

Departments of CSE & IT , B.V. Raju Institute of Technology, Narsapur.

ISBN : 978-93-85100-64-2 Price : 650.00

Paramount Publishing House

A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072. Ph. : 040-23161070, 040-64554822

Sales Offices :

Hyderabad

A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072. Ph. : 040-23161070, 040-64554822

Visakhapatnam

D.No.28-8-3, First Floor, Opp. Sri Venkateswara Theatre Outgate, Suryabagh, Visakhapatnam-530 002.

Phones : 0891-6639247 & 0891-6646082.

New Delhi

C/14, SDIDC Work Centre Jhilmil Colony, New Delhi-100095. Phone: 011-2162365.

paramountpublishers@gmail.com | alluriasr2005@yahoo.com

Published by Manu Alluri for Paramount Publishing House and printed by him at Sai Thirumala Printers.

All rights are reserved. No part of this publication which is material protected by this copyright notice may not be reproduced or transmitted or utilized or stored in any form or by any means now known or hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording or by any information storage or retrieval system, without prior written permission from Paramount Publishing House.

Information contained in this book has been published by Paramount Publishing House, Hyderabad and has been obtained by its Author(s) from sources believed to be reliable and are correct to the best of their knowledge. However, the Publisher is not liable for any errors, omissions or damages arising out of use of this information and specifically disclaim any implied warranties or merchantability or fitness for any particular use. The authors are solely responsible for the contents published in the paper.

i v

(4)

xxxv

Contents

1. A Efficient Schedulingtechnique basedOn Wireless Mesh Device Pair Classification for WMN

- Asha C.N & Dr. Basavaraju T.G. 1

2. Low Power Area Efficient High Speed Square Root Carry Select Adder built on novel 1-bit full adder

- G. Kanaka Durga, DBV Ravi Sankar, Ch.Srujana, K.Ashwini & B.Aparna 6 3. A Review on Customer Data Clustering using Center based Density Algorithm

- Sumalatha Potteti & Namita Parati 10

4. Quality of Service in Cloud Computing Systems

- Sirisha Potluri, Dr.Katta Subba Rao & P.Sree Lakshmi 15 5. A Survey on Stream Processing and Streaming Analytics for Real - time Big Data

- B. Srivani, Dr. N. Sandhya & S. Renu Deepti 19 6. OPass: An improved user authentication method for online transactions

- Bantu Saritha & N.Sabitha 24

7. Current State of Art (CSA): An Empirical Study on Object Oriented Design Software Metrics

- A.Phani Sheetal & Dr. G.Sridevi 29

8. Evaluating the Performance of Data Mining Techniques for Breast Cancer Prediction and Diagnosis

- K. Srikanth, Dr. S. Zahoor-Ul-Huq & K. Ishthaq Ahamed 34 9. Assessment onUnderstanding and Optimization of Throughput Capacityfor

Mobile Ad-hoc Networks

- P.V.Venkateswaramma & Dr.I.Ravi Prakash Reddy 39

10. Noise removal in Brain MRI Image

- N.Rajeswaran, C.Gokilavani, S.Arumugam & V.Ramaraju 45 11. Cloud Protective Covering: Associate Reputation-based Conviction Organization

for Cloud Services

- Shilpa Empati, A Ravi Kumar & Dr M. Ashok 50

12. A Study on Vertical and Broad-based Search Engines

- M.Swathi & M.Swetha 53

13. Multi-threats Resolving Strategies for Secure Mobile Adhoc Networks

- A.Anjaiah & Dr.A.Govardhan 57

14. A Survey of Comparison on Various Congestion Control Protocols for Wireless Sensor Networks

- S. Rama Devi & N. Pujitha 60

15. Information Retrieval System Using Semantic Annotation

- Jayaprada S & Venkata Rao M 63

Messages v-xii

Sl.No. Title of the Paper Page No.

(5)

xxxvi

16. A Protectedopposing-Complicity Data Involvementstructure for Activesets in the Cloud

- Arun Kumar. Mekala, M. Ashok & Dr A Ravi Kumar 68 17. Critique on Cloud Computing

- Ms.P.S.Latha Kalyampudi, Dr. P. Venkata Krishna & Vasuki GVM 71 18. File Reduplication Protocol in Adhoc Networks for Sharing Documents in P2P

- A.Aruna Jyothi & L.Prasanthi 78

19. An Approach Towards Consideration of Mobility Effects in Wireless Network

- G.Sravanthi, M.chaitanya kishore Reddy & A.Anjaiah 83 20. Optimal Node Selection and Alarm Exchange Technique for Reducing the

Security Cost in MANET

- Jayashree S Patil & Dr.K.V.N.Sunitha 86

21. Omni-channel Banking Solutions

- Sruthi & Swami Goud 90

22. Equalizing Performance Reliability and Correctness for Secure Distributed Transactions

- Mr.M.Badrinath, Mr.V.Pradeep Kumar & Dr.M.Gopichand 93 23. Exceptional concerns and major challenges in GSD Projects: An introduction

into course curriculum for students'

- S. Ramacharan 97

24. An Efficient Approach For Ids Based on Distributed Computing Using Modified Kernel K-means with C4.5

- Kotha Geetha 101

25. The Impact of Noun Ambiguity in Telugu Language Sentences using CSG Rules:

A Modern Approach

- Dr. J. Sreedhar, E.S.Madhan & P.Jayaram 105

26. Premise on Localization Sagacity in Wireless Sensor Networks

- Dr.G.Naga Satish, G.Naga Srikanth & Dr.P.Suresh Varma 109 27. A Mobile Cloud Security techniques and Challenges in Healthcare management

- E.S.Madhan, Dr. J. Sreedhar & P.Jayaram 114

28. Recommendations for Event Organizer

- Jyoti Dhaygude, Sanyukta Demgunde, Nishigandha Vadhane,

Priyanka Lavgude & Minakshi Vharkate 116

29. Mobile Gis in Groundwater Pollution Monitoring Application

- B.Kameswara Rao & A.S.N.Chakravarthy 119

30. Cloud Based Adaptive Sql Query Processor

- Mr.Jagadeeshreddy Vaka & Dr.J.M.S.V Ravi Kumar 123

31. A Contemplate Report on Various Clustering Algorithms

- P.PenchalaPrasad, Dr.F.SagayarajFrancis & Vinnakota Saran Chaitanya 127

Sl.No. Title of the Paper Page No.

(6)

xxxvii

Sl.No. Title of the Paper Page No.

32. Analyzation of Risk Factors for the Dengue Fever Outbreak with the Effect of Diffusion Path for Spatiotemporal Criterion

- Ramesh Babu Pittala, Janga Ravi Chander, M.Nagabhushana Rao &

Panuganti Srinivas 131

33. Reducing noise levels at computations on encrypted data in cloud computing through Homomorphic Encryption

- Mr.V.Biksham & D.Vasumathi 136

34. IoT and its Security Issues

- K.Divya, T.Navya Madhavi & K.Bhavya Nandana 142

35. Face recognition with Statistical Features on LBP based Fuzzy Co-occurrence Matrix

- Dr. P Chandra Sekhar Reddy 146

36. Characterization and Dynamic Mitigation of Embedded Memory Prefetchers

- Mr M Devendra & Dr. K.E. Sreenivasa Murthy 150

37. Detection of Heart Disease Severity using Novel Multilayer Perceptron Mining Model

- P.Sambasiva Rao & Dr. T.Uma Devi 156

38. Quality Analysis of e-shopping (B2C) portal based on AHP

- Rokhsar Mizna & Vijay Kumar Mantri 163

39. A Survey on Architecture Issues in Design of Mobile Ad Hoc Networks

- Dr.Neelakantappa.M & Dr.Amjan Shaik 167

40. A Threshold based Decision Making Strategy for Mobility Management for Wireless Mesh Network

- Chaya Devi. R & T. G. Basavaraju 175

41. A Study on Supervised Segmentation Techniques

- M.Soumya & Dr.Amjan Shaik 179

42. New Efficient and Energy-aware Clustering Algorithm for the OLSR Protocol

- Dr.Amjan Shaik & Dr.Neelakantappa.M 182

43. A multiclass SVM approach for Automatic emotion recognization using speech

- P.Jayaram, Dr.J.Sreedhar & E.S.Madhan 189

44. Automatic Dialect and Accent speech recognition of South Indian English

- Ashok Shigli, Ibrahim Patel & K Srinivasa Rao 192

45. A Study on Unsupervised Segmentation Techniques

- M Likitha & Dr.Amjan Shaik 198

46. Use of data mining techniques and statistical analysis for Gene Expression data and interpretation

- P. Mukesh, Sameen Fathima, D.Vasumathi & Avinash Singode 202 47. A Novel Code Mining Framework for Detection of Defects in Source Code

- K VenkataRamana & Dr K Venu Gopala Rao 206

48. Feature-Based Facial Expression Recognition from Image Sequences Using SVMS

- Dr. M Raja Sekar & Dr. N Sandhya 211

(7)

xxxviii

Sl.No. Title of the Paper Page No.

49. Selection of Biphone Speech Units for Telugu TTS

- Dr.K.V.N.Sunitha & P.Sunitha Devi 216

50. A Brief Review of Deep Learning Architectures involving Protein Sequence Classification

- T.Sudha Rani, Dr.A. Yesu Babu & Dr. Haritha 221

51. Linear Buckling Analysis of RCC Column Using Ansys

- Balachandu.Koya 226

52. A Novel Scheme with Guaranteed Quality of Service in Cloud Environment

- Mrs. J. Manjula 232

53. Energy Efficient Secure Key Management Schemes for WSNs and IoT

- Dr. M.Suresh Babu, Md.Raziuddin & Dr.D.Asha Devi 237 54. Predictive Analytics Framework for Big Data:Case Study

- S.KishorBabu & Dr.S.Vasavi ` 247

55. Non Linear Buckling Analysis of Rcc Column Using Ansys

- Balachandu.Koya 253

56. A Novel Framework for Detection of Routing Fault in MANET Using 2ACK

- M.V.Rajesh, T.V.S.Gireendranath & J.V.R.Murthy 260

57. Hypercube and its variants using NS2

- K. Karthik, Sudarson Jena & T. Venu Gopal 266

58. Object Oriented Design Factors to Assess the Impact of software augmentation or bugfix

- Subramanya Sarma Vadlamani 271

59. Towards Achieving Privacy and Security in Cloud Storage Data by Slicing Cryptography - A Review

- Deepthi Bolukonda & Vijaya Kumari. G 279

60. Medical Image segmentation and clustering methods and applications -A survey

- G.Vasavi & Dr. S.Jyothi 283

61. Cloud Storage Services and Privacy Protection

- Dr.J M S V Ravi Kumar 286

62. Active Overpowering for Information truth then Suspension Separated Service area Popular Wireless Instrument Grids

- Mr. L. Umananath Rao & Mr. S. Srinuvasa Rao 291

63. Performance Analysis of OICT using GQA Algorithm

- Dasaradha Ramaiah K & Dr. T. Venugopal 294

64. Multi-Authority Attribute Based Encryption with Semi-Anonymity and Fully- Anonymity

- Miss.S.Mounika & Mr.J.Ramesh Babu 299

65. Parallel Self Timed Adder using Full Swing GDI

- L.Babitha, Ch.Vandana, K. Madhava Rao, K. Ananda Kumar,

U.Gnaneshwara chary & I.B.K.Raju 302

(8)

xxxix

Sl.No. Title of the Paper Page No.

66. A Dynamic Data Distribution Strategy for Hadoop in Heterogeneous Environments

- V.Suresh Kumar & Mrs.P.Sree Lakshmi 306

67. Effort Estimation Based on Story Points in Agile Approaches: A Systematic Literature Review

- Ch. Prasada Rao, Dr. Rama Sree.S & S N S V S C. Ramesh 313 68. DOT Architecture for Muti-Cloud System

- Dasaradha Ramaiah K & Dr. T. Venugopal 317

69. Windowing of Unbounded Data Using Dataflow Model

- B.Deepthi, MVN SaiTeja & SaiCharan 322

70. ASurvey on Energy EfficientRoutingin Wireless Sensor Networks

- Ashok Kumar Nanda 325

71. A Brief review on Detection of Duplicate Defect Reports Using Natural Language Processing

- B.Deepthi, Priyanka Bose & D. Sai Suma 330

72. Word Sense Disambiguation Using Lesk

- B. Surekha, Dr. K. Vijaya Kumar & Mr. S. Siva Skandha 332 73. Recommender System Using Collaborative Filtering

- R.Swetha & Dr. M.Chiranjeevi 335

74. A Brief review on Face Detection Techniques Using Image Processing - B.Deepthi, T.RaghavendraGupta,ThoutReddyKeerthiReddy &

DanthuriSnehalatha 338

75. Image Resolution Enhancement Using DWT And Interpolation Techniques

- B. Santhosh & Akku Madhusudhan 340

76. A Circulated Three-Trip Steering Procedure to Escalation the Capability of Mixture Wireless Systems

- Mr. B.Santhosh krishna & Mrs. L.Pallavi 344

77. Cloud Protection: Supporting Character-based Faith Management for Cloud and Wireless Sensor Networks

- Miss.G.Keerthi & Mrs.Ch.Sreedevi 347

78. The Development of Big Data for Security incident and Event Management Systems

- Dr.Mani Sarma Vittap & Vijay Kumar Atmakur 350

79. A Survey of Reusability and Search for Code to Reuse

- T. Divya Kumari & Dr. T. Venu Gopal 357

80. Analysis of Performance and Complexity of Multi Layer Expandable Perceptron over Single Layer Perception

N.Satyanandam & Dr.Ch. Satyanarayana 363

(9)

International Conference on Research Advancements in Computer Science and Communication (ICRACSC-201 6)

60 ISBN : 978-93-85100-64-2

A Survey of Comparison on Various Congestion Control Protocols for Wireless Sensor Networks

S. Rama Devi

1

, N. Pujitha

2

1,2

Asst. Professor, Dept of IT, BVRITH, Hyderabad, India

Email: ramadevi.s@bvrithyderabad.edu.in

1

,Pujitha.n@bvrithyderabad.edu.in

2

ABSTRACT-

Wireless sensor networks (WSNs) are an emerging class of networks with a wide variety of potential applications in the fields of health, military, environmental monitoring and soon.

It is typically composed of multiple tiny devices equipped with limited sensin g, computing an d wireless commu nication capabilities There has been an increased focus towards developing transport protocols for WSNs in the research community. Congestion Control concentrates on enabling the network to recover from packet loss, congestion avoidance detects incipient congestion and prevents its occurrence. We provide a summary a nd comparison of existing congestion control protocols

Index terms: wireless sensor networks, transport protocols, congestion control, congestion avoidance

I. INTRODUCTION

A Wireless Sensor Network (WSN) is a highly distributed network consisting of a large number of tiny, low cost, lightweight wireless n odes deployed to mon itor an Environment or system These sensor nodes can sense, measure, and gather information from the environment and, based on some local decision process, they can transmit the sensed data to the user. Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health related areas [1][2]. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building.

Fig.1 Illustrates an example for WSN.

A WSN may also have some interesting features including self-organization, dynamic network topology, and multi-hop routing, which are important for many real world applications.

Wireless sensor network differ from other wireless ad hoc network in the sense that they are resource limited viz. power restrictions, memory, often prone to failure, densely deployed, topology chan ges, remotely managed. These are the constraints that make WSN a challenge.

Congestion control in WSNs has been largely implemented by using rate based approaches with the sources controlling the rate of the packets forwarded towards the sink. Periodic packet generation by the sources allow rate based congestion control as it enables an end-to end adaptation which has been successful in developing the internet architecture. However, nodes are not as relatively far apart from each other in WSNs (as in wired networks) with radio interference playing a major role in decreasing the successful packet delivery probabilities.

An increase in the traffic generation leads to degraded channel quality with corresponding increases in the loss rates experienced by the nodes.

Transport protocols for WSNs should provide end-to-end reliability and end-to-end QOS in an energy efficient way. The performance of a transport protocol for WSNs can be evaluated using metrics including: energy-efficiency, reliability, QOS metrics such as packet loss ratio, packet delivery latency, and fairness.

II. CONGESTION IN WIRELESS SENSOR NETWORKS

There are mainly two causes for congestion in WSNs. The first is due to packet arrival rate exceeding packet service rate.

This more likely occurs at sensor nodes close to the sink as

they usually have more combined upstream relay traffic. The

second is influenced by the link level performance such as

contention, interference and bit error. This type of congestion

occurs on the link. Congestion in WSNs has a direct impact

on energy-efficiency and application's QOS. First, the

congestion can cause buffer overflow and furthermore lead to

longer queuing time and more packet loss. Not only can the

packet loss degrade reliability and application's QOS, but also

wastes limited energy and lowers energy-efficiency. Second,

the congestion can still degrade link utilization third, the link-

level congestion usually results in transmission collisions if

contention based link protocols, for example CSMA (Carrier

Sense Multiple Access), are used to share radio resources.

References

Related documents

Abstract: To have a clear understanding of the convective precipitation over the Tibetan Plateau (TP) and its surrounding regions, this research systematically

As mentioned in point 3 above, the techniques used to measure the export competitiveness of Cameroon’s sawnwood industry are the Balassa index or Revealed Comparative

An example for the 3-product cordial labeling for the graph obtained by vertex switching of gear graph G 8 with respect to vertex of degree 3 in shown in Figure 1.

Risk factors for clinical anastomotic leakage and postoperative mortality in elective surgery for rectal cancer. Vignali A, Gianotti L, Braga M, Radaelli G, Malvezzi L, Di

The aim of this study is to determine the visual preferences of preservice teachers in the content of integral and to determine the relationship between the teaching anxiety

When the joint effects of individuals ’ characteristics are considered, the economic crisis brings about a slight increase in the inequalities in the probability of reporting

In this paper, we study the network of global interconnections between language communities, based on shared co-editing interests of Wikipedia editors, and show that although English

Although, the power of our analysis was reduced due to the small number of patients, our results suggest that MMP-7 serum level may be a prognostic factor for pa- tients with