Scanned by CamScanner
Paramount Publishing House
NEW DELHI
HYDERABAD Editor-in-Chief
Dr. A.Jagan
Convener, ICRACSC-2016 and HoD-CSE, BVRIT, Narsapur.
International Conference on
Research Advancements in
Computer Science and Communication
(ICRACSC-2016)
on 29 th & 30 th December 2016 Departments of CSE & IT
B.V. Raju Institute of Technology, Narsapur.
iv
International Conference on Research Advancements in Computer Science and Communication (ICRACSC-2016)
First Edition - 2016
Copyright ©
Departments of CSE & IT , B.V. Raju Institute of Technology, Narsapur.
ISBN : 978-93-85100-64-2 Price : 650.00
Paramount Publishing House
A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072. Ph. : 040-23161070, 040-64554822
Sales Offices :
Hyderabad
A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072. Ph. : 040-23161070, 040-64554822
Visakhapatnam
D.No.28-8-3, First Floor, Opp. Sri Venkateswara Theatre Outgate, Suryabagh, Visakhapatnam-530 002.
Phones : 0891-6639247 & 0891-6646082.
New Delhi
C/14, SDIDC Work Centre Jhilmil Colony, New Delhi-100095. Phone: 011-2162365.
paramountpublishers@gmail.com | alluriasr2005@yahoo.com
Published by Manu Alluri for Paramount Publishing House and printed by him at Sai Thirumala Printers.
All rights are reserved. No part of this publication which is material protected by this copyright notice may not be reproduced or transmitted or utilized or stored in any form or by any means now known or hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording or by any information storage or retrieval system, without prior written permission from Paramount Publishing House.
Information contained in this book has been published by Paramount Publishing House, Hyderabad and has been obtained by its Author(s) from sources believed to be reliable and are correct to the best of their knowledge. However, the Publisher is not liable for any errors, omissions or damages arising out of use of this information and specifically disclaim any implied warranties or merchantability or fitness for any particular use. The authors are solely responsible for the contents published in the paper.
i v
xxxv
Contents
1. A Efficient Schedulingtechnique basedOn Wireless Mesh Device Pair Classification for WMN
- Asha C.N & Dr. Basavaraju T.G. 1
2. Low Power Area Efficient High Speed Square Root Carry Select Adder built on novel 1-bit full adder
- G. Kanaka Durga, DBV Ravi Sankar, Ch.Srujana, K.Ashwini & B.Aparna 6 3. A Review on Customer Data Clustering using Center based Density Algorithm
- Sumalatha Potteti & Namita Parati 10
4. Quality of Service in Cloud Computing Systems
- Sirisha Potluri, Dr.Katta Subba Rao & P.Sree Lakshmi 15 5. A Survey on Stream Processing and Streaming Analytics for Real - time Big Data
- B. Srivani, Dr. N. Sandhya & S. Renu Deepti 19 6. OPass: An improved user authentication method for online transactions
- Bantu Saritha & N.Sabitha 24
7. Current State of Art (CSA): An Empirical Study on Object Oriented Design Software Metrics
- A.Phani Sheetal & Dr. G.Sridevi 29
8. Evaluating the Performance of Data Mining Techniques for Breast Cancer Prediction and Diagnosis
- K. Srikanth, Dr. S. Zahoor-Ul-Huq & K. Ishthaq Ahamed 34 9. Assessment onUnderstanding and Optimization of Throughput Capacityfor
Mobile Ad-hoc Networks
- P.V.Venkateswaramma & Dr.I.Ravi Prakash Reddy 39
10. Noise removal in Brain MRI Image
- N.Rajeswaran, C.Gokilavani, S.Arumugam & V.Ramaraju 45 11. Cloud Protective Covering: Associate Reputation-based Conviction Organization
for Cloud Services
- Shilpa Empati, A Ravi Kumar & Dr M. Ashok 50
12. A Study on Vertical and Broad-based Search Engines
- M.Swathi & M.Swetha 53
13. Multi-threats Resolving Strategies for Secure Mobile Adhoc Networks
- A.Anjaiah & Dr.A.Govardhan 57
14. A Survey of Comparison on Various Congestion Control Protocols for Wireless Sensor Networks
- S. Rama Devi & N. Pujitha 60
15. Information Retrieval System Using Semantic Annotation
- Jayaprada S & Venkata Rao M 63
Messages v-xii
Sl.No. Title of the Paper Page No.
xxxvi
16. A Protectedopposing-Complicity Data Involvementstructure for Activesets in the Cloud
- Arun Kumar. Mekala, M. Ashok & Dr A Ravi Kumar 68 17. Critique on Cloud Computing
- Ms.P.S.Latha Kalyampudi, Dr. P. Venkata Krishna & Vasuki GVM 71 18. File Reduplication Protocol in Adhoc Networks for Sharing Documents in P2P
- A.Aruna Jyothi & L.Prasanthi 78
19. An Approach Towards Consideration of Mobility Effects in Wireless Network
- G.Sravanthi, M.chaitanya kishore Reddy & A.Anjaiah 83 20. Optimal Node Selection and Alarm Exchange Technique for Reducing the
Security Cost in MANET
- Jayashree S Patil & Dr.K.V.N.Sunitha 86
21. Omni-channel Banking Solutions
- Sruthi & Swami Goud 90
22. Equalizing Performance Reliability and Correctness for Secure Distributed Transactions
- Mr.M.Badrinath, Mr.V.Pradeep Kumar & Dr.M.Gopichand 93 23. Exceptional concerns and major challenges in GSD Projects: An introduction
into course curriculum for students'
- S. Ramacharan 97
24. An Efficient Approach For Ids Based on Distributed Computing Using Modified Kernel K-means with C4.5
- Kotha Geetha 101
25. The Impact of Noun Ambiguity in Telugu Language Sentences using CSG Rules:
A Modern Approach
- Dr. J. Sreedhar, E.S.Madhan & P.Jayaram 105
26. Premise on Localization Sagacity in Wireless Sensor Networks
- Dr.G.Naga Satish, G.Naga Srikanth & Dr.P.Suresh Varma 109 27. A Mobile Cloud Security techniques and Challenges in Healthcare management
- E.S.Madhan, Dr. J. Sreedhar & P.Jayaram 114
28. Recommendations for Event Organizer
- Jyoti Dhaygude, Sanyukta Demgunde, Nishigandha Vadhane,
Priyanka Lavgude & Minakshi Vharkate 116
29. Mobile Gis in Groundwater Pollution Monitoring Application
- B.Kameswara Rao & A.S.N.Chakravarthy 119
30. Cloud Based Adaptive Sql Query Processor
- Mr.Jagadeeshreddy Vaka & Dr.J.M.S.V Ravi Kumar 123
31. A Contemplate Report on Various Clustering Algorithms
- P.PenchalaPrasad, Dr.F.SagayarajFrancis & Vinnakota Saran Chaitanya 127
Sl.No. Title of the Paper Page No.
xxxvii
Sl.No. Title of the Paper Page No.
32. Analyzation of Risk Factors for the Dengue Fever Outbreak with the Effect of Diffusion Path for Spatiotemporal Criterion
- Ramesh Babu Pittala, Janga Ravi Chander, M.Nagabhushana Rao &
Panuganti Srinivas 131
33. Reducing noise levels at computations on encrypted data in cloud computing through Homomorphic Encryption
- Mr.V.Biksham & D.Vasumathi 136
34. IoT and its Security Issues
- K.Divya, T.Navya Madhavi & K.Bhavya Nandana 142
35. Face recognition with Statistical Features on LBP based Fuzzy Co-occurrence Matrix
- Dr. P Chandra Sekhar Reddy 146
36. Characterization and Dynamic Mitigation of Embedded Memory Prefetchers
- Mr M Devendra & Dr. K.E. Sreenivasa Murthy 150
37. Detection of Heart Disease Severity using Novel Multilayer Perceptron Mining Model
- P.Sambasiva Rao & Dr. T.Uma Devi 156
38. Quality Analysis of e-shopping (B2C) portal based on AHP
- Rokhsar Mizna & Vijay Kumar Mantri 163
39. A Survey on Architecture Issues in Design of Mobile Ad Hoc Networks
- Dr.Neelakantappa.M & Dr.Amjan Shaik 167
40. A Threshold based Decision Making Strategy for Mobility Management for Wireless Mesh Network
- Chaya Devi. R & T. G. Basavaraju 175
41. A Study on Supervised Segmentation Techniques
- M.Soumya & Dr.Amjan Shaik 179
42. New Efficient and Energy-aware Clustering Algorithm for the OLSR Protocol
- Dr.Amjan Shaik & Dr.Neelakantappa.M 182
43. A multiclass SVM approach for Automatic emotion recognization using speech
- P.Jayaram, Dr.J.Sreedhar & E.S.Madhan 189
44. Automatic Dialect and Accent speech recognition of South Indian English
- Ashok Shigli, Ibrahim Patel & K Srinivasa Rao 192
45. A Study on Unsupervised Segmentation Techniques
- M Likitha & Dr.Amjan Shaik 198
46. Use of data mining techniques and statistical analysis for Gene Expression data and interpretation
- P. Mukesh, Sameen Fathima, D.Vasumathi & Avinash Singode 202 47. A Novel Code Mining Framework for Detection of Defects in Source Code
- K VenkataRamana & Dr K Venu Gopala Rao 206
48. Feature-Based Facial Expression Recognition from Image Sequences Using SVMS
- Dr. M Raja Sekar & Dr. N Sandhya 211
xxxviii
Sl.No. Title of the Paper Page No.
49. Selection of Biphone Speech Units for Telugu TTS
- Dr.K.V.N.Sunitha & P.Sunitha Devi 216
50. A Brief Review of Deep Learning Architectures involving Protein Sequence Classification
- T.Sudha Rani, Dr.A. Yesu Babu & Dr. Haritha 221
51. Linear Buckling Analysis of RCC Column Using Ansys
- Balachandu.Koya 226
52. A Novel Scheme with Guaranteed Quality of Service in Cloud Environment
- Mrs. J. Manjula 232
53. Energy Efficient Secure Key Management Schemes for WSNs and IoT
- Dr. M.Suresh Babu, Md.Raziuddin & Dr.D.Asha Devi 237 54. Predictive Analytics Framework for Big Data:Case Study
- S.KishorBabu & Dr.S.Vasavi ` 247
55. Non Linear Buckling Analysis of Rcc Column Using Ansys
- Balachandu.Koya 253
56. A Novel Framework for Detection of Routing Fault in MANET Using 2ACK
- M.V.Rajesh, T.V.S.Gireendranath & J.V.R.Murthy 260
57. Hypercube and its variants using NS2
- K. Karthik, Sudarson Jena & T. Venu Gopal 266
58. Object Oriented Design Factors to Assess the Impact of software augmentation or bugfix
- Subramanya Sarma Vadlamani 271
59. Towards Achieving Privacy and Security in Cloud Storage Data by Slicing Cryptography - A Review
- Deepthi Bolukonda & Vijaya Kumari. G 279
60. Medical Image segmentation and clustering methods and applications -A survey
- G.Vasavi & Dr. S.Jyothi 283
61. Cloud Storage Services and Privacy Protection
- Dr.J M S V Ravi Kumar 286
62. Active Overpowering for Information truth then Suspension Separated Service area Popular Wireless Instrument Grids
- Mr. L. Umananath Rao & Mr. S. Srinuvasa Rao 291
63. Performance Analysis of OICT using GQA Algorithm
- Dasaradha Ramaiah K & Dr. T. Venugopal 294
64. Multi-Authority Attribute Based Encryption with Semi-Anonymity and Fully- Anonymity
- Miss.S.Mounika & Mr.J.Ramesh Babu 299
65. Parallel Self Timed Adder using Full Swing GDI
- L.Babitha, Ch.Vandana, K. Madhava Rao, K. Ananda Kumar,
U.Gnaneshwara chary & I.B.K.Raju 302
xxxix
Sl.No. Title of the Paper Page No.
66. A Dynamic Data Distribution Strategy for Hadoop in Heterogeneous Environments
- V.Suresh Kumar & Mrs.P.Sree Lakshmi 306
67. Effort Estimation Based on Story Points in Agile Approaches: A Systematic Literature Review
- Ch. Prasada Rao, Dr. Rama Sree.S & S N S V S C. Ramesh 313 68. DOT Architecture for Muti-Cloud System
- Dasaradha Ramaiah K & Dr. T. Venugopal 317
69. Windowing of Unbounded Data Using Dataflow Model
- B.Deepthi, MVN SaiTeja & SaiCharan 322
70. ASurvey on Energy EfficientRoutingin Wireless Sensor Networks
- Ashok Kumar Nanda 325
71. A Brief review on Detection of Duplicate Defect Reports Using Natural Language Processing
- B.Deepthi, Priyanka Bose & D. Sai Suma 330
72. Word Sense Disambiguation Using Lesk
- B. Surekha, Dr. K. Vijaya Kumar & Mr. S. Siva Skandha 332 73. Recommender System Using Collaborative Filtering
- R.Swetha & Dr. M.Chiranjeevi 335
74. A Brief review on Face Detection Techniques Using Image Processing - B.Deepthi, T.RaghavendraGupta,ThoutReddyKeerthiReddy &
DanthuriSnehalatha 338
75. Image Resolution Enhancement Using DWT And Interpolation Techniques
- B. Santhosh & Akku Madhusudhan 340
76. A Circulated Three-Trip Steering Procedure to Escalation the Capability of Mixture Wireless Systems
- Mr. B.Santhosh krishna & Mrs. L.Pallavi 344
77. Cloud Protection: Supporting Character-based Faith Management for Cloud and Wireless Sensor Networks
- Miss.G.Keerthi & Mrs.Ch.Sreedevi 347
78. The Development of Big Data for Security incident and Event Management Systems
- Dr.Mani Sarma Vittap & Vijay Kumar Atmakur 350
79. A Survey of Reusability and Search for Code to Reuse
- T. Divya Kumari & Dr. T. Venu Gopal 357
80. Analysis of Performance and Complexity of Multi Layer Expandable Perceptron over Single Layer Perception
N.Satyanandam & Dr.Ch. Satyanarayana 363
International Conference on Research Advancements in Computer Science and Communication (ICRACSC-201 6)
60 ISBN : 978-93-85100-64-2
A Survey of Comparison on Various Congestion Control Protocols for Wireless Sensor Networks
S. Rama Devi
1, N. Pujitha
21,2
Asst. Professor, Dept of IT, BVRITH, Hyderabad, India
Email: ramadevi.s@bvrithyderabad.edu.in
1,Pujitha.n@bvrithyderabad.edu.in
2ABSTRACT-
Wireless sensor networks (WSNs) are an emerging class of networks with a wide variety of potential applications in the fields of health, military, environmental monitoring and soon.
It is typically composed of multiple tiny devices equipped with limited sensin g, computing an d wireless commu nication capabilities There has been an increased focus towards developing transport protocols for WSNs in the research community. Congestion Control concentrates on enabling the network to recover from packet loss, congestion avoidance detects incipient congestion and prevents its occurrence. We provide a summary a nd comparison of existing congestion control protocols
Index terms: wireless sensor networks, transport protocols, congestion control, congestion avoidance
I. INTRODUCTION
A Wireless Sensor Network (WSN) is a highly distributed network consisting of a large number of tiny, low cost, lightweight wireless n odes deployed to mon itor an Environment or system These sensor nodes can sense, measure, and gather information from the environment and, based on some local decision process, they can transmit the sensed data to the user. Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health related areas [1][2]. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building.
Fig.1 Illustrates an example for WSN.
A WSN may also have some interesting features including self-organization, dynamic network topology, and multi-hop routing, which are important for many real world applications.
Wireless sensor network differ from other wireless ad hoc network in the sense that they are resource limited viz. power restrictions, memory, often prone to failure, densely deployed, topology chan ges, remotely managed. These are the constraints that make WSN a challenge.
Congestion control in WSNs has been largely implemented by using rate based approaches with the sources controlling the rate of the packets forwarded towards the sink. Periodic packet generation by the sources allow rate based congestion control as it enables an end-to end adaptation which has been successful in developing the internet architecture. However, nodes are not as relatively far apart from each other in WSNs (as in wired networks) with radio interference playing a major role in decreasing the successful packet delivery probabilities.
An increase in the traffic generation leads to degraded channel quality with corresponding increases in the loss rates experienced by the nodes.
Transport protocols for WSNs should provide end-to-end reliability and end-to-end QOS in an energy efficient way. The performance of a transport protocol for WSNs can be evaluated using metrics including: energy-efficiency, reliability, QOS metrics such as packet loss ratio, packet delivery latency, and fairness.
II. CONGESTION IN WIRELESS SENSOR NETWORKS