SlideShare a Scribd company logo
1 of 27
Download to read offline
April 2024: Top10
Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator
tool. Bangalore, 2011. ISBN 9780769546186.
R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing
protocol in mobile ad hoc networks, International Journal of Computer
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
CONGESTION AND ENERGY AWARE MULTIPATH LOAD
BALANCING ROUTING FOR LLNS
Kala Venugopal and T G Basavaraju
Department of Computer Science and Engineering, Government Engineering College, Hassan,
Karnataka, India
ABSTRACT
The Internet of Things (IoT) is presently in its golden era with its current technological evolution
towards digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for
IoT, where the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by
Internet Engineering Task Force as the benchmark protocol for routing. Although RPL, with its
unique capabilities, has addressed many IoT routing requirements, Load balancing and Congestion
control are the outliers. This paper builds on the RPL protocol and proposes a multipath Congestion
and Energy Aware RPL (CEARPL) that alleviates the load balancing and congestion concerns
associated with RPL and improves the network performance. For congestion avoidance, a
Congestion and Energy Aware Objective Function (CEA-OF) is suggested during parent selection
that considers multiple metrics like Child Count metric, Estimated Lifetime metric, and Queue
Occupancy metric, to equally distribute the traffic in LLNs. The Queue Occupancy metric is used
to detect congestion in the network, and a Multipath routing strategy is utilized to mitigate the
congestion in the network. A comparison of the performance of CEA-RPL was made against the
existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki
OS 3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering
by 33%, endto-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet
receiving rate and network lifetime improving by 7% and 49%, on an average, respectively.
KEYWORDS
Congestion, Multipath routing, Internet of Things, Load balancing, Low-power Lossy Networks,
Objective function & RPL
For More Details: https://aircconline.com/ijcnc/V15N3/15323cnc05.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
REFERENCES
[1] https://dataprot.net/statistics/iot-statistics/
[2] T. Winter et al., (2012) “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, IETF
RFC 6550.
[3] The Internet Engineering Task Force (IETF), 2010. .
[4] Routing Over Low Power and Lossy Networks (ROLL), 2004.
[5] O. Gaddour & A. Koubaa, (2012) “RPL in a nutshell: A survey”, Elsevier, Computer Networks,
Volume 56, Issue 14, Pages 3163-3178, doi: 10.1016/j.comnet.2012.06.016
[6] Doruk Pancaroglu, Sevil Sen, (2021) “Load balancing for RPL-based Internet of Things: A
review”, Ad Hoc Networks, Volume 116, 102491, ISSN 1570-8705,
https://doi.org/10.1016/j.adhoc.2021.102491.
[7] B. G. Mamoun Qasem, Ahmed Al-Dubai & Imed Romdhani, (2017) “Load balancing objective
function in RPL”, ROLL – WG INTERNET DRAFT, pp. 1–10
[8] C, Lim, (2019) "A Survey on Congestion Control for RPL-Based Wireless Sensor Networks",
Sensors 19, no. 11: 2567. https://doi.org/10.3390/s19112567
[9] P. Thubert, (2012) “Objective function zero for the routing protocol for low-power and lossy
networks (RPL)”, RFC 6552.
[10] O. Gnawali & P. Levis, (2012) “The Minimum Rank with Hysteresis Objective Function”, RFC
6719
[11] Ibrahim S. Alsukayti, (2020) “The support of multipath routing in IPv6-based internet of
things”, International Journal of Electrical and Computer Engineering (IJECE). 10. 2208.
10.11591/ijece.v10i2.pp2208-2220.
[12] J. Tsai & T. Moors, (2006) “A Review of Multipath Routing Protocols: From Wireless Ad Hoc
to Mesh Networks”, 17-18 July
[13] M. Geuzouri, N. Mbarek & A. Temar, (2020) A new way of achieving multipath routing in
wireless networks”, International Journal of Wireless and Mobile Computing. 18. 101.
10.1504/IJWMC.2020.10026464.
[14] A. Bhat & V. Geetha, (2017) "Survey on routing protocols for Internet of Things”, 7th
International Symposium on Embedded Computing and System Design (ISED), pp. 1-5, doi:
10.1109/ISED.2017.8303949.
[15] O. Iova, F. Theoleyre & T. Noel, (2015) “Exploiting multiple parents in RPL to improve both
the network lifetime and its stability", 2015 IEEE International Conference on Communications
(ICC), pp. 610-616, doi: 10.1109/ICC.2015.7248389.
[16] M. A. Lodhi, A. Rehman, M. M. Khan & F. B. Hussain, (2015) "Multiple path RPL for low
power lossy networks", 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob),
pp. 279- 284, doi: 10.1109/APWiMob.2015.7374975.
[17] P. Levis, T. Clausen, J. Hui, O. Gnawali & J. Ko, (2011) “The trickle algorithm", March 2011,
IETF RFC 6206.
[18] Q. Le, T. Ngo-Quynh & T. Magedanz, (2014) "RPL-based multipath Routing Protocols for
Internet of Things on Wireless Sensor Networks", 2014 International Conference on Advanced
Technologies for Communications (ATC 2014), pp. 424-429, doi: 10.1109/ATC.2014.7043425.
[19] Radi, Marjan, Behnam Dezfouli, Kamalrulnizam Abu Bakar, & Malrey Lee, (2012) "Multipath
Routing in Wireless Sensor Networks: Survey and Research Challenges", Sensors 12, no. 1: 650685.
https://doi.org/10.3390/s120100650
[20] W. Lou, W. Liu & Y. Zhang, (2006) “Performance Optimization Using Multipath Routing in
Mobile Ad Hoc and Wireless Sensor Networks”, 10.1007/0-387-29026-5_5.
[21] Z. Wang, L. Zhang, Z. Zheng et al., (2018) “Energy balancing RPL protocol with multipath for
wireless sensor networks. Peer-to-Peer Networks”, Appl. 11, 1085–1100,
https://doi.org/10.1007/s12083-017-0585-1
[22] Oana Iova, Fabrice Theoleyre & Thomas Noel, (2015) “Using Multiparent Routing in RPL to
Increase the Stability and the Lifetime of the Network”, Ad Hoc Networks, Elsevier, 29,
10.1016/j.adhoc.2015.01.020, hal-01206380
[23] M. Lodhi, Abdul Rehman, Meer Khan, M. Asfand-E-yar & F. Hussain, (2017) “Transient
multipath routing protocol for low power and lossy networks”, KSII Transactions on Internet and
Information Systems,11, 2002-2019, 10.3837/tiis.2017.04.010.
[24] T. L. Jenschke, G. Z. Papadopoulos, R. -A. Koutsiamanis & N. Montavont, (2019) "Alternative
Parent Selection for Multi-Path RPL Networks", 2019 IEEE 5th World Forum on Internet of Things
(WF-IoT), pp. 533-538, doi: 10.1109/WF-IoT.2019.8767236.
[25] Tomas Lagos Jenschke, Remous-Aris Koutsiamanis, Georgios Papadopoulos, Nicolas
Montavont, (2021) “ODeSe: On-Demand Selection for multipath RPL networks”, Ad Hoc Networks,
Elsevier, 114, pp.102431. 10.1016/j.adhoc.2021.102431. hal-03122968v2f
[26] F. Kaviani & M. Soltanaghaei, (2022) “CQARPL: Congestion and QoS-aware RPL for IoT
applications under heavy traffic”, The Journal of Supercomputing, 78, 10.1007/s11227-02204488-2.
[27] H. -S. Kim, H. Kim, J. Paek & S. Bahk, (2017) "Load Balancing Under Heavy Traffic in RPL
Routing Protocol for Low Power and Lossy Networks", in IEEE Transactions on Mobile Computing,
vol. 16, no. 4, pp. 964-979, 1 April 2017, doi: 10.1109/TMC.2016.2585107.
[28] Kala Venugopal & T. G. Basavaraju, (2022) “A Combined Metric Objective Function for RPL
Load Balancing in Internet of Things”, International Journal of Internet of Things, Vol. 10 No. 1,
2022, pp. 22-31. doi: 10.5923/j.ijit.20221001.02.
[29] S. Wakatsuki, N. Komuro, H. Sekiya & S. Sakata, (2014) “Prolonging network lifetime for
6LoWPAN / RPL wireless sensor network using mobile sink with dynamic sojourn time”, 2014
[30] M. Aboubakar, M. Kellil, A. Bouabdallah & P. Roux, (2019) “Toward intelligent
reconfiguration of RPL networks using supervised learning”, 2019 Wireless Days (WD),
Manchester, United Kingdom, pp. 1-4, 2019, DOI: 10.1109/WD.2019.8734236.
[31] Mah Zaib Jamil, Danista Khan, Adeel Saleem, Kashif Mehmood & Atif Iqbal, (2019)
“Comparative performance analysis of RPL for low power and lossy networks based on different
objective functions”, International Journal of Advanced Computer Science and Applications, Vol.
10, No. 5, DOI: 10.14569/IJACSA.2019.0100524
[32] Contiki O.S and Cooja simulator, http://www.contiki-os.org/ [33] T. Zahariadis & P. Trakadas,
(2022) “Design guidelines for routing metrics composition in LLN”, ROLL Internet Draft, 2022
[34] Nesrine Khernane, Jean Couchot & Ahmed Mostefaoui, (2018) “Maximum network lifetime
with optimal power/rate and routing trade-off for wireless multimedia sensor networks”, Computer
Communications, Elsevier, 124, pp.1 – 16, hal-02182832
[35] Moteiv Corporation. Tmote sky: Datasheet (2006):
https://insense.cs.standrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, Nov 13, 2006
[36] H.A.A. Al-Kashoash, H. Kharrufa, Y. Al-Nidawi. et al., (2019) “Congestion control in wireless
sensor and LoWPAN Networks: toward the Internet of Things”, Wireless Netw 25, 4493-4522,
https://doi.org/10.1007/s11276-018-1743-y
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE
COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS
Felipe Rodriguez Yaguache and Kimmo Ahola
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology
adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the
opportunities for deploying edge-computing containerized applications running over SD-WAN are
vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the
lack of research focused on service discovery in these scenarios. In this article, an in-house service
discovery solution that works alongside Kubernetes’ master node for allowing improved traffic
handling and better user experience when running micro-services is developed. The service
discovery solution was conceived following a design science research approach. Our research
includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster
that allows us to deploy custom services and delimit the necessary characteristics of our in-house
solution. Also, the implementation's performance is tested based on the required times for updating
the discovery solution according to service updates. Finally, some conclusions and modifications are
pointed out based on the results, while also discussing possible enhancements.
KEYWORDS
SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
REFERENCES
[1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art.
Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available
https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC
HN OLOGIES_STATE-OF-THE-ART.
[2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions,
Framingham, 2017.
[3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available
at: https://www.quagga.net/
[4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The
Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at:
https://onosproject.org/features/
[5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019.
Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/
[6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited
15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
[7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019.
Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster-
services/
[8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at:
https://metallb.universe.tf/
[9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization
for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available
at: http://mqtt.org
[10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software
Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi:
10.1109/COMST.2014.2320094.
[11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S.,
Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE
103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/,
doi:10.1109/JPROC.2014.2371999.
[12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access
Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and
Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566].
https://doi.org/10.1109/COMST.2017.2705720
[13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based
Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and
Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X.
Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf
[14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making
Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing
Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI:
10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at:
https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf
[15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In-
band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at:
https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525
46 8.802012735.1559031914-713298922.1559031914
[16] Ranganathan, R. A highly available and scalable microservice architecture for access
management. Aalto University, 2018. Available at:
https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201
8. pdf?sequence=1&isAllowed=y
[17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration and
Software Defined Wide Area Networks. 9th International Conference on Computer Science, Engineering and
Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at:
http://aircconline.com/csit/papers/vol9/csit90930.pdf
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI
MODELS AS MQTT SERVERS AND CLIENTS
Faiza Al-Salti1
, N. Alzeidi2
, Khaled Day2
, Abderezak Touzene2
, 1
Sultan Qaboos Comprehensive
Cancer Care and Research Centre, Oman, 2
Sultan Qaboos University, Oman
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
This paper studies the impact of different localization schemes on the performance of location-based
routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature
are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we
assess the performance of two localization schemes by measuring their localization coverage,
accuracy, control packets overhead, and required localization time. We then study the performance
of the ERGR-EMHC protocol using location information provided by the selected localization
schemes. The results are compared with the performance of the routing protocol when using exact
nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization
accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the
localization error has a significant impact on the performance of the routing protocol. For instance,
ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to
3DUL.
KEYWORDS
Underwater wireless sensor networks (UWSNs), localization, ranging localization methods,
localization error, location-based routing
For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
REFERENCES
[1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology
and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409.
[2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and
challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676,
October 2011, doi: 10.1016/J.OCEANENG.2011.07.017.
[3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER
WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks &
Communications, vol. 12, no. 3, pp. 113–130, May 2019.
[4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor
Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA
2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA.
[5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor
Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp.
537–552, June 2016.
[6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor
networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463,
September 2009.
[7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility
Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no.
3, pp. 335–348, March 2011.
[8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large
scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol.
14, no. 5, pp. 562–568, October 2009.
[9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for
Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017.
[10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION
PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of
Computer Networks & Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi:
10.5121/ijcnc.2020.12501.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor
Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221.
[12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks &
Communications (IJCNC) Vol.15, No.2, March 2023 18
[13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy
Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16,
no. 4, p. 487, April 2016, doi: 10.3390/s16040487.
[14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing
protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869,
October 2019.
[15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization
errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011.
[16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in
wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015.
[17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the
presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC
2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea.
[18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on
geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility
prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004.
[19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for
underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater
networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada.
[20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor
Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore.
[21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in
wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone,
Zambia.
[22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed
localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9,
no. 1, pp. 61–72, January 2011.
[23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor
networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010.
[24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for
underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on
Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan.
[25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater
Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and
Communications (ISNCC), 19-21 June 2018, Rome, Italy.
[26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for
UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20,
December 2017, doi: 10.5121/ijcnc.2017.9601.
An IDE for Android Mobile Phones with Extended Functionalities Using Best
Developing Methodologies
Sakila Banu1 and Kanakasabapathi Vijayakumar2
1
College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia
2
Department of Mathematics,Anna University,Chennai,India.
ABSTRACT
Google's Android platform is a widely anticipated open source operating system for mobile phones. The
mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed
by Google. Android phones are the first credible threat to the iPhone market. Google not only target the
consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result,
application developers are developing new software’s everyday for Android Smart Phones and are competing
with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily
by just Drag and Drop method to make even the non-programmers to develop application for the smart phones.
This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android
Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended
Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and
Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively.
Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies
by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android
ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework.
KEYWORDS
IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android
Development Tool.
For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ.,
University Park, PA
[2] Android: Changing the Mobile Landscap by Margaret Butler from
http://developerlife.com/tutorials/?p=289
[3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by
Nazmul
[4] Android-An Open Handset Alliance Project. http://code.google.com/android/.
[5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of
Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive
Computing(GPC2008):132-137
[6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd
International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware
2009):55-64
[7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html
[8] http://javapapers.com/android/android-drag-and-drop/
[9] http://developer.android.com/guide/topics/ui/drag-drop.html
[10] http://en.wikipedia.org/wiki/App_Inventor_for_Android
[11] JForm Designer from http://www.formdev.com/jformdesigner/
[12] http://beta.appinventor.mit.edu/about/moreinfo/
[13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
ITA: THE IMPROVED THROTTLED ALGORITHM OF LOAD
BALANCING ON CLOUD COMPUTING
Hieu N. Le1
and Hung C. Tran2
1
Department of Information Technology, Ho Chi Minh City Open University, Ho Chi Minh City,
Vietnam
2
Posts and Telecommunication Institute of Technology, Ho Chi Minh City, Vietnam
ABSTRACT
Cloud computing makes the information technology industry boom. It is a great solution for businesses who
want to save costs while ensuring the quality of service. One of the key issues that make cloud computing
successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs
economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help
improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled
Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to
simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The
simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent
processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above.
The improvement of ITA is because of selecting virtual machines in an index table that is available but in
order of priority. It helps response times and processing times remain stable, limits the idling resources, and
cloud costs are minimized compared to selected algorithms
KEYWORDS
Cloud Computing, Load Balancing, Processing Time, Improved Throttle Algorithm.
For More Details: https://aircconline.com/ijcnc/V14N1/14122cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2022.html
REFERENCES
[1] S. Kemp, “Digital 2019: global internet use accelerates,” 30 January 2019. [Online]. Available:
https://wearesocial.com/blog/2019/01/digital-2019-global-internet-use-accelerates.
[2] Soni Gulshan and Mala Kalra, “A novel approach for load balancing in cloud datacenter,” Advance
Computing Conference (IACC), 2014 IEEE International, 2014.
[3] Y. Wen and C. Chang, "Load balancing job assignment for cluster-based cloud computing," 2014 Sixth
International Conference on Ubiquitous and Future Networks (ICUFN), pp. 199-204, 2014.
[4] K. Verma, "Cloud Computing and its Types," Cloudkul, [Online]. Available:
https://cloudkul.com/blog/what-is-cloud-computing/.
[5] Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A.F. and Buyya, R., ""CloudSim: atoolkit for
modeling and simulation of cloud computing environments and evaluation of resource provisioning
algorithms," Journal of Software: Practice and Experience, vol. 41, pp. 23-50, 2010.
[6] D. C.Marinescu, Cloud Computing (Second edition), Elsevier, 2018.
[7] Bui Thanh Khiet, Nguyen Thi Nguyet Que, Ho Dac Hung, Pham Tran Vu, Tran Cong Hung, "A Fair
VM Allocation for Cloud Computing based on Game Theory," Proceedings of the 10th National
Conference on Fundamental and Applied Information Technology Research (FAIR'10), 2017.
[8] Bhaskar, R., Deepu, S.R., Shylaja, B.S., "Dynamic allocation method for efficient load balancing in
virtual machines for cloud computing," Advanced Computing An International Journal, vol. 3, 2012.
[9] Rajwinder Kaur, Pawan Luthra, "Load Balancing in Cloud Computing," Recent Trends in Information,
Telecommunication and Computing, Association of Computer Electronics and Electrical Engineers, pp.
374-381, 2014.
[10] Bhathiya Wickremasinghe and Assoc Prof and Rajkumar Buyya Contents, "Cloud Analyst: A
CloudSim- based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments," 2010.
[11] D. Asir Antony Gnana Singh, R. Priyadharshini and E. Jebamalar Leavline, "Analysis of Cloud
Environment Using CloudSim," in Springer.
[12] Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi and Jameela Al-Jaroodi, "A Survey of
Load Balancing in Cloud Computing: Challenges and Algorithms," Second Symposium on Network Cloud
Computing and Applications, 2012.
[13] Abhay Kumar Agarwal and Atul Raj, "A New Static Load Balancing Algorithm in Cloud Computing,"
International Journal of Computer Applications, vol. 132, p. 0975 – 8887, 2015.
[14] N.Swarnkar, A. K. Singh and Shankar, "A Survey of Load Balancing Technique in Cloud Computing,"
International Journal of Engineering Research & Technology(IJERT), vol. 2, pp. 800- 804, 2013.
[15] S. S. Moharana, R. D. Ramesh and D. Powar, "Analysis of Load Balancers in Cloud Computing,"
International Journal of Computer Science and Engineering (IJCSE), vol. 2, pp. 101-108, 2013.
[16] Vikas Kumar, Shiva Prakash, "Modified Active Monitoring Load Balancing Algorithm in Cloud
Computing Environment," International Journal for Scientific Research and Development (IJSRD), vol. 2,
pp. 132-135, 2014.
[17] A. Makroo and D. Dahiya, "An efficient VM load balancer for Cloudm," in The 2014 International
Conference on Applied Mathematics, Computational Science & Engineering (AMCSE 2014), Varna, 2014.
[18] Rakesh Kumar Mishra, Sreenu Naik Bhukya, "Service Broker Algorithm for CloudAnalyst,"
International Journal of Computer Science and Information Technology (IJCSIT), pp. 3957-3962, 2017.
[19] Er. Imtiyaz Ahmad , Er. Shakeel Ahmad, Er. Sourav Mirdha, "An Enhanced Throttled Load Balancing
Approach for Cloud Environment," International Research Journal of Engineering and Technology
(IRJET), 2017.
[20] Nguyen Xuan Phi, Tran Cong Hung, "LOAD BALANCING ARGORITHM TO IMPROVE
REPSPONSE TIME ON CLOUD COMPUTING," International Journal on Cloud Computing: Services
and Architecture (IJCCSA), 2017.
[21] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu, Tran Cong Hung, "Proposed Load Balancing
Algorithm to Reduce Response time and Processing time on Cloud Computing," International Journal of
Computer Networks & Communications (IJCNC), 2018.
[22] Gupta, S., Dixit, N., & Yadav, P., "An Advanced Throttled (ATH) Algorithm and Its Performance
Analysis with Different Variants of Cloud Computing Load Balancing Algorithm," Communication,
Networks and Computing, pp. 385-399, 2018.
[23] Tran Cong Hung, Phan Thanh Hy, Le Ngoc Hieu, Nguyen Xuan Phi, "MMSIA: Improved Max-Min
Scheduling Algorithm for Load Balancing on Cloud Computing," Proceedings of The 3rd International
Conference on Machine Learning and Soft Computing (CMLSC 2019), pp. 60-64, 2019.
[24] Moses, A. K., Joseph, A., Oluwaseun, O. R., Misra, S., & Emmanuel, A., "APPLICABILITY OF
MMRR LOAD BALANCING ALGORITHM IN CLOUD COMPUTING," International Journal of
Computer Mathematics: Computer Systems Theory, 2020.
[25] B. P. Mulla, C. Rama Krishna, and R. Kumar Tickoo, “Load balancing algorithm for efficient VM
allocation in heterogeneous cloud,” International Journal of Computer Networks & Communications
(IJCNC), vol. 12, no. 1, pp. 83–96, 2020.
[26] A. S. a. P. A. T. J. B. Durga Devi, “Modified adaptive neuro fuzzy inference system based load
balancing for virtual machine with security in cloud computing environment,” Journal of Ambient
Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3869-3876, 2021.
[27] N. Z. J. a. A. A. D. A. Shafiq, “Load balancing techniques in cloud computing environment: A review,”
Journal of King Saud University – Computer and Information Sciences, 2021.
A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia
2
College of Computer and Information Science, Computer Engineering Department, King Saud
University, Riyadh, Saudi Arabia
ABSTRACT
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages. The
accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
KEYWORDS
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
REFERENCES
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol.
7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection
schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing
detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,”
Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip
J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism:
An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi:
10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi:
10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int.
Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing
detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect
Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with
the combination of local and global features,” in Proceedings - 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014,
2015, doi: 10.1109/TrustCom.2014.28.
[15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach
for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and
Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity
in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent
Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing:
A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th
Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection
and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi:
10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious
webpages detection algorithm based on convolutional neural network and independent recurrent
neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433-
4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and
similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no.
Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with
Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds,
Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
[28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches
to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343,
2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection
from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural
Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize
Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi:
10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural
network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software,
Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE
LIFETIME OF WIRELESS SENSOR NETWORKS
D. Naga Ravikiran1
and C.G. Dethe2
1
Research Scholar, ECE Department, Priyadarshini Institute of Engineering and Technology
(PIET), Nagpur, Maharashtra.
2
Director, UGC-Human Resource Development Centre, RTM Nagpur University, Nagpur, India
ABSTRACT
Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with
limited computation, communication, memory, and energy resources that are being used fora huge
range of applications. Clustering in WSNs is an effective way to minimize the energy consumption
of sensor nodes. In this paper improvements in various parameters are compared for three different
routing algorithms. First, it is started with Low Energy Adaptive Cluster Hierarchy (LEACH)which
is a famed clustering mechanism that elects a CH based on the probability model. Then, work
describes a Fuzzy logic system initiated CH selection algorithm for LEACH. Then Artificial Bee
Colony (ABC)which is an optimisation protocol owes its inspiration to the exploration behaviour
of honey bees. In this study ABC optimization algorithm is proposed for fuzzy rule selection. Then,
the results of the three routing algorithms are compared with respect to various parameters
KEYWORDS
Wireless Sensor Network (WSN), LEACH, Clustering, Artificial Bee Colony (ABC), Fuzzy logic
system.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
REFERENCES
[1] Abad, M.F.K. and Jamali, M.A.J. (2011) ‘Modify LEACH algorithm for wireless sensor network’,
IJCSI International Journal of Computer Science Issues, Vol. 8, No. 5.
[2] Abraham, A., Jatoth, R.K. and Rajasekhar, A. (2012) ‘Hybrid differential artificial bee colony
algorithm’, Journal of Computational and Theoretical Nanoscience, Vol. 9, No. 2, pp.249–257.
[3] Selvakumar, K., &Selvi, M. S. (2014). Efficient Load Balanced Routing Algorithm Based On Genetic
And Particle Swarm Optimization.
[4] Manjusha, M. S., &Kannammal, K. E. (2014). Efficient Cluster Head Selection Method For Wireless
Sensor Network
[5] Bee-Sensor-C: An Energy-Efficient and Scalable Multipath Routing Protocol for Wireless Sensor
Networks.Celik, F., Zengin, A. and Tuncel, S. (2010)
[6] ‘A survey on swarm intelligence based routing protocols in wireless sensor networks’, International
Journal of Physical Sciences, Vol. 5, No. 14, pp.2118–2126.
[7] Saini, M., &Saini, R. K. (2013). Solution of Energy-Efficiency of sensor nodes in Wireless sensor
Networks. International Journal of Advanced Research in Computer Science and Software Engineering,
3(5), 353-357.
[8] Han, L. (2010, October). LEACH-HPR: An energy efficient routing algorithm for Heterogeneous
WSN. In Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
(Vol. 2, pp. 507-511).IEEE.
[9] Gou, H., &Yoo, Y. (2010, April). An energy balancing LEACH algorithm for wireless sensor
networks. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference
on (pp. 822-827). IEEE.
[10] Farooq, M. O., Dogar, A. B., & Shah, G. A. (2010, July). MR-LEACH: multi-hop routing with low
energy adaptive clustering hierarchy. In Sensor Technologies and Applications (SENSORCOMM), 2010
Fourth International Conference on(pp. 262-268). IEEE.
[11] El-Saadawy, M., &Shaaban, E. (2012, May). Enhancing S-LEACH security for wireless sensor
networks.In Electro/Information Technology (EIT), 2012 IEEE International Conference on (pp. 1-
6).IEEE.
[12] Chang, J-Y. andJu, P-H. (2012) ‘An efficient cluster-based power saving scheme for wireless sensor
networks’, EURASIP Journal on Wireless Communications and Networking, Article 172, Vol. 2012.
[13] Hadjila, M., Guyennet, H. and Feham, M. (2013) ‘Energy- efficient in wireless sensor networks
using fuzzy C-means clustering approach’, International Journal of Sensors and Sensor Networks, Vol.
1, No. 2, pp.21–26.
[14] Hemavathi, N. and Sudha, S. (2014) ‘A fuzzy based predictive cluster head selection scheme for
wireless sensor networks’, in The Proceedings of 8th International Conference on Sensing Technology
& International Journal on Smart Sensing and Intelligent Systems, pp.560–567.
[15] Jerusha, S., Kulothungan, K. and Kannan, A. (2012) International Journal of Computer &
Communication Technology, Vol. 3, No. 5, pp.0975–7449.
[16] Kaur, J. and Soni, N. (2015) ‘Performance evaluation of on demand energy efficient routing protocol
for WSN’, International Journal of Future Generation Communication and Networking, Vol. 8, No. 5,
pp.81–88.
[17] Khalid, H., Abdullah, K.M., AhsanAwan, F. and Hussain, A. (2013) ‘Cluster head election schemes
for WSN and MANET: a survey’, World Applied Sciences Journal, Vol. 23, No. 5, pp.611–620.
[18] Kour, H. and Sharma, A.K. (2010) ‘Hybrid energy efficient distributed protocol for heterogeneous
wireless sensor network’, International Journal of Computer Applications, July, Vol. 4, No. 6,pp.0975–
8887.
[19] Malarvizhi, M. and Gnanambal, I. (2015) ‘Harmonics elimination in multilevel inverter with
unequal DC sources by fuzzy-ABC algorithm’, Journal of Experimental & Theoretical Artificial
Intelligence, Vol. 27, No. 3, pp.273–292.
[20] Nayak, P. and Devulapalli, A. (2016) ‘A fuzzy logic-based clustering algorithm for WSN to extend
the network lifetime’, Sensors Journal, IEEE, Vol. 16, No. 1, pp.137–144.
[21] Ran, G., Zhang, H. and Gong, S. (2010) ‘Improving on LEACH protocol of wireless sensor networks
using fuzzy logic’, Journal of Information & Computational Science, Vol. 7, No. 3, pp.767–775.
[22] Rana, S., Bahar, A. N., Islam, N., & Islam, J. (2015). Fuzzy Based Energy Efficient Multiple Cluster
Head Selection Routing Protocol for Wireless Sensor Networks.
[23] Kumar, R., &Prakash, N., (2013) Energy Efficient Approach for Wireless Sensor Network, 3(6)
[24] Singh, S. P., & Sharma, S. C. (2015). A Survey on Cluster Based Routing Protocols in Wireless
Sensor Networks. Procedia Computer Science, 45, 687-695.
[25] Taruna, S., &Shringi, S. (2013). A cluster based routing protocol for prolonging network lifetime in
heterogeneous wireless sensor networks. Taruna et al., International Journal of Advanced Research in
HYBRIDComputer Science and Software Engineering, 3(4), 658-665.
[26] Yoon, M., & Chang, J. (2011, September). Design and implementation of cluster-based routing
protocol using message success rate in sensor networks. In HPCC, 2011 IEEE 13th International
Conference on (pp. 622-627).IEEE.
[27] PhanThiThe, Ngo QuangQuyen, Vu Ngoc Phan and Tran Cong Hung. (2017). A Proposal to
Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network,
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.6, November 2017.
[28] SaeidPourroostaeiArdakani. (2017). Data aggregation routing protocols in wireless sensor networks:
a taxonomy, International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.2,
March 2017.
[29] Tran Cong Hung and Ly Quoc Hung. (2016).Energy consumption improvement of traditional
clustering method in wireless sensor network, International Journal of Computer Networks &
Communications (IJCNC) Vol.8, No.5, September 2016.

More Related Content

Similar to April 2024 - Top 10 Read Articles in Computer Networks & Communications

Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsIJECEIAES
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Design and Implementation of Smart congestion control system
Design and Implementation of Smart congestion control systemDesign and Implementation of Smart congestion control system
Design and Implementation of Smart congestion control systemdbpublications
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
 
IRJET- Internet Video Streaming Service for Social Network
IRJET-  	  Internet Video Streaming Service for Social NetworkIRJET-  	  Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
 
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...IsabellaFilippo
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)CSCJournals
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
New Approaches in Cognitive Radios using Evolutionary Algorithms
New Approaches in Cognitive Radios using Evolutionary Algorithms New Approaches in Cognitive Radios using Evolutionary Algorithms
New Approaches in Cognitive Radios using Evolutionary Algorithms IJECEIAES
 
Energy-efficient device-to-device communication in internet of things using ...
 Energy-efficient device-to-device communication in internet of things using ... Energy-efficient device-to-device communication in internet of things using ...
Energy-efficient device-to-device communication in internet of things using ...IJECEIAES
 
Traffic Management using IoT and Deep Learning Techniques: A Literature Survey
Traffic Management using IoT and Deep Learning Techniques: A Literature SurveyTraffic Management using IoT and Deep Learning Techniques: A Literature Survey
Traffic Management using IoT and Deep Learning Techniques: A Literature SurveyIRJET Journal
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 

Similar to April 2024 - Top 10 Read Articles in Computer Networks & Communications (20)

Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of thingsEfficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Design and Implementation of Smart congestion control system
Design and Implementation of Smart congestion control systemDesign and Implementation of Smart congestion control system
Design and Implementation of Smart congestion control system
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social Network
 
IRJET- Internet Video Streaming Service for Social Network
IRJET-  	  Internet Video Streaming Service for Social NetworkIRJET-  	  Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social Network
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
Extended summary of "Cloudy with a chance of short RTTs Analyzing Cloud Conne...
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
 
Ck34520526
Ck34520526Ck34520526
Ck34520526
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
New Approaches in Cognitive Radios using Evolutionary Algorithms
New Approaches in Cognitive Radios using Evolutionary Algorithms New Approaches in Cognitive Radios using Evolutionary Algorithms
New Approaches in Cognitive Radios using Evolutionary Algorithms
 
Energy-efficient device-to-device communication in internet of things using ...
 Energy-efficient device-to-device communication in internet of things using ... Energy-efficient device-to-device communication in internet of things using ...
Energy-efficient device-to-device communication in internet of things using ...
 
Traffic Management using IoT and Deep Learning Techniques: A Literature Survey
Traffic Management using IoT and Deep Learning Techniques: A Literature SurveyTraffic Management using IoT and Deep Learning Techniques: A Literature Survey
Traffic Management using IoT and Deep Learning Techniques: A Literature Survey
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

April 2024 - Top 10 Read Articles in Computer Networks & Communications

  • 1. April 2024: Top10 Read Articles in Computer Networks & Communications International Journal of Computer Networks& Communications (IJCNC) http://airccse.org/journal/ijcnc.html (Scopus, ERA Listed, WJCI Indexed) Scopus Cite Score 2022—1.8 ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) Citations, h-index, i10-index
  • 2. DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3 1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and Informatics, Technical University of Kosice, Slovakia ABSTRACT The article looks into the current state of the art of dynamic routing protocols with respect to their possibilities to react to changes in the Quality of Service when selecting the best route towards a destination network. New options that could leverage information about the ever changing QoS parameters for data communication are analysed and a Cisco Performance Routing solution is described more in detail. The practical part of this work focuses on a design and implementation of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of different data communications flowing through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios. KEYWORDS Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf Volume Link: https://airccse.org/journal/ijc2014.html
  • 3. REFERENCES [1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet Engineering Task Force, 1981. [2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf. [3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date: 25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00. [4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide. Indianapolis: Cisco Press, 2010. ISBN 1587058820. [5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf. [6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I. Indianapolis: Cisco Press, 2006. ISBN 1587052024. [7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209. [8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp- te-ext02. [9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013. [Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946. [10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date: 4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco- live. [11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September 2013.] https://learningnetwork.cisco.com/docs/DOC-22910. [12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online] 2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug- articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10. [13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator tool. Bangalore, 2011. ISBN 9780769546186. R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing protocol in mobile ad hoc networks, International Journal of Computer
  • 4. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin School of Computer Sciences, Universiti Sains Malaysia, Malaysia ABSTRACT Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly, users utilize the technology to track the position of a vehicle or an object of interest. They also use it to safely navigate to the destination of their choice. As a result, there are countless number of GPS based tracking application that has been developed. But, a main recurring issue that exists among these applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern. Most existing research have examined the effects that the inaccuracy of GPS have on users while others identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective method which could mitigate or overcome most of those factors. As part of our research, we conducted a thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such, most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective of this paper, which is to examine and evaluate existing methods as well as to identify the most effective method that could improve the accuracy of GPS. KEYWORDS GPS, accuracy factors, improve accuracy, global positioning system For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf Volume Link: https://airccse.org/journal/ijc2016.html
  • 5. REFERENCES [1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France. pp. 524-527. [2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on Wireless Networks and Information Systems, Shanghai, China. pp. 294-299. [3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”, Computer, vol.35, no..4, pp. 92-94. [4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China, pp. 94-99. [5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS-96) [6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088. [7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”, IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693. [8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information Technology, pp. 95-101. [9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
  • 6. CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS Kala Venugopal and T G Basavaraju Department of Computer Science and Engineering, Government Engineering College, Hassan, Karnataka, India ABSTRACT The Internet of Things (IoT) is presently in its golden era with its current technological evolution towards digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for IoT, where the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by Internet Engineering Task Force as the benchmark protocol for routing. Although RPL, with its unique capabilities, has addressed many IoT routing requirements, Load balancing and Congestion control are the outliers. This paper builds on the RPL protocol and proposes a multipath Congestion and Energy Aware RPL (CEARPL) that alleviates the load balancing and congestion concerns associated with RPL and improves the network performance. For congestion avoidance, a Congestion and Energy Aware Objective Function (CEA-OF) is suggested during parent selection that considers multiple metrics like Child Count metric, Estimated Lifetime metric, and Queue Occupancy metric, to equally distribute the traffic in LLNs. The Queue Occupancy metric is used to detect congestion in the network, and a Multipath routing strategy is utilized to mitigate the congestion in the network. A comparison of the performance of CEA-RPL was made against the existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki OS 3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering by 33%, endto-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet receiving rate and network lifetime improving by 7% and 49%, on an average, respectively. KEYWORDS Congestion, Multipath routing, Internet of Things, Load balancing, Low-power Lossy Networks, Objective function & RPL For More Details: https://aircconline.com/ijcnc/V15N3/15323cnc05.pdf Volume Link: https://airccse.org/journal/ijc2023.html
  • 7. REFERENCES [1] https://dataprot.net/statistics/iot-statistics/ [2] T. Winter et al., (2012) “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, IETF RFC 6550. [3] The Internet Engineering Task Force (IETF), 2010. . [4] Routing Over Low Power and Lossy Networks (ROLL), 2004. [5] O. Gaddour & A. Koubaa, (2012) “RPL in a nutshell: A survey”, Elsevier, Computer Networks, Volume 56, Issue 14, Pages 3163-3178, doi: 10.1016/j.comnet.2012.06.016 [6] Doruk Pancaroglu, Sevil Sen, (2021) “Load balancing for RPL-based Internet of Things: A review”, Ad Hoc Networks, Volume 116, 102491, ISSN 1570-8705, https://doi.org/10.1016/j.adhoc.2021.102491. [7] B. G. Mamoun Qasem, Ahmed Al-Dubai & Imed Romdhani, (2017) “Load balancing objective function in RPL”, ROLL – WG INTERNET DRAFT, pp. 1–10 [8] C, Lim, (2019) "A Survey on Congestion Control for RPL-Based Wireless Sensor Networks", Sensors 19, no. 11: 2567. https://doi.org/10.3390/s19112567 [9] P. Thubert, (2012) “Objective function zero for the routing protocol for low-power and lossy networks (RPL)”, RFC 6552. [10] O. Gnawali & P. Levis, (2012) “The Minimum Rank with Hysteresis Objective Function”, RFC 6719 [11] Ibrahim S. Alsukayti, (2020) “The support of multipath routing in IPv6-based internet of things”, International Journal of Electrical and Computer Engineering (IJECE). 10. 2208. 10.11591/ijece.v10i2.pp2208-2220. [12] J. Tsai & T. Moors, (2006) “A Review of Multipath Routing Protocols: From Wireless Ad Hoc to Mesh Networks”, 17-18 July [13] M. Geuzouri, N. Mbarek & A. Temar, (2020) A new way of achieving multipath routing in wireless networks”, International Journal of Wireless and Mobile Computing. 18. 101. 10.1504/IJWMC.2020.10026464. [14] A. Bhat & V. Geetha, (2017) "Survey on routing protocols for Internet of Things”, 7th International Symposium on Embedded Computing and System Design (ISED), pp. 1-5, doi: 10.1109/ISED.2017.8303949. [15] O. Iova, F. Theoleyre & T. Noel, (2015) “Exploiting multiple parents in RPL to improve both the network lifetime and its stability", 2015 IEEE International Conference on Communications (ICC), pp. 610-616, doi: 10.1109/ICC.2015.7248389. [16] M. A. Lodhi, A. Rehman, M. M. Khan & F. B. Hussain, (2015) "Multiple path RPL for low power lossy networks", 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob),
  • 8. pp. 279- 284, doi: 10.1109/APWiMob.2015.7374975. [17] P. Levis, T. Clausen, J. Hui, O. Gnawali & J. Ko, (2011) “The trickle algorithm", March 2011, IETF RFC 6206. [18] Q. Le, T. Ngo-Quynh & T. Magedanz, (2014) "RPL-based multipath Routing Protocols for Internet of Things on Wireless Sensor Networks", 2014 International Conference on Advanced Technologies for Communications (ATC 2014), pp. 424-429, doi: 10.1109/ATC.2014.7043425. [19] Radi, Marjan, Behnam Dezfouli, Kamalrulnizam Abu Bakar, & Malrey Lee, (2012) "Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges", Sensors 12, no. 1: 650685. https://doi.org/10.3390/s120100650 [20] W. Lou, W. Liu & Y. Zhang, (2006) “Performance Optimization Using Multipath Routing in Mobile Ad Hoc and Wireless Sensor Networks”, 10.1007/0-387-29026-5_5. [21] Z. Wang, L. Zhang, Z. Zheng et al., (2018) “Energy balancing RPL protocol with multipath for wireless sensor networks. Peer-to-Peer Networks”, Appl. 11, 1085–1100, https://doi.org/10.1007/s12083-017-0585-1 [22] Oana Iova, Fabrice Theoleyre & Thomas Noel, (2015) “Using Multiparent Routing in RPL to Increase the Stability and the Lifetime of the Network”, Ad Hoc Networks, Elsevier, 29, 10.1016/j.adhoc.2015.01.020, hal-01206380 [23] M. Lodhi, Abdul Rehman, Meer Khan, M. Asfand-E-yar & F. Hussain, (2017) “Transient multipath routing protocol for low power and lossy networks”, KSII Transactions on Internet and Information Systems,11, 2002-2019, 10.3837/tiis.2017.04.010. [24] T. L. Jenschke, G. Z. Papadopoulos, R. -A. Koutsiamanis & N. Montavont, (2019) "Alternative Parent Selection for Multi-Path RPL Networks", 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 533-538, doi: 10.1109/WF-IoT.2019.8767236. [25] Tomas Lagos Jenschke, Remous-Aris Koutsiamanis, Georgios Papadopoulos, Nicolas Montavont, (2021) “ODeSe: On-Demand Selection for multipath RPL networks”, Ad Hoc Networks, Elsevier, 114, pp.102431. 10.1016/j.adhoc.2021.102431. hal-03122968v2f [26] F. Kaviani & M. Soltanaghaei, (2022) “CQARPL: Congestion and QoS-aware RPL for IoT applications under heavy traffic”, The Journal of Supercomputing, 78, 10.1007/s11227-02204488-2. [27] H. -S. Kim, H. Kim, J. Paek & S. Bahk, (2017) "Load Balancing Under Heavy Traffic in RPL Routing Protocol for Low Power and Lossy Networks", in IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 964-979, 1 April 2017, doi: 10.1109/TMC.2016.2585107. [28] Kala Venugopal & T. G. Basavaraju, (2022) “A Combined Metric Objective Function for RPL Load Balancing in Internet of Things”, International Journal of Internet of Things, Vol. 10 No. 1, 2022, pp. 22-31. doi: 10.5923/j.ijit.20221001.02. [29] S. Wakatsuki, N. Komuro, H. Sekiya & S. Sakata, (2014) “Prolonging network lifetime for 6LoWPAN / RPL wireless sensor network using mobile sink with dynamic sojourn time”, 2014 [30] M. Aboubakar, M. Kellil, A. Bouabdallah & P. Roux, (2019) “Toward intelligent
  • 9. reconfiguration of RPL networks using supervised learning”, 2019 Wireless Days (WD), Manchester, United Kingdom, pp. 1-4, 2019, DOI: 10.1109/WD.2019.8734236. [31] Mah Zaib Jamil, Danista Khan, Adeel Saleem, Kashif Mehmood & Atif Iqbal, (2019) “Comparative performance analysis of RPL for low power and lossy networks based on different objective functions”, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 5, DOI: 10.14569/IJACSA.2019.0100524 [32] Contiki O.S and Cooja simulator, http://www.contiki-os.org/ [33] T. Zahariadis & P. Trakadas, (2022) “Design guidelines for routing metrics composition in LLN”, ROLL Internet Draft, 2022 [34] Nesrine Khernane, Jean Couchot & Ahmed Mostefaoui, (2018) “Maximum network lifetime with optimal power/rate and routing trade-off for wireless multimedia sensor networks”, Computer Communications, Elsevier, 124, pp.1 – 16, hal-02182832 [35] Moteiv Corporation. Tmote sky: Datasheet (2006): https://insense.cs.standrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, Nov 13, 2006 [36] H.A.A. Al-Kashoash, H. Kharrufa, Y. Al-Nidawi. et al., (2019) “Congestion control in wireless sensor and LoWPAN Networks: toward the Internet of Things”, Wireless Netw 25, 4493-4522, https://doi.org/10.1007/s11276-018-1743-y
  • 10. CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS Felipe Rodriguez Yaguache and Kimmo Ahola 5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland ABSTRACT As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements. KEYWORDS SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf Volume Link: https://airccse.org/journal/ijc2019.html
  • 11. REFERENCES [1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art. Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC HN OLOGIES_STATE-OF-THE-ART. [2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions, Framingham, 2017. [3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available at: https://www.quagga.net/ [4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at: https://onosproject.org/features/ [5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019. Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/ [6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/ [7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster- services/ [8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at: https://metallb.universe.tf/ [9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available at: http://mqtt.org [10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi: 10.1109/COMST.2014.2320094. [11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE 103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/, doi:10.1109/JPROC.2014.2371999. [12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566]. https://doi.org/10.1109/COMST.2017.2705720 [13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based
  • 12. Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X. Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf [14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI: 10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at: https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf [15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In- band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at: https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525 46 8.802012735.1559031914-713298922.1559031914 [16] Ranganathan, R. A highly available and scalable microservice architecture for access management. Aalto University, 2018. Available at: https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201 8. pdf?sequence=1&isAllowed=y [17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration and Software Defined Wide Area Networks. 9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at: http://aircconline.com/csit/papers/vol9/csit90930.pdf
  • 13. PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTT SERVERS AND CLIENTS Faiza Al-Salti1 , N. Alzeidi2 , Khaled Day2 , Abderezak Touzene2 , 1 Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2 Sultan Qaboos University, Oman 5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland ABSTRACT This paper studies the impact of different localization schemes on the performance of location-based routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we assess the performance of two localization schemes by measuring their localization coverage, accuracy, control packets overhead, and required localization time. We then study the performance of the ERGR-EMHC protocol using location information provided by the selected localization schemes. The results are compared with the performance of the routing protocol when using exact nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the localization error has a significant impact on the performance of the routing protocol. For instance, ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to 3DUL. KEYWORDS Underwater wireless sensor networks (UWSNs), localization, ranging localization methods, localization error, location-based routing For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf Volume Link: https://airccse.org/journal/ijc2023.html
  • 14. REFERENCES [1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409. [2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676, October 2011, doi: 10.1016/J.OCEANENG.2011.07.017. [3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks & Communications, vol. 12, no. 3, pp. 113–130, May 2019. [4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA 2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA. [5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp. 537–552, June 2016. [6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463, September 2009. [7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 3, pp. 335–348, March 2011. [8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol. 14, no. 5, pp. 562–568, October 2009. [9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017. [10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of Computer Networks & Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi: 10.5121/ijcnc.2020.12501. [11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221. [12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks, volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 18
  • 15. [13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16, no. 4, p. 487, April 2016, doi: 10.3390/s16040487. [14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869, October 2019. [15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011. [16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015. [17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC 2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea. [18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004. [19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada. [20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore. [21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone, Zambia. [22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9, no. 1, pp. 61–72, January 2011. [23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010. [24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan. [25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), 19-21 June 2018, Rome, Italy. [26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20, December 2017, doi: 10.5121/ijcnc.2017.9601.
  • 16. An IDE for Android Mobile Phones with Extended Functionalities Using Best Developing Methodologies Sakila Banu1 and Kanakasabapathi Vijayakumar2 1 College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia 2 Department of Mathematics,Anna University,Chennai,India. ABSTRACT Google's Android platform is a widely anticipated open source operating system for mobile phones. The mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed by Google. Android phones are the first credible threat to the iPhone market. Google not only target the consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result, application developers are developing new software’s everyday for Android Smart Phones and are competing with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily by just Drag and Drop method to make even the non-programmers to develop application for the smart phones. This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively. Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework. KEYWORDS IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android Development Tool. For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf Volume Link: https://airccse.org/journal/ijc2013.html
  • 17. REFERENCES [1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ., University Park, PA [2] Android: Changing the Mobile Landscap by Margaret Butler from http://developerlife.com/tutorials/?p=289 [3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by Nazmul [4] Android-An Open Handset Alliance Project. http://code.google.com/android/. [5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive Computing(GPC2008):132-137 [6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware 2009):55-64 [7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html [8] http://javapapers.com/android/android-drag-and-drop/ [9] http://developer.android.com/guide/topics/ui/drag-drop.html [10] http://en.wikipedia.org/wiki/App_Inventor_for_Android [11] JForm Designer from http://www.formdev.com/jformdesigner/ [12] http://beta.appinventor.mit.edu/about/moreinfo/ [13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
  • 18. ITA: THE IMPROVED THROTTLED ALGORITHM OF LOAD BALANCING ON CLOUD COMPUTING Hieu N. Le1 and Hung C. Tran2 1 Department of Information Technology, Ho Chi Minh City Open University, Ho Chi Minh City, Vietnam 2 Posts and Telecommunication Institute of Technology, Ho Chi Minh City, Vietnam ABSTRACT Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms KEYWORDS Cloud Computing, Load Balancing, Processing Time, Improved Throttle Algorithm. For More Details: https://aircconline.com/ijcnc/V14N1/14122cnc02.pdf Volume Link: https://airccse.org/journal/ijc2022.html
  • 19. REFERENCES [1] S. Kemp, “Digital 2019: global internet use accelerates,” 30 January 2019. [Online]. Available: https://wearesocial.com/blog/2019/01/digital-2019-global-internet-use-accelerates. [2] Soni Gulshan and Mala Kalra, “A novel approach for load balancing in cloud datacenter,” Advance Computing Conference (IACC), 2014 IEEE International, 2014. [3] Y. Wen and C. Chang, "Load balancing job assignment for cluster-based cloud computing," 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 199-204, 2014. [4] K. Verma, "Cloud Computing and its Types," Cloudkul, [Online]. Available: https://cloudkul.com/blog/what-is-cloud-computing/. [5] Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A.F. and Buyya, R., ""CloudSim: atoolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Journal of Software: Practice and Experience, vol. 41, pp. 23-50, 2010. [6] D. C.Marinescu, Cloud Computing (Second edition), Elsevier, 2018. [7] Bui Thanh Khiet, Nguyen Thi Nguyet Que, Ho Dac Hung, Pham Tran Vu, Tran Cong Hung, "A Fair VM Allocation for Cloud Computing based on Game Theory," Proceedings of the 10th National Conference on Fundamental and Applied Information Technology Research (FAIR'10), 2017. [8] Bhaskar, R., Deepu, S.R., Shylaja, B.S., "Dynamic allocation method for efficient load balancing in virtual machines for cloud computing," Advanced Computing An International Journal, vol. 3, 2012. [9] Rajwinder Kaur, Pawan Luthra, "Load Balancing in Cloud Computing," Recent Trends in Information, Telecommunication and Computing, Association of Computer Electronics and Electrical Engineers, pp. 374-381, 2014. [10] Bhathiya Wickremasinghe and Assoc Prof and Rajkumar Buyya Contents, "Cloud Analyst: A CloudSim- based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments," 2010. [11] D. Asir Antony Gnana Singh, R. Priyadharshini and E. Jebamalar Leavline, "Analysis of Cloud Environment Using CloudSim," in Springer. [12] Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi and Jameela Al-Jaroodi, "A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms," Second Symposium on Network Cloud Computing and Applications, 2012. [13] Abhay Kumar Agarwal and Atul Raj, "A New Static Load Balancing Algorithm in Cloud Computing," International Journal of Computer Applications, vol. 132, p. 0975 – 8887, 2015. [14] N.Swarnkar, A. K. Singh and Shankar, "A Survey of Load Balancing Technique in Cloud Computing," International Journal of Engineering Research & Technology(IJERT), vol. 2, pp. 800- 804, 2013. [15] S. S. Moharana, R. D. Ramesh and D. Powar, "Analysis of Load Balancers in Cloud Computing," International Journal of Computer Science and Engineering (IJCSE), vol. 2, pp. 101-108, 2013. [16] Vikas Kumar, Shiva Prakash, "Modified Active Monitoring Load Balancing Algorithm in Cloud Computing Environment," International Journal for Scientific Research and Development (IJSRD), vol. 2, pp. 132-135, 2014. [17] A. Makroo and D. Dahiya, "An efficient VM load balancer for Cloudm," in The 2014 International Conference on Applied Mathematics, Computational Science & Engineering (AMCSE 2014), Varna, 2014.
  • 20. [18] Rakesh Kumar Mishra, Sreenu Naik Bhukya, "Service Broker Algorithm for CloudAnalyst," International Journal of Computer Science and Information Technology (IJCSIT), pp. 3957-3962, 2017. [19] Er. Imtiyaz Ahmad , Er. Shakeel Ahmad, Er. Sourav Mirdha, "An Enhanced Throttled Load Balancing Approach for Cloud Environment," International Research Journal of Engineering and Technology (IRJET), 2017. [20] Nguyen Xuan Phi, Tran Cong Hung, "LOAD BALANCING ARGORITHM TO IMPROVE REPSPONSE TIME ON CLOUD COMPUTING," International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2017. [21] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu, Tran Cong Hung, "Proposed Load Balancing Algorithm to Reduce Response time and Processing time on Cloud Computing," International Journal of Computer Networks & Communications (IJCNC), 2018. [22] Gupta, S., Dixit, N., & Yadav, P., "An Advanced Throttled (ATH) Algorithm and Its Performance Analysis with Different Variants of Cloud Computing Load Balancing Algorithm," Communication, Networks and Computing, pp. 385-399, 2018. [23] Tran Cong Hung, Phan Thanh Hy, Le Ngoc Hieu, Nguyen Xuan Phi, "MMSIA: Improved Max-Min Scheduling Algorithm for Load Balancing on Cloud Computing," Proceedings of The 3rd International Conference on Machine Learning and Soft Computing (CMLSC 2019), pp. 60-64, 2019. [24] Moses, A. K., Joseph, A., Oluwaseun, O. R., Misra, S., & Emmanuel, A., "APPLICABILITY OF MMRR LOAD BALANCING ALGORITHM IN CLOUD COMPUTING," International Journal of Computer Mathematics: Computer Systems Theory, 2020. [25] B. P. Mulla, C. Rama Krishna, and R. Kumar Tickoo, “Load balancing algorithm for efficient VM allocation in heterogeneous cloud,” International Journal of Computer Networks & Communications (IJCNC), vol. 12, no. 1, pp. 83–96, 2020. [26] A. S. a. P. A. T. J. B. Durga Devi, “Modified adaptive neuro fuzzy inference system based load balancing for virtual machine with security in cloud computing environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3869-3876, 2021. [27] N. Z. J. a. A. A. D. A. Shafiq, “Load balancing techniques in cloud computing environment: A review,” Journal of King Saud University – Computer and Information Sciences, 2021.
  • 21. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION COMBINED URL FEATURES AND VISUAL SIMILARITY Saad Al-Ahmadi1 and Yasser Alharbi 2 1 College of Computer and Information Science, Computer Science Department, King Saud University, Riyadh, Saudi Arabia 2 College of Computer and Information Science, Computer Engineering Department, King Saud University, Riyadh, Saudi Arabia ABSTRACT The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack. KEYWORDS Phishing detection, URL, visual similarity, deep learning, convolution neural network. For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf Volume Link: https://airccse.org/journal/ijc2020.html
  • 22. REFERENCES [1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol. 7, no. 4, pp. 64–68, 2016. [2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674. [3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8, 2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf. [4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147. [5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,” Security and Communication Networks. 2017, doi: 10.1155/2017/5421046. [6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6. [7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0. [8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism: An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi: 10.1007/978-3-642- 02617-1_28. [9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680. [10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi: 10.1109/ISDFS.2016.7473534. [11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int. Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299. [12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006. [13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750. [14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with the combination of local and global features,” in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 2015, doi: 10.1109/TrustCom.2014.28.
  • 23. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367. [16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151. [17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506. [18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing: A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999. [19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi: 10.1145/1460877.1460905. [20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi: 10.1080/19393555.2018.1456577. [21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi: 10.1016/j.cose.2019.03.018. [22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433- 4. [23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi: 10.1186/s13673-017-0098-1. [24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no. Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085. [25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available: http://arxiv.org/abs/1802.03162. [26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online]. Available: http://arxiv.org/abs/1702.08568. [27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds, Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
  • 24. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343, 2018, doi: 10.3233/JIFS-169429. [29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029. [30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi: 10.1155/2019/2595794. [31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi: 10.2200/s00822ed1v01y201712cov015. [32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi: 10.5120/4789- 6997. [33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software, Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi: 10.1109/SKIMA47702.2019.8982427. [34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online]. Available: http://arxiv.org/abs/1909.01135.
  • 25. IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NETWORKS D. Naga Ravikiran1 and C.G. Dethe2 1 Research Scholar, ECE Department, Priyadarshini Institute of Engineering and Technology (PIET), Nagpur, Maharashtra. 2 Director, UGC-Human Resource Development Centre, RTM Nagpur University, Nagpur, India ABSTRACT Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited computation, communication, memory, and energy resources that are being used fora huge range of applications. Clustering in WSNs is an effective way to minimize the energy consumption of sensor nodes. In this paper improvements in various parameters are compared for three different routing algorithms. First, it is started with Low Energy Adaptive Cluster Hierarchy (LEACH)which is a famed clustering mechanism that elects a CH based on the probability model. Then, work describes a Fuzzy logic system initiated CH selection algorithm for LEACH. Then Artificial Bee Colony (ABC)which is an optimisation protocol owes its inspiration to the exploration behaviour of honey bees. In this study ABC optimization algorithm is proposed for fuzzy rule selection. Then, the results of the three routing algorithms are compared with respect to various parameters KEYWORDS Wireless Sensor Network (WSN), LEACH, Clustering, Artificial Bee Colony (ABC), Fuzzy logic system. For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf Volume Link: https://airccse.org/journal/ijc2020.html
  • 26. REFERENCES [1] Abad, M.F.K. and Jamali, M.A.J. (2011) ‘Modify LEACH algorithm for wireless sensor network’, IJCSI International Journal of Computer Science Issues, Vol. 8, No. 5. [2] Abraham, A., Jatoth, R.K. and Rajasekhar, A. (2012) ‘Hybrid differential artificial bee colony algorithm’, Journal of Computational and Theoretical Nanoscience, Vol. 9, No. 2, pp.249–257. [3] Selvakumar, K., &Selvi, M. S. (2014). Efficient Load Balanced Routing Algorithm Based On Genetic And Particle Swarm Optimization. [4] Manjusha, M. S., &Kannammal, K. E. (2014). Efficient Cluster Head Selection Method For Wireless Sensor Network [5] Bee-Sensor-C: An Energy-Efficient and Scalable Multipath Routing Protocol for Wireless Sensor Networks.Celik, F., Zengin, A. and Tuncel, S. (2010) [6] ‘A survey on swarm intelligence based routing protocols in wireless sensor networks’, International Journal of Physical Sciences, Vol. 5, No. 14, pp.2118–2126. [7] Saini, M., &Saini, R. K. (2013). Solution of Energy-Efficiency of sensor nodes in Wireless sensor Networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 353-357. [8] Han, L. (2010, October). LEACH-HPR: An energy efficient routing algorithm for Heterogeneous WSN. In Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on (Vol. 2, pp. 507-511).IEEE. [9] Gou, H., &Yoo, Y. (2010, April). An energy balancing LEACH algorithm for wireless sensor networks. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on (pp. 822-827). IEEE. [10] Farooq, M. O., Dogar, A. B., & Shah, G. A. (2010, July). MR-LEACH: multi-hop routing with low energy adaptive clustering hierarchy. In Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on(pp. 262-268). IEEE. [11] El-Saadawy, M., &Shaaban, E. (2012, May). Enhancing S-LEACH security for wireless sensor networks.In Electro/Information Technology (EIT), 2012 IEEE International Conference on (pp. 1- 6).IEEE. [12] Chang, J-Y. andJu, P-H. (2012) ‘An efficient cluster-based power saving scheme for wireless sensor networks’, EURASIP Journal on Wireless Communications and Networking, Article 172, Vol. 2012. [13] Hadjila, M., Guyennet, H. and Feham, M. (2013) ‘Energy- efficient in wireless sensor networks using fuzzy C-means clustering approach’, International Journal of Sensors and Sensor Networks, Vol. 1, No. 2, pp.21–26. [14] Hemavathi, N. and Sudha, S. (2014) ‘A fuzzy based predictive cluster head selection scheme for wireless sensor networks’, in The Proceedings of 8th International Conference on Sensing Technology & International Journal on Smart Sensing and Intelligent Systems, pp.560–567.
  • 27. [15] Jerusha, S., Kulothungan, K. and Kannan, A. (2012) International Journal of Computer & Communication Technology, Vol. 3, No. 5, pp.0975–7449. [16] Kaur, J. and Soni, N. (2015) ‘Performance evaluation of on demand energy efficient routing protocol for WSN’, International Journal of Future Generation Communication and Networking, Vol. 8, No. 5, pp.81–88. [17] Khalid, H., Abdullah, K.M., AhsanAwan, F. and Hussain, A. (2013) ‘Cluster head election schemes for WSN and MANET: a survey’, World Applied Sciences Journal, Vol. 23, No. 5, pp.611–620. [18] Kour, H. and Sharma, A.K. (2010) ‘Hybrid energy efficient distributed protocol for heterogeneous wireless sensor network’, International Journal of Computer Applications, July, Vol. 4, No. 6,pp.0975– 8887. [19] Malarvizhi, M. and Gnanambal, I. (2015) ‘Harmonics elimination in multilevel inverter with unequal DC sources by fuzzy-ABC algorithm’, Journal of Experimental & Theoretical Artificial Intelligence, Vol. 27, No. 3, pp.273–292. [20] Nayak, P. and Devulapalli, A. (2016) ‘A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime’, Sensors Journal, IEEE, Vol. 16, No. 1, pp.137–144. [21] Ran, G., Zhang, H. and Gong, S. (2010) ‘Improving on LEACH protocol of wireless sensor networks using fuzzy logic’, Journal of Information & Computational Science, Vol. 7, No. 3, pp.767–775. [22] Rana, S., Bahar, A. N., Islam, N., & Islam, J. (2015). Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks. [23] Kumar, R., &Prakash, N., (2013) Energy Efficient Approach for Wireless Sensor Network, 3(6) [24] Singh, S. P., & Sharma, S. C. (2015). A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks. Procedia Computer Science, 45, 687-695. [25] Taruna, S., &Shringi, S. (2013). A cluster based routing protocol for prolonging network lifetime in heterogeneous wireless sensor networks. Taruna et al., International Journal of Advanced Research in HYBRIDComputer Science and Software Engineering, 3(4), 658-665. [26] Yoon, M., & Chang, J. (2011, September). Design and implementation of cluster-based routing protocol using message success rate in sensor networks. In HPCC, 2011 IEEE 13th International Conference on (pp. 622-627).IEEE. [27] PhanThiThe, Ngo QuangQuyen, Vu Ngoc Phan and Tran Cong Hung. (2017). A Proposal to Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network, International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.6, November 2017. [28] SaeidPourroostaeiArdakani. (2017). Data aggregation routing protocols in wireless sensor networks: a taxonomy, International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.2, March 2017. [29] Tran Cong Hung and Ly Quoc Hung. (2016).Energy consumption improvement of traditional clustering method in wireless sensor network, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.5, September 2016.