IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 6 - Issue 3

Paper Type : Research Paper
Title : Artificial Intelligence Algorithms
Country : India
Authors : Sreekanth Reddy Kallem
: 10.9790/0661-0630108       logo
Abstract:Artificial intelligence (AI) is the study of how to make computers do things which, at the moment, people do better. Thus Strong AI claims that in near future we will be surrounded by such kinds of machine which can completely works like human being and machine could have human level intelligence. One intention of this article is to excite a broader AI audience about abstract algorithmic information theory concepts, and conversely to inform theorists about exciting applications to AI.The science of Artificial Intelligence (AI) might be defined as the construction of intelligent systems and their analysis.
Keywords: Artificial Intelligence, Algorithms
[1] http://www.hutter1.net/ai/uaibook.html.
[2] Elaine Rich, Kevin Knight, " Artificial Intelligence", Second Edition, page no.3.
[3] " Universal Artificial Intelligence"Subtitle: Sequential Decisions based on Algorithmic Probability.
[4] http://en.wikipedia.org/wiki/Artificial_intelligence.
[5] http://www.codeproject.com/Articles/16286/AI-Simple-Genetic-Algorithm-GA-to-solve-a-card-pro.
[6] http://artint.info/html/ArtInt_51.html.
[7] David Poole,AlanMackworth, "Artificial Intelligence: Foundations of Computational Agents",2010.
[8] http://www.kirupa.com/forum/showthread.php?72863-Tutorial-Path-Finding-Algorithms-AI.
[9] http://webdocs.cs.ualberta.ca/~lanctot/files/papers/pathfinding-orbius-2006.pdf.
[10] http://en.wikipedia.org/wiki/A*_search_algorithm.
Paper Type : Research Paper
Title : Wireless Micro-Sensor Network Models
Country : India
Authors : Ms. Swapnali S. Maske, Mrs. Tejaswini A. Pawar
: 10.9790/0661-0630914       logo
Abstract:Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It allows network designer to choose the Protocol architecture. According to their application this taxonomy will enable new sensor network models to define for use in further research in this area. The overall communication behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application communication used for information dissemination from the infrastructure communication used to configure and optimize the Network. This separation will aid network designers in selecting the appropriate sensor network architecture that will best match the characteristics of the communication traffic of a given application.
[1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,"A Taxonomy of Wireless Micro Sensor Network Models",
[2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ," The Updatesd A Taxonomy of Wireless Micro Sensor Network
Models",ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.

Paper Type : Research Paper
Title : Mobile Networking and Ad hoc routing protocols validation
Country : India
Authors : Simanta Sarma, Dr. Sarbananda Das
: 10.9790/0661-0631524       logo
Abstract:In this paper we describe mobile network and efficient routing protocol for wireless ad hoc networks. We report on its implementation, on performance comparisons and on a formal validation result. Moreover we discuss Cellular system design, global System for mobile Communication, Formal Protocol Verification and operating over infrared or Bluetooth. This paper evaluates two model checking tools, SPIN and UPPAAL, using the verification of the Ad hoc Routing protocol as a case study. Insights are reported in terms of identifying important modeling considerations and the types of ad hoc protocol properties that can realistically be verified
Keywords:Cellular Phone network, mobile ad hoc networks, routing protocols, Wireless networks, ad hoc routing, routing protocol Implementation, formal validation, model checking, Infrared or Bluetooth, GSM.
[1] Bin Li, Lizhong Li, Bo Li and Xi-Ren Cao, "On Handoff Performance for an Integrated Voice/Data Cellular System", Journal of
Wireless Networks 9,393-402,2003
[2] Marcos A. C. Lima, Aluizio F.R. Araújo, and Amílcar C. César , "Dynamic channel assignment in mobile communications
based on genetic algorithm", 0-7803-7589-0/02 2002 IEEE
[3] Somnath Sinha Maha Patra, "Improved Genetic algorithm for channel allocation scheme with channel borrowing in Mobile
Computing", IEEE Transactions on Mobile Computing, vol-5, No.7, July 2006.
[4] Arup Acharya, Archan Misra and Sorav Bansal. .A Label-switching Packet Forwarding architecture for Multi-hop Wireless LANs.
[5] Proc WoWMoM'02, Sep 2002, Atlanta, USA Lundgren, H.: Implementation and Real-world Evaluation of Routing Protocols for
Wireless Ad hoc Networks. Licentiate thesis, Uppsala University (2002)
[6] IETF MANET Working Group: MANET charter. http://www.ietf.org/html. charters/manet-charter.html (2004
[7] Perkins, C., Belding-Royer, E., Das, S.: Request for Comments: Ad hoc on-demand distance vector (AODV) routing.
http://www.ietf.org/rfc/rfc3561.txt (2003).
[8] Johnson, D.B., Maltz, D.A., Hu, Y.C.: Internet draft: The dynamic source routing protocol for mobile ad hoc networks (DSR).
http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt (2003).
[9] Xiong, C., Murata, T., Tsai, J.: Modelling and simulation of routing protocol for mobile ad hoc networks using coloured Petri nets.
In: Proc. Workshop on Formal Methods Applied to Defence Systems in Formal Methods in Software Engineering and Defence
Systems. (2002)
[10] Tian-Tsair SutS, Po-Chiun Huangt, and Chung-Ju Changt,"A channel borrowing protection scheme for handoffs in a cellular
based pcs system" , 0-7803-2955-4/95/ IEEE

Paper Type : Research Paper
Title : Heuristic Route Discovery for Shared Firewall Network
Country : India
Authors : Shahul Ali Khan P.Md, Shaik Jaffar, P.Saksha Ali, M.Narasimha Rao
: 10.9790/0661-0632531       logo
Abstract:In a connection-oriented system, shared firewall protection provides the identical stage of protection against on its own firewall failures as dedicated firewall protection, with potentially superior network exploitation. This document lists the Constraints of firewall placement strategies and proposes a heuristic routing algorithm for communal security provisioning. Simulations be conducted to confirm the algorithm and to balance network utilization of shared firewall protection to that of devoted fortification.
Key words: Firewall, Network Security, intrusion, route discovery
[1] A. Rubin, D. Geer, and M. Ranum, Web Security Sourcebook. Wiley Computer Publishing, 1997.
[2] S. Hinrichs and S. Chen, "Network Management Based on Policies," Proc. SPIE Multimedia Computing and Networking Conf.,
Jan. 2000.
[3] J. Wack, K. Cutler, and J. Pole, Guidelines on Firewalls and Firewall Policy. Nat'l Inst. of Standards and Technology, Jan. 2002 .
[4] Y. Bartal, A. Mayer, K. Nissim, and A. Wool, "Firmato: A Novel Firewall Management Toolkit," ACM Trans. Computer Systems,
vol. 22, no. 4, pp. 381-420, Nov. 2004.
[5] A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, vol. 37, no. 6, pp. 62 -67, June 2004.
[6] H. Court, Knutsford, and Cheshire, "High-Availability: Technology Brief Firewall Load Balancing," High-Availability.Com,
http://www.High-Availability.Com, 2003.
[7] "Firewall Load Balancing," Nortel Networks, www.nortel.com, 2009.
[8] "Check Point Firewall-1 Guide," Check Point, www.checkpoint. com, 2009.
[9] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms. MIT Press, 2003.
[10] M.G. Gouda and A.X. Liu, "Firewall Design: Consistency, Completeness and Compactness," Proc. Int'l Conf. Distributed
Computing Systems (ICDCS '04), pp. 320-327, Mar. 2004.

Paper Type : Research Paper
Title : "Performance analysis of Data Mining algorithms in Weka"
Country : India
Authors : Mahendra Tiwari, Manu Bhai Jha, OmPrakash Yadav
: 10.9790/0661-0633241       logo
Abstract:The retail industry collects vast amounts of data on sales, customer buying history, goods, and service with ease of use of modern computing technology. This paper elaborates the use of data mining technique to help retailers to identify customer profile for a retail store and behaviors, improve better customer satisfaction and retention. The aim is to judge the accuracy of different data mining algorithms on various data sets. The performance analysis depends on many factors encompassing test mode, different nature of data sets, and size of data set.
Key words:data mining, performance, analysis, retail
[1] www.boirefillergroup.com/....KDD_CONFERENCE_PAPER_AUG2006.pdf
[2] www.dcc.fc.up.pt/~ricroc/aulas/0708/atdmlp/material/paper_dmbiz06.pdf
[3] www.ecmlpkdd2006.org/ws-pdmaec.pdf
[4] http://www.linkedin.com/in/federicocesconi
[5] www.linkedin.com/in/federicocesconi
[6] C. Ling and C. Li, (1998 ) "Data mining for direct marketing: Problem and solutions," in Proc, of the 4 th international Conference
on Knowledge Discovery & Data Mining, pp. 73-79
[7] John, F., Elder iv and Dean W.(1998) A comparison of leading data mining tools, fourth International conference on Knowledge
discovery and data mining pp.1-31
[8] Michel A., et all (1998), Evaluation of fourteen desktop data mining tools , pp 1-6
[9] Kleissner, C.(1998),, data mining for the enterprise, Proceeding of the 31st annual Hawaii International conference on system
science
[10] Brijs, T., Swinnen, G.,(1999), using association rules for product assortment decisions: A case study., Data Mining and knowledge
discovery 254.

Paper Type : Research Paper
Title : Multicast Routing Protocol with Group-Level Congestion Prediction and Permanence under Constrained Energy Utilization for Mobile Ad Hoc Networks
Country : India
Authors : K.Himabindu, R.Sumalatha
: 10.9790/0661-0634251       logo
Abstract:Here during this document A MAC layer stage overloading detection system has been foreseeable. The planned model aims to share out associate degree energy competent mechanism to calculate the degree of congestion at victim node with maximal accuracy. This block detection tool is incorporated with a sequence Crosslayered obstruction management Routing Topology. The projected model involves hard of congestion in 2 steps with effectual energy capable congestion detection and most favorable consumption of possessions. Packet loss in network routing is principally because of link failure and congestion. Most of the procurable congestion manages solutions don't have the flexibility to differentiate between packet loss owing to association collapse and packet loss unpaid to congestion. As a consequence these explanations aim towards exploiting against packet drop owing to link breaks down that could be a redundant endeavor and may turn out in defeat of resources. The opposite aspect within the majority of the simple to urge to resolve is that the consumption of power and resources to tell the apart jamming state, the amount of congestion and alert the premise node concerning congestion in routing path. Here during this document we tend to propose a cross lined model of congestion recognition and manage mechanism that contain power economical congestion discovery, Grouplevel Congestion Prediction (GCP) and Group-level Egress Permanence(GEP) algorithms that could work in sequence for congestion detection and manage model. This paper includes explorations and simulation results that demonstrate the increased store consumption, power potency in congestion discovery and congestion management is probable by the projected topology.
Keywords: quality of service, cross-layer protocols, multimedia communication, Low-power design, multicast routing
[1] C.S.R. Murthy and B.S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall, 2004.
[2] J. Janssen, D.D. Vleeschauwer, G.H. Petit, R. Windey, and J.M. Leroy, "Delay Bounds for Voice over IP Calls Transported over
Satellite Access Links," Mobile Networks and Applications, vol. 7, pp. 79 -89, 2002.
[3] B. Tavli and W. Heinzelman, Mobile Ad Hoc Networks: Energy- Efficient Real-Time Group Communications. Springer, 2006.
[4] C.W. Wu and Y.C. Tay, "AMRIS: A Multicast Protocol for Ad Hoc Wireless Networks," Proc. IEEE Military Comm. Conf., vol. 1,
pp. 25-29, 1999.
[5] S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile
Networks and Applications, vol. 7, pp. 441-453, 2002.
[6] V. Kawadia and P.R. Kumar, "A Cautionary Perspective on Cross- Layer Design," IEEE Wireless Comm., vol. 12, no. 1, pp. 3-11,
Feb. 2005.
[7] J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc.
ACM Int‟l Symp. Mobile Ad Hoc Networking and Computing, pp. 33-44, 2001.
[8] Mohammad M. Qabajeh, Aisha Hashim, Othman Khalifa & Liana K. Qabajeh, 2010, "Geographical Multicast Quality of Service
Routing Protocol for Mobile Ad-Hoc Networks", Journal of Engineering Letters, Vol. 18, No. 3, pp. 212-225.
[9] W. Liang, "Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5,
no. 4, pp. 377-387, Apr. 2006.
[10] B. Tavli and W. Heinzelman, "TRACE: Time Reservation Using Adaptive Control for Energy Efficiency," IEEE J. Selected Areas
Comm., vol. 21, no. 10, pp. 1506-1515, Dec. 2003.

Paper Type : Research Paper
Title : Security in MANET based on PKI using fuzzy function
Country : Egypt
Authors : I.M.Hanafy, A.A.Salama, M. Abdelfttah, Y. M.Wazery
: 10.9790/0661-0635258       logo
Abstract:In Mobile Adhoc Network the design of security model is a very critical and essential topic, this is due to the rapidly changing nature of this type of networks. Many other factors should be in consideration while handling mobile adhoc networks like the lake of infrastructure, bandwidth, etc. a security scheme is proposed based on Public Key infrastructure for distributing session keys between nodes. The length of those keys is decided using fuzzy logic manipulation for the discrimination between some of the attacks applied over this kind of networks. The proposed algorithm of Security-model is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions of mobile hosts. Experimental results show that the use of fuzzy based security can enhance the security of mobile adhoc networks.
Key words:MANET; Security; wireless; Communication; fuzzy; PKI; KNN
[1.] Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[2.] AW. Stallings; ―Cryptography and Network Security – Principles and Practice‖, 9th Edition; Prentice Hall 2010
[3.] Dr.A.Rajaram, S.Vaithiya lingam. ― Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET‖.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011
[4.] S. Balachandran, D. Dasgupta and L. Wang. ― Hybrid Approach for Misbehavior Detection in Wireless Ad -Hoc Networks‖.
Published in Symposium on Information Assurance, New York, June 14-15, 2006.
[5.] A.Rajaram, S.Palaniswami .‖ THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET‖. International
Journal of Engineering Science and Technology. Vol. 2(7), 2010, 3111-3119
[6.] C Balakrishnan, V. Varadharajan, U. K. Tupakula, and P.Lucs, "Trust Integrated Cooperation Architecture for Mobile Ad-hoc
Networks". Proceedings of 4th IEEE International Symposium on Wireless Communication Systems (ISWCS 2007), Trondheim,
Norway, 2007.
[7.] A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, "Reputation and Trust-Based Systems for Ad-hoc and Sensor
Networks," Algorithms and Protocols for Wireless Ad-hoc and Sensor Networks, A. Boukerche (ed.), Wiley & Sons, 2011.
[8.] K.Seshadri Ramana et al.‖ Trust Based Security Routing in Mobile Adhoc Networks‖, (IJCSE) International Journal on Computer
Science and Engineering Vol. 02, No. 02, 2010, pp 259-263.
[9.] Yan L. Sun, Wei Yu, ‖Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks‖, 2006 IEEE,
pp305-317
[10.] Er. Banita Chadhaa, Er. Zatin Gupta,‖ Security Architecture for Mobile Adhoc Networks‖ (IJAEST) INTERNATIONAL
JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 9, 2011, pp 101 – 104