Refine your search
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Suhasini, A.
- Efficient Multipath Zone-Based Routing in MANET Using (TID-ZMGR) Ticked-ID Based Zone Manager
Abstract Views :353 |
PDF Views:2
Authors
Affiliations
1 Department Computer Science and Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
2 Department Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
3 Department of Electronics and Communications Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
1 Department Computer Science and Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
2 Department Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
3 Department of Electronics and Communications Engineering, Saranathan College of Engineering, Trichy, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 435-443Abstract
Mobile ad hoc networks (MANETs) is an infrastructure-less network, which is self-organizing, self-configuring and dynamic. The traditional routing protocol is not efficient against the routing challenges. The traditional MANET routing mechanisms involve overhearing, retransmission, and idle listening, which consume high energy. The main obstacles for MANET are end-to-end delay, energy consumption, and packet collision problems. The enhancement of network lifetime and communication performance is still a challenging task. This paper proposes a Ticket-ID zone manager routing protocol (TID-ZMGR) with sleep scheduling for MANETS. The proposed system consists of a zone routing system that is effective in load balancing and energy-efficient. In the proposed approach, nodes in the network are grouped as zones with a zone leader (ZL). The ZL is the node with higher efficiency in terms of energy, link quality, connectivity, and distances. The TID-ZMGR follows a multipath mechanism for balancing the load, and traffic is controlled by distributing the path from source to destination. The implementation of an adaptive sleep duty cycling approach ensures error-free communication around the network. Additionally, the adaptive sleep duty cycling approach increases the overall accuracy by saving the power on border nodes. The efficiency of the proposed work is proved by the comparison work carried out between Ticket-ID Based Routing management system (TID-BRM) Zone-based Routing with Parallel Collision Guided Broadcasting Protocol (ZCG) and Distance aware Zone Routing Protocol (DZRP) with TID-ZMGR. Experimental work evaluation metrics are zonal leader changes, energy consumptions, and network lifetime. Simulation result shows proposed mechanism achieves minimum energy consumption with improved output on throughput and packet delivery ratio.Keywords
MANET, ZL, ZCG, DZRP, TID-ZMGR.References
- Ravilla D, Putta CSR (2012) Energy Management in zone routing protocol (ZRP). In: Wyld D, Zizka J, Nagamalai D (eds) Advances in computer science, engineering & applications. Advances in intelligent systems and computing, vol 167. Springer, Berlin, Heidelberg, pp 355–366
- Sateesh Kumar P, Ramachandram S (2009) Load balancing in genetic zone routing protocol for MANETs. World Acad Sci Eng Technol 35:517–522
- Nair AL, Perumal Sankar S (2016) Sleep scheduling technique for geographic routing in MANET. Int J Adv Res Electric Electron Instrum Eng 5(2):674–680
- Beijar N (2008) Zone routing protocol (ZRP). Networking Laboratory, Helsinki University of Technology, Espoo
- Aastha Mishra,Shweta Singh,Arun Kumar Tripathi, (2019). Comparison of MANET routing protocols, A Monthly Journal of Computer Science and Information Technology (IJCSMC), Vol. 8, Issue. 2, ISSN 2320–088X, pg. 67–74
- K.Spurthi, T.N.shankar, An Efficient Cluster Computing Mechanism for Wormhole Attack Detection in MANET, International Journal of Advanced Science and Technology 29(7)(2020)
- Hossain, S., Hussain, M. S., Ema, R. R., Dutta, S., Sarkar, S., & Islam, T. (2019). Detecting Blackhole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET. (2019),10th International Conference on Computing, Communication, and Networking Technologies (ICCCNT)
- K.Spurthi, T.N.Shankar, A Research on Wormhole Attack in Mobile Adhoc Networks, International Journal Of Recent Technology and Engineering, 8(14) (2019) 1125-1130.
- Khan, M. F., Aadil, F., Maqsood, M., Bukhari, S. H. R., Hussain, M., & Nam, Y. (2019). Moth fame clustering algorithm for internet of vehicle (MFCA-IoV)
- W.-H. Liao, J.-P. Sheu, and Y.-C. Tseng, “GRID: a fully location-aware routing protocol for mobile ad hoc networks,” Telecommunication Systems, vol. 18, no. 1–3, pp. 37–60, 2001.
- Ray NK, Turuk AK (2016) A hybrid energy-efficient protocol for mobile ad hoc networks. J Comput Netw Commun 2016:1–11
- Shadi Basurra, Marina De Vos and Julian A. Padget , "Energy Efficient Zone-based Routing Protocol for MANETs", https://www.researchgate.net/, 2014, DOI:10.1016/j.adhoc.2014.09.010
- Sudarsan D (2014) Modified distance aware zone routing protocol for less delay transmission in MANET. Int J Res Eng Adv Technol 2(5):1–6
- Bhattacharya I, Bhattacharyya D, Barman S (2013) ZMEED: a zone based enhanced hybrid routing protocol for delay tolerant network. Int J Comput Appl 2013(2):7–11
- Shakya M, Markam K (2016) Comparison of AODV and DSR routing protocols by using group mobility model with varying pause time in vehicular ad-hoc network. International Journal of Hybrid Information Technology Vol.9, No.2 (2016), pp. 177-182 http://dx.doi.org/10.14257/ijhit.2016.9.2.15
- Ullah F, Ullah Z, Ahmad S, Islam IUI, Rehman SU, Iqbal J (2019) Traffic priority-based delay-aware and energy-efficient path allocation routing protocol for wireless body area network. J Ambient Intell Humaniz Comput 10:3775–3794
- M. B. Talawar and D. Ashoka, “Link failure detection in MANET: A survey,” in Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough Studies in Computational Intelligence, vol. 885. Cham: Springer, pp. 169–182, 2020.
- S. Mirjalili, “Genetic algorithm,” in Evolutionary Algorithms and Neural Networks. Studies in Computational Intelligence, vol. 780. Cham: Springer, pp. 43–55, 2019.
- D. Kukreja, D. K. Sharma, S. K. Dhurandher and B. R. Reddy, "GASER: Genetic algorithm-based secure and energy-aware routing protocol for sparse mobile ad hoc networks," International Journal of Advanced Intelligence Paradigms, vol. 13, no. 1–2, pp. 230–259, 2019.
- D. G. Zhang, S. Liu, X. H. Liu, T. Zhang and Y. Y. Cui, “Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO),” International Journal of Communication Systems, vol. 31, no. 18, pp. e3824, 2018.
- Venkatasubramanian, S., Suhasini, A. & Vennila, C. An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08731-6.
- Automated Skin Defect Identification System for Orange Fruit Grading Based on Genetic Algorithm
Abstract Views :369 |
PDF Views:147
Authors
R. Thendral
1,
A. Suhasini
1
Affiliations
1 Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, Chidambaram 608 002, IN
1 Department of Computer Science and Engineering, Annamalai University, Annamalai Nagar, Chidambaram 608 002, IN
Source
Current Science, Vol 112, No 08 (2017), Pagination: 1704-1711Abstract
Using machine vision technology to grade oranges can ensure that only good-quality fruits are exported. One of the most prominent issues in the post-harvest processing of oranges is the efficient determination of skin defects with the intention of classifying the fruits depending on their external appearance. Shape, size, colour and texture are the important grading parameters that dictate the quality and value of many fruit products. The accuracy of the evaluation results is increased by proper combination of different grading parameters. This article presents an efficient orange surface grading system (normal and defective) based on the colour and texture features. As a part of the feature selection step, this article presents a wrapper approach with genetic algorithm to search out and identify the informative feature subset for classification. The selected features were subjected to various classifiers such as support vector machine, back propagation neural network and auto associative neural network (AANN) to study the performance analysis among these three classifiers. The results reveal that AANN classification algorithm has the highest accuracy rate of 94.5% among these three classifiers.Keywords
Colour and Texture Features, Genetic Algorithm, Oranges, Skin Defect Identification.References
- Indian Horticulture Data Base, Ministry of Agriculture, Government of India, 2014.
- Brosnan, T. and Sun, D. W., Improving quality inspection of food products by computer vision – a review. J. Food Eng., 2004, 61, 3–16.
- Clement, J., Novas, N., Gazquez, J. A. and Manzano Agugliaro, F., High speed intelligent classifier of tomatoes by colour, size and weight. Spanish J. Agric. Res., 2012, 10, 314–325.
- Cerruto, E., Failla, S. and Schillaci, G., Identification of blemishes on oranges. In International Conference on Agricultural Engineering, AgEng 96, Madrid, Spain, 1996.
- Li, Q., Wang, M. and Gu, W., Computer vision based system for apple surface defect detection. Comput. Electron. Agric., 2002, 36, 215–223.
- Wen, Z. and Tao, Y., Building a rule-based machine vision system for defect inspection on apple sorting and packing lines. Expert Syst. Appl., 1999, 16, 307–313.
- Leemans, V. and Destain, M. F., A real-time grading method of apples based on features extracted from defects. J. Food Eng., 2004, 61, 83–89.
- Diaz, R., Gil, L., Serrano, C., Blasco, M., Molto, E. and Blasco, J., Comparison of three algorithms in the classification of table olives by means of computer vision. J. Food Eng., 2004, 61, 101–107.
- Guyer, D., Uthaisombut, P. and Stockman, G., Tissue reflectance and machine vision for automated sweet cherry sorting. In Photonics East ’96. International Society for Optics and Photonics, 1996, 2907, pp. 152–165.
- Miller, B. K. and Delwiche, M. J., Peach defect detection with machine vision. Trans. ASAE, 1991, 34, 2588–2597.
- Singh, N. and Delwiche, M. J., Machine vision methods for defect sorting stonefruit. Trans. ASAE, 1994, 37, 1989–1997.
- Shearer, S. A. and Payne, F. A., Color and defect sorting of bell peppers using machine vision. Trans. ASAE, 1990, 33, 1245–1250.
- Wulfsohn, D., Sarig, Y. and Algazi, R. V., Defect sorting of dry dates by image analysis. Can. Agric. Eng., 1993, 35, 133–139.
- Pearson, T., Machine vision system for automated detection of stained pistachio nuts. LWT – Food Sci. Technol., 1996, 29, 203– 209.
- Heinemann, P. H., Hughes, R., Morrow, C. T., Sommer, H. J., Beelman, R. B. and Wuest, P. J., Grading of mushrooms using a machine vision system. Trans. ASAE, 1994, 37, 1671–1677.
- Muir, A. Y., Porteous, R. L. and Wastie, R. L., Experiments in the detection of incipient diseases in potato tubers by optical methods. J. Agric. Eng. Res., 1982, 27, 131–138.
- Arivazhagan, S., Newlin Shebiah, R., Selva Nidhyanandham, S. and Ganesan, L., Fruit recognition using color and texture features. J. Emerg. Trends Comput. Inf. Sci., 2010, 1, 90–94.
- Meenu, D. and Banga, V. K., Estimate ripeness level of fruits using RGB color space and fuzzy logic technique. Int. J. Eng. Adv. Technol., 2012, 2, 225–229.
- Blasco, J., Aleixos, N., Gomez, J. and Molto, E., Citrus sorting by identification of the most common defects using multispectral computer vision. J. Food Eng., 2007, 83, 384–393.
- Haralick, R. M., Shanmugam, K. and Denstien, I., Textural features for image classification. IEEE Trans. Syst. Man Cybern., 1973, 3, 610–621.
- Couceiro, M. S., Rocha, R. P., Ferreira, N. M. F. and Machado, J. A. T., Introducing the fractional-order Darwinian PSO. Signal Image Video Process., 2012, 6, 343–350.
- Sun, X. et al., Predicting beef tenderness using color and multispectral image texture features. Meat Sci., 2012, 92, 386–393.
- Gauch, J. M. and Hsia, C. W., A comparison of three color image segmentation algorithms in four color spaces. In Proceedings of SPIE Visual Communications Image Processing, Petros Maragos, Boston, 1992, vol. 1818, pp. 1168–1181.
- Wu, T., Xie, K., Nie, C. and Song, G., An adaption of relief for redundant feature elimination. In Advances in Neural Networks, Lecture Notes in Computer Science, Springer, Berlin, 2012, vol.7368, pp. 73–81.
- Bins, J. and Draper, B. A., Feature selection from huge feature sets. In Proceedings of the Eighth IEEE International Conference on Computer Vision, USA, 2001, vol. 2, pp. 159–165.
- Yang, C. H., Shih, T. M. and Chuang, L. Y., Reducing SAGE data using genetic algorithms. World Acad. Sci. Eng. Technol., 2009, 3, 198–202.
- Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET
Abstract Views :204 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, Faculty of Engineering and Technology, Annamalai University, Chidambaram, Tamil Nadu, India., IN
2 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India, IN
3 Electronics and Communication Department, Saranathan College of Engineering, Trichy, Tamil Nadu,, IN
1 Department of Computer Science and Engineering, Faculty of Engineering and Technology, Annamalai University, Chidambaram, Tamil Nadu, India., IN
2 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India, IN
3 Electronics and Communication Department, Saranathan College of Engineering, Trichy, Tamil Nadu,, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 6 (2022), Pagination: 724-735Abstract
.The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a "black hole" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.Keywords
Black Hole Attack, Convolutional Neural Network, Mobile Ad-Hoc Networks, Long Short-Term Memory, Hybrid Cat-Particle Swarm Optimization, Grey Hole Attacks.References
- Moudni, H., Er-rouidi, M., Mouncif, H. and El Hadadi, B., 2019. Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, pp.1176-1181.
- Gurung, S. and Chauhan, S., 2020. A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Networks, 26(3), pp.1981-2011.
- Eswaran, S., Rani, V., D., D., Ramakrishnan, J., & Selvakumar, S. (2021). An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure. International Journal of Pervasive Computing and Communications, 18(1), 59–78. https://doi.org/10.1108/ijpcc-04-2021- 0102.
- Manoranjini, J., Chandrasekar, A. and Jothi, S., 2019. Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika: časopiszaautomatiku, mjerenje, elektroniku, računarstvoikomunikacije, 60(3), pp.274-284.
- Yasin, A. and Abu Zant, M., 2018. Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wireless Communications and Mobile Computing, 2018.
- Sadhana, S., Sivaraman, E., & Daniel, D. (2021). Enhanced EnergyEfficient Routing for Wireless Sensor Network Using Extended PowerEfficient Gathering in Sensor Information Systems (E-PEGASIS) Protocol. Smart Systems: Innovations in Computing, 159–171. https://doi.org/10.1007/978-981-16-2877-1_16.
- Gurung, S. and Chauhan, S., 2018. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24(8), pp.2957-2971.
- Thanuja, R. and Umamakeswari, A., 2019. Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Cluster computing, 22(2), pp.3131-3143.
- Rajendran, N., Jawahar, P.K. and Priyadarshini, R., 2019. Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, pp.129-135.
- Daniel D., Preethi N., Jakka, A., & Eswaran, S. (2021). Collaborative Intrusion Detection System in Cognitive Smart City Network (CSCNet). International Journal of Knowledge and Systems Science, 12(1), pp.60–73, https://doi.org/10.4018/ijkss.2021010105.
- Panda, N. and Pattanayak, B.K., 2018. Energy aware detection and prevention of black hole attack in MANET. International Journal of Engineering and Technology (UAE), 7(2.6), pp.135-140.
- Abood, M.S., Mahdi, H.F., Hamdi, M.M., Ibrahim, O.J., Mohammed, R.Q. and Ahmed, S.F., 2020, December. Black/Gray Holes Detection Tools in MANET: comparison and analysis. In 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS) (pp. 1-8). IEEE.
- E. Sivaraman, "Dynamic cluster broadcasting for Mobile Ad Hoc Networks," 2010 International Conference on Communication and Computational Intelligence (INCOCCI), 2010, pp. 123-127.
- Arul Selvan, M. and Selvakumar, S., 2019. Malicious node identification using quantitative intrusion detection techniques in MANET. Cluster computing, 22(3), pp.7069-7077.
- Bhuvaneswari, R. and Ramachandran, R., 2019. Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing, 22(5), pp.12689-12699.
- Prasanna, D.J.D., Aravindhar, D.J. and Sivasankar, P., 2021. Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud-MANET. Webology, 18(SI01), pp.88-106.
- Hassan, Z., Mehmood, A., Maple, C., Khan, M.A. and Aldegheishem, A., 2020. Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, pp.199618-199628.
- Rani, P., Verma, S., Rawat, D.B. and Dash, S., 2022. Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing and Applications, pp.1-11.
- Sathyaraj, P. and Kannan, K., 2021. Host based Detection and Prevention of Black Hole attacks by AODV-ICCSO Algorithm for security in MANETs.
- Janakiraman, S., Deva Priya, M., Aishwaryalakshmi, G., Suganya, T., Sam Peter, S., Karthick, S. and Christy Jeba Malar, A., 2022. Improved Rider Optimization Algorithm-Based Link Aware Fault Detection (IROA-LAFD) Scheme for Securing Mobile Ad Hoc Networks (MANETs). In 3rd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (pp. 155-169). Springer, Cham.
- Rani, P., Verma, S. and Nguyen, G.N., 2020. Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, pp.121755-121764.
- Ramachandran, D., Rajeev Ratna, V., PT, V.R. and Garip, I., 2022. A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD). Security and Communication Networks, 2022.
- Srinivasan, V., 2021. Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET. Ingénierie des Systèmesd'Information, 26(6).
- Liu, J., Jiang, X., Nishiyama, H. and Kato, N. (2013a) ‘On the delivery probability of two-hop relay MANETs with erasure coding’, IEEE Transactions on Communications, Vol. 61, No. 4, pp.1314–1326.
- Huang, H. and Zhou, Q. (2012) ‘Petri-net-based modeling and resolving of black hole attack in WMN’, The IEEE 36th Annual Computer Software and Applications Conference Workshops,Izmir, Turkey, pp.409–414.
- Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” Internet Draft, November 2002.
- A. Shevtekar, K. Anantharam, and N. Ansari, “Low Rate TCP Denialof-Service Attack Detection at Edge Routers,” IEEE Commun. Lett., vol. 9, no. 4, Apr. 2005, pp. 363–65.
- Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACMSE 42, APRIL 2004, pp. 96- 97.