Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Puranik, Vishal Gangadhar
- Improving the Security Based Routing Protocol for Wireless Sensor Networks
Abstract Views :166 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science Engineering, Sri Indu College of Engineering and Technology, India., IN
2 Department of Electronics and Telecommunication Engineering, Vasantdada Patil Pratishthan’s College of Engineering and Visual Arts, India., IN
3 Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
1 Department of Computer Science Engineering, Sri Indu College of Engineering and Technology, India., IN
2 Department of Electronics and Telecommunication Engineering, Vasantdada Patil Pratishthan’s College of Engineering and Visual Arts, India., IN
3 Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., IN
4 Department of Information Technology, RMK Engineering College, India., IN
Source
ICTACT Journal on Communication Technology, Vol 14, No 1 (2023), Pagination: 2889-2893Abstract
Wireless sensor networks (WSNs) have become one of the most popular wireless communication systems in the world. Various attacks have been launched against the WSN individual nodes over the past few years, and the overall security of the network has gradually deteriorated. In this research, we propose a secure uneven clustering method for WSN. The proposed method is based on a trust score evaluation model with the objective of identifying malevolent users in WSNs. The trust score is used to determine whether or not a node is malicious. The results show that the proposed Trust Algorithm outperforms the currently used LEACH algorithm, the TASRP algorithm and the FLSO algorithm in terms of the percentage of packets that are successfully delivered across all use cases and density of nodes.Keywords
Security, Routing Protocol, Wireless Sensor Network.References
- S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks”, Proceedings of International Conference on Communication, Computing and Security, pp. 146-151, 2011.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- V. Balasubramanian and A. Karmouch, “Managing the Mobile Ad-Hoc Cloud Ecosystem using software Defined Networking Principles”, Proceedings of International Symposium on Networks, Computers and Communications, pp. 1-6, 2017.
- M. Maalej, S. Cherif and H. Besbes, “QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks”, The Scientific World Journal, Vol. 2013, pp. 1-11, 2013.
- M. Chen, T. Kwon, S. Mao, Y. Yuan and V.C. Leung, “Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks”, International Journal of Sensor Networks, Vol. 4, No. 1-2, pp. 104-112, 2008.
- S. Murthy and G. Varaprasad, “Digital Signature-based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks”, IEEE Sensors Journal, Vol. 12, No. 10, pp. 2941-2949, 2012.
- A. Ahmed and A.W. Khan, “TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network”, IEEE Sensors Journal, Vol .15, No. 12, pp. 6962-6972, 2015.
- T. Khan and K. Singh, “TASRP: A Trust Aware Secure Routing Protocol for Wireless Sensor Networks”, International Journal of Innovative Computing and Applications, Vol. 12, No. 2-3, pp. 108-122, 2021.
- L. Gong and Z. Zhao, “Fine-Grained Trust-Based Routing Algorithm for Wireless Sensor Networks”, Mobile Networks and Applications, Vol. 2021, pp. 1-10, 2021.
- W. Lou, “An Efficient N-to-1 Multipath Routing Protocol in Wireless Sensor Networks”, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1-8, 2005.
- K. Zhang and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks using Group Key Management”, Proceedings of IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-5, 2008.
- R. Sumathi and M.G. Srinivas, “A Survey of QoS Based Routing Protocols for Wireless Sensor Networks”, Journal of Information Processing Systems, Vol. 8, No. 4, pp. 589- 602, 2012.
- L. Daanoune and A. Ballouk, “A Comprehensive Survey on LEACH-based Clustering Routing Protocols in Wireless Sensor Networks”, Ad Hoc Networks, Vol. 114, pp. 102409- 102415, 2021.
- S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
- U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.
- Quality of Video Rendering Techniques Using Artificial Intelligence
Abstract Views :154 |
PDF Views:0
Authors
Affiliations
1 Government B.Ed. Training College Kalinga, India., IN
2 Department of Computer Science and Engineering, Don Bosco Institute of Technology, India., IN
3 Department of Information Science and Engineering, RR Institute of Technology, India., IN
4 Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., IN
1 Government B.Ed. Training College Kalinga, India., IN
2 Department of Computer Science and Engineering, Don Bosco Institute of Technology, India., IN
3 Department of Information Science and Engineering, RR Institute of Technology, India., IN
4 Department of Electronics and Telecommunication Engineering, JSPM’s Bhivarabai Sawant Institute of Technology and Research, India., IN
Source
ICTACT Journal on Image and Video Processing, Vol 13, No 3 (2023), Pagination: 2940-2946Abstract
In this paper, we propose a novel method that makes use of artificial intelligence to determine in a quick and accurate manner which bitrate ladder is best suited to each specific video scenario. This method is included as part of our overall contribution to this body of research. To accomplish fast entropy-based scene recognition using the artificial intelligence technique, a CNN model is utilised as part of the overall strategy. We were able to significantly reduce the amount of processing time necessary to recognise the scenes because we were dealing with versions of the video sequences that had both a lower quality and a lower bitrate. This allowed us to work more quickly. We first generated a training dataset that was large enough to train a convolutional neural network utilising the x264 video codec, and then we used that dataset to generate multiple encodings with varying bitrates, presets, and resolutions. The training dataset was created using the x264 video codec. As a result of the research that we carried out, we concluded that a particular collection of input features for the CNN model can be used to acquire a more accurate prediction of the level of video quality that will be produced. By predicting the PSNR quality measure for the segments, the suggested CNN model brings down the MAE and MSE to 0.2 and 0.05, respectively. This is accomplished by reducing the number of segments. This serves to reduce the amount of error overall.Keywords
Artificial Intelligence, Convolutional Neural Network, Video Quality Enhancement, Video Rendering.References
- Giuseppe Baruffa and Fabrizio Frescura, “Adaptive Error Protection Coding for Wireless Transmission of Motion JPEG 2000 Video”, EURASIP Journal on Image and Video Processing, Vol. 10, pp. 123-134, 2016.
- S. Ponlatha and R.S. Sabeenian, “Comparison of Video Compression Standards”, International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, pp. 549-554, 2013
- M. Deepa and M.C. Binish, “A Fast Intra Prediction for H.264/AVC based on SATD and Prediction Direction”, Proceedings of International Conference on Emerging Trends in Engineering, Science and Technology, pp. 1016- 1023, 2016.
- V. Bichu, G. Hegde and S. Sanju, “Fast Block-Matching Motion Estimation using Modified Diamond Search Algorithm”, Proceedings of International Journal of Advanced Computer Engineering and Communication Technology, pp. 423-429, 2014.
- M. Ma, O. C. Au and S.H.G. Chan, “Edge-Directed Error Concealment”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 20, No. 3, pp. 382-395, 2010.
- Hadi Asheri, Hamid R. Rabiee, Nima Pourdamghani and Mohammad Ghanbari, “Multi-Directional Spatial Error Concealment using Adaptive Edge Thresholding”, IEEE Transactions on Consumer Electronics, Vol. 58, No. 3, pp. 880-885, 2012.
- Ulil S. Zulpratita, “GOP Length Effect Analysis on H.264/AVC Video Streaming Transmission Quality over LTE Network”, Proceedings of International Conference on Computer Science and Information Technology, pp. 5-9, 2013.
- K. Asha, D. Anuradha and M. Rizvana, “Human Vision System's Region of Interest Based Video Coding”, Compusoft, Vol. 2, No. 5, pp. 127-134, 2013.
- C. Chandrasekar, “Qos-Continuous Live Media Streaming in Mobile Environment using VBR and Edge Network”, International Journal of Computer Applications, Vol. 53, No. 6, pp. 1-13, 2012.
- Bruno Zatt, Marcelo Schiavon Porto, Jacob Scharcanski and Sergio Bampi, “GOP Structure Adaptive to the Video Content for Efficient H.264/AVC Encoding”, Proceedings of International Conference on Image Processing, pp. 281- 288, 2014.
- Classification of Social Media Content and Improved Community Detection (C&CD) Using VGGNet Learning and Analytics
Abstract Views :78 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Telecommunications Engineering, MIT Academy of Engineering, IN
2 Department of Computer Science, Johns Hopkins University, US
3 Department of Artificial Intelligence and Machine Learning, Excel Engineering College, IN
4 Department of Electronics and Communication Engineering, Roever Engineering College, IN
1 Department of Electronics and Telecommunications Engineering, MIT Academy of Engineering, IN
2 Department of Computer Science, Johns Hopkins University, US
3 Department of Artificial Intelligence and Machine Learning, Excel Engineering College, IN
4 Department of Electronics and Communication Engineering, Roever Engineering College, IN
Source
ICTACT Journal on Image and Video Processing, Vol 14, No 3 (2024), Pagination: 3181-3186Abstract
Social media platforms generate vast amounts of data, necessitating efficient content classification and community detection methods. This study addresses this challenge through the utilization of VGGNet analytics, a powerful deep learning architecture. We employed a two-step approach, beginning with VGGNet-based content classification to categorize social media posts. Subsequently, a community detection algorithm was applied to identify distinct user groups based on their interactions and content preferences. This research contributes an novel framework that seamlessly integrates VGGNet for content analysis and community detection, enhancing the understanding of user behavior in social media platforms. The proposed method aims to provide more accurate and insightful results compared to traditional approaches. Our experiments on diverse social media datasets demonstrate the effectiveness of the VGGNet-based approach. The content classification accurately assigns posts to relevant categories, while the community detection algorithm identifies cohesive user groups. The results highlight the potential for improved content recommendation systems and targeted marketing strategies.Keywords
Community Detection, Content Classification, Social Media, VGGNet Analytics, Deep Learning.References
- D. Rogers and I. Spasic, “Real-Time Text Classification of User-Generated Content on Social Media: Systematic Review”, IEEE Transactions on Computational Social Systems, Vol. 9, No. 4, pp. 1154-1166, 2021.
- C. Southerton and R. Cover, “Restricted Modes: Social Media, Content Classification and LGBTQ Sexual Citizenship”, New Media and Society, Vol. 23, No. 5, pp. 920-938, 2021.
- A. Kumar, Y.K. Dwivedi and N.P. Rana, “A Deep Multi-Modal Neural Network for Informative Twitter Content Classification during Emergencies”, Annals of Operations Research, Vol. 76, pp. 1-32, 2020.
- R. Rivas, Y. Guo and V. Hristidis, “Classification of Health-Related Social Media Posts: Evaluation of Post Content-Classifier Models and Analysis of User Demographics”, JMIR Public Health and Surveillance, Vol. 6, No. 2, pp. 1-13, 2020.
- Z. Shahbazi and D.C. Lee, “Toward Representing Automatic Knowledge Discovery from Social Media Contents based on Document Classification”, International Journal on Advance Science and Technology, Vol. 29, pp. 14089-14096, 2020.
- A. Bhardwaj, “Sentiment Analysis and Text Classification for Social Media Contents using Machine Learning Techniques”, Proceedings of International Conference on IoT, Social, Mobile, Analytics and Cloud in Computational Vision and Bio Engineering, pp. 1-12, 2020.
- I.H. Ting and C.S. Yen, “Towards Automatic Generated Content Website based on Content Classification and Auto-Article Generation”, Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 436-438, 2021.
- M.A. Al Garadi and A. Sarker, “Text Classification Models for the Automatic Detection of Nonmedical Prescription Medication use from Social Media”, BMC Medical Informatics and Decision Making, Vol. 21, No. 1, pp. 1-13, 2021.
- T. Xiang and N. Goharian, “ToxCCIn: Toxic Content Classification with Interpretability”, Proceedings of International Conference on Artificial Intelligence, pp. 1-8, 2021.
- A.S. Raamkumar and H.L. Wee, “Use of Health Belief Model-Based Deep Learning Classifiers for Covid-19 Social Media Content to Examine Public Perceptions of Physical Distancing: Model Development and Case Study”, JMIR Public Health and Surveillance, Vol. 6, No. 3, pp. 1-12, 2020.
- D. Kumar and M. Bailey, “Designing Toxic Content Classification for a Diversity of Perspectives”, Proceedings of 17th Symposium on Usable Privacy and Security, pp. 299-318, 2021.
- S.D. Rane, “Social Media Content Analysis and Classification using Data Mining and ML”, International Journal of Data Analytics, Vol. 2, No. 2, pp. 75-84, 2021.