Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.20170701.pre
Volume 4
Parikshit N. Mahalle, Mohd. Shafi Pathan, Subhash Shinde
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mahalle, Parikshit N., et al. "Special Issue on Internet of Things, Next Generation Networks, Data Mining and Cloud Computing 2016, Part 2." IJRSDA vol.4, no.3 2017: pp.6-8. http://doi.org/10.4018/IJRSDA.20170701.pre
APA
Mahalle, P. N., Pathan, M. S., & Shinde, S. (2017). Special Issue on Internet of Things, Next Generation Networks, Data Mining and Cloud Computing 2016, Part 2. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 6-8. http://doi.org/10.4018/IJRSDA.20170701.pre
Chicago
Mahalle, Parikshit N., Mohd. Shafi Pathan, and Subhash Shinde. "Special Issue on Internet of Things, Next Generation Networks, Data Mining and Cloud Computing 2016, Part 2," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 6-8. http://doi.org/10.4018/IJRSDA.20170701.pre
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070101
Volume 4
Amol V. Dhumane, Rajesh S. Prasad, Jayashree R. Prasad
In Internet of things and its relevant technologies the routing of data plays one of the major roles. In this paper, a routing algorithm is presented for the networks consisting of smart objects, so...
Show More
In Internet of things and its relevant technologies the routing of data plays one of the major roles. In this paper, a routing algorithm is presented for the networks consisting of smart objects, so that the Internet of Things and its enabling technologies can provide high reliability while the transmitting the data. The proposed technique executes in two stages. In first stage, the sensor nodes are clustered and an optimal cluster head is selected by using k-means clustering algorithm. The clustering is performed based on energy of sensor nodes. Then the energy cost of the cluster head and the trust level of the sensor nodes are determined. At second stage, an optimal path will be selected by using the Genetic Algorithm (GA). The genetic algorithm is based on the energy cost at cluster head, trust level at sensor nodes and path length. The resultant optimal path provides high reliability, better speed and more lifetimes.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Dhumane, Amol V., et al. "An Optimal Routing Algorithm for Internet of Things Enabling Technologies." IJRSDA vol.4, no.3 2017: pp.1-16. http://doi.org/10.4018/IJRSDA.2017070101
APA
Dhumane, A. V., Prasad, R. S., & Prasad, J. R. (2017). An Optimal Routing Algorithm for Internet of Things Enabling Technologies. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 1-16. http://doi.org/10.4018/IJRSDA.2017070101
Chicago
Dhumane, Amol V., Rajesh S. Prasad, and Jayashree R. Prasad. "An Optimal Routing Algorithm for Internet of Things Enabling Technologies," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 1-16. http://doi.org/10.4018/IJRSDA.2017070101
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070102
Volume 4
Nandkumar Prabhakar Kulkarni, Neeli Rashmi Prasad, Ramjee Prasad
Researchers have faced numerous challenges while designing WSNs and protocols in numerous applications. Amongst all sustaining connectivity and capitalizing on the network lifetime is a serious...
Show More
Researchers have faced numerous challenges while designing WSNs and protocols in numerous applications. Amongst all sustaining connectivity and capitalizing on the network lifetime is a serious deliberation. To tackle these two problems, the authors have considered Mobile Wireless Sensor Networks (MWSNs). In this paper, the authors put forward an Evolutionary Mobility aware multi-objective hybrid Routing Protocol for heterogeneous wireless sensor networks (EMRP). EMRP selects the optimal path from source node to sink by means of various metrics such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The Performance of EMRP when equated with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing Algorithm (DyMORA) using parameters such as Average Residual Energy (ARE), Delay and Normalized Routing Load. EMRP improves AES by a factor of 4.93% as related to SHRP and 5.15% as related to DyMORA. EMRP has a 6% lesser delay as compared with DyMORA.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kulkarni, Nandkumar Prabhakar, et al. "An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous WSNs." IJRSDA vol.4, no.3 2017: pp.17-32. http://doi.org/10.4018/IJRSDA.2017070102
APA
Kulkarni, N. P., Prasad, N. R., & Prasad, R. (2017). An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous WSNs. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 17-32. http://doi.org/10.4018/IJRSDA.2017070102
Chicago
Kulkarni, Nandkumar Prabhakar, Neeli Rashmi Prasad, and Ramjee Prasad. "An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous WSNs," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 17-32. http://doi.org/10.4018/IJRSDA.2017070102
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070103
Volume 4
Sujaya Das Gupta, M.S. Zambare, A.D. Shaligram
Recent time has witnessed severe scarcity of water owing to deficient rainfall in India. The current climatic conditions in the country, project the rise in temperature and arid conditions...
Show More
Recent time has witnessed severe scarcity of water owing to deficient rainfall in India. The current climatic conditions in the country, project the rise in temperature and arid conditions contributing substantially towards the evaporation losses. In order to deal with the looming crisis, it is peremptory to minimize evaporation losses in the water bodies, at least measure them to get a fair idea and initiate corrective measures. This paper aims to develop a system for continuous monitoring of the water level as an indicator to the evaporation process. The system also indicates temperature of the water which influences the evaporation rate.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Das Gupta, Sujaya, et al. "IoT Setup for Co-measurement of Water Level and Temperature." IJRSDA vol.4, no.3 2017: pp.33-54. http://doi.org/10.4018/IJRSDA.2017070103
APA
Das Gupta, S., Zambare, M., & Shaligram, A. (2017). IoT Setup for Co-measurement of Water Level and Temperature. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 33-54. http://doi.org/10.4018/IJRSDA.2017070103
Chicago
Das Gupta, Sujaya, M.S. Zambare, and A.D. Shaligram. "IoT Setup for Co-measurement of Water Level and Temperature," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 33-54. http://doi.org/10.4018/IJRSDA.2017070103
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070104
Volume 4
V. Lokeswara Reddy
Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data....
Show More
Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information file within a video. Present day communications are treated to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. The proposed technique is invented to hide secret information into a video file keeping two considerations in mind which are size and security of the cover video file. At the sender side, the secret information which is to be hidden is encoded into cover video file. Double layered security for the secret data can be achieved by encrypting confidential information and by embedding confidential information into cover video file frames using encrypted embedding technique.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070105
Volume 4
D. T. Mane, U. V. Kulkarni
With the advances in the computer science field, various new data science techniques have been emerged. Convolutional Neural Network (CNN) is one of the Deep Learning techniques which have captured...
Show More
With the advances in the computer science field, various new data science techniques have been emerged. Convolutional Neural Network (CNN) is one of the Deep Learning techniques which have captured lots of attention as far as real world applications are considered. It is nothing but the multilayer architecture with hidden computational power which detects features itself. It doesn't require any handcrafted features. The remarkable increase in the computational power of Convolutional Neural Network is due to the use of Graphics processor units, parallel computing, also the availability of large amount of data in various variety forms. This paper gives the broad view of various supervised Convolutional Neural Network applications with its salient features in the fields, mainly Computer vision for Pattern and Object Detection, Natural Language Processing, Speech Recognition, Medical image analysis.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mane, D. T., and U. V. Kulkarni. "A Survey on Supervised Convolutional Neural Network and Its Major Applications." IJRSDA vol.4, no.3 2017: pp.71-82. http://doi.org/10.4018/IJRSDA.2017070105
APA
Mane, D. T. & Kulkarni, U. V. (2017). A Survey on Supervised Convolutional Neural Network and Its Major Applications. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 71-82. http://doi.org/10.4018/IJRSDA.2017070105
Chicago
Mane, D. T., and U. V. Kulkarni. "A Survey on Supervised Convolutional Neural Network and Its Major Applications," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 71-82. http://doi.org/10.4018/IJRSDA.2017070105
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070106
Volume 4
T. A. Chavan, P. Saras
Wireless communication technology is progressing very vastly. With this change in technology customer services for multimedia and non-multimedia are increasing day by day. But due to limited...
Show More
Wireless communication technology is progressing very vastly. With this change in technology customer services for multimedia and non-multimedia are increasing day by day. But due to limited resources of the wireless network, we need to design an efficient CAC algorithm to enhance QoS levels for end users. The Quality of service (QoS) enhancement in the wireless network is related to making an efficient use of current network resources and the optimization of the users. Call acceptance in CAC is one of the challenge in mobile cellular networks to ensure that the acceptance of a new call into a resource limited wireless network should not deviate the service level Agreement (SLAs) at the time of conversations. In the next generation wireless network, CAC has the direct impact on QoS for user calls & overall system performance. To handle handoff calls and new calls in cellular network channel reservation scheme have been already proposed to reserve system bandwidth for higher priority call for CAC. This earlier proposed scheme is not as per the required level of satisfaction because the available reversed bandwidth is not allocated properly in case of least handoff rate. In this, the authors like to present a new channel borrowing scheme where new non real time (NRT) calls can make use of reserved channels. It can borrow this reserved channel on a temporary basis and after this immediately if any handoff call enters the current cell and no any other channels are available, then it will pre-empt the channel from an earlier borrowed NRT user if exists. This pre-empted NRT call is kept in the priority queue to consider its service when any channel becomes free. The number of NRT calls in the queue should not be large to avoid delayed service. The fundamental objective of the proposed scheme to design of the system for evaluating the results and comparing with the results of the existing system. From the results of current research work, it is observed that proposed scheme decreases call dropping probability which increase slightly in call blocking rate over high-density handoff call rate.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Chavan, T. A., and P. Saras. "A Novel Call Admission Control Algorithm for Next Generation Wireless Mobile Communication." IJRSDA vol.4, no.3 2017: pp.83-95. http://doi.org/10.4018/IJRSDA.2017070106
APA
Chavan, T. A. & Saras, P. (2017). A Novel Call Admission Control Algorithm for Next Generation Wireless Mobile Communication. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 83-95. http://doi.org/10.4018/IJRSDA.2017070106
Chicago
Chavan, T. A., and P. Saras. "A Novel Call Admission Control Algorithm for Next Generation Wireless Mobile Communication," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 83-95. http://doi.org/10.4018/IJRSDA.2017070106
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070107
Volume 4
Sandesh Mahamure, Poonam N. Railkar, Parikshit N. Mahalle
Now we are in the era of ubiquitous computing. Internet of things (IoT) is getting matured in various parts of the world. In coming few years' billions and trillions of things will be connected to...
Show More
Now we are in the era of ubiquitous computing. Internet of things (IoT) is getting matured in various parts of the world. In coming few years' billions and trillions of things will be connected to the internet. To deal with these huge number of devices in a network we need to consider Quality of Service (QoS)parameters so that system operations can be performed in a smoother way. Mathematical modelling of these QoS parameters gives an idea about which factors are needs to consider while designing any IoT-enabled system at the same time it will give the performance analysis of the system before implementation. In this paper comprehensive literature survey is done to discuss various issues related to QoS and gap analysis is also done for IoT Enabled systems. This paper proposes general steps to build a mathematical model for a system. It also proposes the mathematical model for QoS parameters like reliability, communication complexities, latency and aggregation of data for IoT. To support proposed mathematical model proof of concept also given.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mahamure, Sandesh, et al. "Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT)." IJRSDA vol.4, no.3 2017: pp.96-107. http://doi.org/10.4018/IJRSDA.2017070107
APA
Mahamure, S., Railkar, P. N., & Mahalle, P. N. (2017). Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT). International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 96-107. http://doi.org/10.4018/IJRSDA.2017070107
Chicago
Mahamure, Sandesh, Poonam N. Railkar, and Parikshit N. Mahalle. "Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT)," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 96-107. http://doi.org/10.4018/IJRSDA.2017070107
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJRSDA.2017070108
Volume 4
Shilpa G. Kolte, Jagdish W. Bakal
This paper proposes a big data (i.e., documents, texts) summarization method using proposed clustering and semantic features. This paper proposes a novel clustering algorithm which is used for big...
Show More
This paper proposes a big data (i.e., documents, texts) summarization method using proposed clustering and semantic features. This paper proposes a novel clustering algorithm which is used for big data summarization. The proposed system works in four phases and provides a modular implementation of multiple documents summarization. The experimental results using Iris dataset show that the proposed clustering algorithm performs better than K-means and K-medodis algorithm. The performance of big data (i.e., documents, texts) summarization is evaluated using Australian legal cases from the Federal Court of Australia (FCA) database. The experimental results demonstrate that the proposed method can summarize big data document superior as compared with existing systems.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kolte, Shilpa G., and Jagdish W. Bakal. "Big Data Summarization Using Novel Clustering Algorithm and Semantic Feature Approach." IJRSDA vol.4, no.3 2017: pp.108-117. http://doi.org/10.4018/IJRSDA.2017070108
APA
Kolte, S. G. & Bakal, J. W. (2017). Big Data Summarization Using Novel Clustering Algorithm and Semantic Feature Approach. International Journal of Rough Sets and Data Analysis (IJRSDA), 4(3), 108-117. http://doi.org/10.4018/IJRSDA.2017070108
Chicago
Kolte, Shilpa G., and Jagdish W. Bakal. "Big Data Summarization Using Novel Clustering Algorithm and Semantic Feature Approach," International Journal of Rough Sets and Data Analysis (IJRSDA) 4, no.3: 108-117. http://doi.org/10.4018/IJRSDA.2017070108
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJRSDA should be directed to the attention of:
Submission-Related InquiriesParikshit Mahalle
Editor-in-Chief
International Journal of Rough Sets and Data Analysis (IJRSDA)
aalborg.pnm@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100