{"title":"An Efficient Server Minimization Algorithm for Internet Distributed Systems","authors":"Swati Mishra, S. K. Panda","doi":"10.4018/IJRSDA.2017100102","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017100102","url":null,"abstract":"The increasing use of online services leads to an unequal distribution of the loads among the servers. As a result, the problem is to balance the loads among the servers such that the total number of active servers is minimized. One of the possible solutions is to transfer the loads from the underutilized server to a suitable server and make the underutilized server to sleep mode. In this paper, a server minimization algorithm (SMA) is proposed for the solution of server minimization and the load balancing problem. The proposed algorithm reduces the number of servers by merging the loads of the two least loaded servers. Then it determines the standard deviation of the server loads for load balancing. The proposed SMA is compared with an existing load balancing algorithm using the number of minimized servers, load standard deviation and load factor. The simulation results show the efficacy of the SMA.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimal Routing Algorithm for Internet of Things Enabling Technologies","authors":"Amol V. Dhumane, R. Prasad, J. Prasad","doi":"10.4018/IJRSDA.2017070101","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070101","url":null,"abstract":"In Internet of things and its relevant technologies the routing of data plays one of the major roles. In this paper, a routing algorithm is presented for the networks consisting of smart objects, so that the Internet of Things and its enabling technologies can provide high reliability while the transmitting the data. The proposed technique executes in two stages. In first stage, the sensor nodes are clustered and an optimal cluster head is selected by using k-means clustering algorithm. The clustering is performed based on energy of sensor nodes. Then the energy cost of the cluster head and the trust level of the sensor nodes are determined. At second stage, an optimal path will be selected by using the Genetic Algorithm (GA). The genetic algorithm is based on the energy cost at cluster head, trust level at sensor nodes and path length. The resultant optimal path provides high reliability, better speed and more lifetimes.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous WSNs","authors":"N. Kulkarni, N. Prasad, R. Prasad","doi":"10.4018/IJRSDA.2017070102","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070102","url":null,"abstract":"Researchers have faced numerous challenges while designing WSNs and protocols in numerous applications. Amongst all sustaining connectivity and capitalizing on the network lifetime is a serious deliberation. To tackle these two problems, the authors have considered Mobile Wireless Sensor Networks (MWSNs). In this paper, the authors put forward an Evolutionary Mobility aware multi-objective hybrid Routing Protocol for heterogeneous wireless sensor networks (EMRP). EMRP selects the optimal path from source node to sink by means of various metrics such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The Performance of EMRP when equated with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing Algorithm (DyMORA) using parameters such as Average Residual Energy (ARE), Delay and Normalized Routing Load. EMRP improves AES by a factor of 4.93% as related to SHRP and 5.15% as related to DyMORA. EMRP has a 6% lesser delay as compared with DyMORA.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121987235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Setup for Co-measurement of Water Level and Temperature","authors":"Sujaya Das Gupta, M. Zambare, A. Shaligram","doi":"10.4018/IJRSDA.2017070103","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070103","url":null,"abstract":"Recent time has witnessed severe scarcity of water owing to deficient rainfall in India. The current climatic conditions in the country, project the rise in temperature and arid conditions contributing substantially towards the evaporation losses. In order to deal with the looming crisis, it is peremptory to minimize evaporation losses in the water bodies, at least measure them to get a fair idea and initiate corrective measures. This paper aims to develop a system for continuous monitoring of the water level as an indicator to the evaporation process. The system also indicates temperature of the water which influences the evaporation rate.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Summarization Using Novel Clustering Algorithm and Semantic Feature Approach","authors":"Shilpa G. Kolte, J. Bakal","doi":"10.4018/IJRSDA.2017070108","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070108","url":null,"abstract":"This paper proposes a big data i.e., documents, texts summarization method using proposed clustering and semantic features. This paper proposes a novel clustering algorithm which is used for big data summarization. The proposed system works in four phases and provides a modular implementation of multiple documents summarization. The experimental results using Iris dataset show that the proposed clustering algorithm performs better than K-means and K-medodis algorithm. The performance of big data i.e., documents, texts summarization is evaluated using Australian legal cases from the Federal Court of Australia FCA database. The experimental results demonstrate that the proposed method can summarize big data document superior as compared with existing systems.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Supervised Convolutional Neural Network and Its Major Applications","authors":"D. Mane, U. Kulkarni","doi":"10.4018/IJRSDA.2017070105","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070105","url":null,"abstract":"With the advances in the computer science field, various new data science techniques have been emerged. Convolutional Neural Network (CNN) is one of the Deep Learning techniques which have captured lots of attention as far as real world applications are considered. It is nothing but the multilayer architecture with hidden computational power which detects features itself. It doesn't require any handcrafted features. The remarkable increase in the computational power of Convolutional Neural Network is due to the use of Graphics processor units, parallel computing, also the availability of large amount of data in various variety forms. This paper gives the broad view of various supervised Convolutional Neural Network applications with its salient features in the fields, mainly Computer vision for Pattern and Object Detection, Natural Language Processing, Speech Recognition, Medical image analysis.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT)","authors":"Sandesh Mahamure, P. Railkar, P. Mahalle","doi":"10.4018/IJRSDA.2017070107","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070107","url":null,"abstract":"Now we are in the era of ubiquitous computing. Internet of things (IoT) is getting matured in various parts of the world. In coming few years' billions and trillions of things will be connected to the internet. To deal with these huge number of devices in a network we need to consider Quality of Service (QoS)parameters so that system operations can be performed in a smoother way. Mathematical modelling of these QoS parameters gives an idea about which factors are needs to consider while designing any IoT-enabled system at the same time it will give the performance analysis of the system before implementation. In this paper comprehensive literature survey is done to discuss various issues related to QoS and gap analysis is also done for IoT Enabled systems. This paper proposes general steps to build a mathematical model for a system. It also proposes the mathematical model for QoS parameters like reliability, communication complexities, latency and aggregation of data for IoT. To support proposed mathematical model proof of concept also given.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127051206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Secure Data Transfer Using Video Steganographic Technique","authors":"V. L. Reddy","doi":"10.4018/IJRSDA.2017070104","DOIUrl":"https://doi.org/10.4018/IJRSDA.2017070104","url":null,"abstract":"Information security using data hiding in video provides high embedding capacity and security. Steganography is one of the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information file within a video. Present day communications are treated to be “un-trusted” in terms of security, i.e. they are relatively easy to be hacked. The proposed technique is invented to hide secret information into a video file keeping two considerations in mind which are size and security of the cover video file. At the sender side, the secret information which is to be hidden is encoded into cover video file. Double layered security for the secret data can be achieved by encrypting confidential information and by embedding confidential information into cover video file frames using encrypted embedding technique.","PeriodicalId":152357,"journal":{"name":"Int. J. Rough Sets Data Anal.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127895201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}