{"title":"Analyses of web usage mining techniques to enhance the capabilities of E-learning environment","authors":"A. Yadav, S. Jain","doi":"10.1109/ETNCC.2011.6255890","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255890","url":null,"abstract":"World Wide Web is today the most important media for collecting, sharing and distributing information. Education is one of the fields where web-based technology has been quickly and successfully adopted. Web mining is active research area which involves transformation and interpretation of web data to find out the hidden information by using various data mining techniques which will be useful in enhancing E learning environment. Web usage mining for e learning environment can mine the server logs to find the user usage pattern so that users can be provided with more personalized services. WUM is one of the latest techniques in web data mining which can provide an effective platform to the learner. We focus on identifying learning pattern of learners. This paper introduces how by using WUM techniques we can make e learning environment more effective. Based on WUM technique how we can design an effective e learning environment and implementation of the model builds more intelligent system and can promote interest of learners or learning environment is modifying its behavior to reflect learning style.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"128 bit AES implementation for secured wireless communication","authors":"Gohil Rikitaben Karsanbhai, M. Shajan","doi":"10.1109/ETNCC.2011.6255889","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255889","url":null,"abstract":"Data Security is primary concern for every communication system. There are many ways to provide security data that is being communicated. However, security is assured irrespective of the hackers are from the noise. This Paper describes a design of effective security for data communication by implementing AES (Advanced Encryption Standard) algorithm for encryption and decryption.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient routing protocols for mobile AdHoc networks","authors":"Rupali A. Mahajan, Ms. Rupali Jagatap","doi":"10.1109/ETNCC.2011.5958502","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958502","url":null,"abstract":"Adhoc on demand distance vector routing protocol is specially designed for mobile adhoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, we propose an energy efficient route discovery process for AODV based on ERS. Our approach saves energy of the nodes by avoiding the redundant rebroadcasting of the route request packets. The relaying status of the node is decided based on the broadcasting of its RREQ packets by its neighbors. And it helps in reducing routing overhead incurred during the route discovery process. Simulations are performed to study the performance of Energy Efficient AODV (E2AODV) protocol using GloMoSim, the Global Mobile Simulator. This E2AODV reduces energy consumption by 75–85% compared to AODV. It also reduces routing overhead of around 65–75% and there by reduces 60–70% collisions.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analytical model for reverse link outage probability in OFDMA wireless system","authors":"R. B. Jain","doi":"10.1109/ETNCC.2011.5958509","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958509","url":null,"abstract":"In a cellular OFDMA network, the outage probability is an important performance measure. It is useful in the design of a network to guarantee a certain quality of service (QOS) such as threshold Signal to interference ratio or data rate or bit error rate. In this work, a model is presented to determine the inter-cell interference (ICI) in downlink for a universal frequency reuse cellular OFDMA network. It is used to find the outage probability of a user for a given threshold SIR or Data rate or a target BER. From this the number of subcarriers can be determined for a given position and data rate requirement. Simulation results demonstrate the correctness of numerical evaluations.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of mobility model and routing protocols for inter vehicular communication system","authors":"R. Shukla, N. Tyagi","doi":"10.1109/ETNCC.2011.6255900","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255900","url":null,"abstract":"Vehicular Ad hoc networks (VANETs) allow vehicles to form a self-organized network without the need for a permanent infrastructure. Successful implementations of VANET require standard network protocols, secure communication, and coverage of wireless network among vehicles as well as drivers themselves. This paper presents a simulation study of Realistic Vehicular Mobility Model on the performance study of VANET that uses topology based Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) as the routing protocol. It gives an overview of the developments of the mobility model and routing protocols for VANET.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128023787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of RED with different TCP congestion control mechanism","authors":"E. Kumar, S. Chugh, S. P. Ghrera","doi":"10.1109/ETNCC.2011.6255933","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255933","url":null,"abstract":"In this paper we describe RED-Random Early Detection which is an active queue management algorithm for congestion control. The basic idea of RED is that one should not wait till the buffer is full in order to detect drop packets but start detecting congestion before the buffer overflows. In this paper we present the performance behavior of RED which it posses under different congestion control schemes such as Reno, Vegas, Sack 1, and Fact. It shows that with different TCP congestion control mechanism that RED posses for the queue and the average queue plotation during the transmission on data on the network. Simulations are carried on ns simulator to study the performance RED with TCP mechanism.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of state improvisation through evaluation function optimization in genetic application learning","authors":"D. Singh, Chirag S. Thaker, Sanjay M. Shah","doi":"10.1109/ETNCC.2011.5958494","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958494","url":null,"abstract":"Artificial intelligence algorithms have been applied on computer board games since 1950s. Board Games provide competitive, cognitive learning and dynamic environments that make them ideal area of computational intelligence theories, architectures, and algorithms. Natural Evolution can also be considered to be a game play in which the rewards for a test organism that plays a good game of life are the propagation of its genetic material to its successors and its continued survival. In natural evolution, the fitness of an individual is defined with respect to its competitors and collaborators, as well as to the environment. Evolutionary algorithms follow the same path to evolve game playing programs. Among all computer board games, because of its low branching property, Reversi (Game of Othello) playing program can easily defeat humans by designing with strategies based game moves. Here on, the goal of computer Reversi game is no longer to challenge or defeat human players but to compete and evolve against other computer programs. This paper mainly highlights optimization of Reversi program fitness values by applying genetic operators through linear evaluation function.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equalization in faded wireless channels using ANN and coding","authors":"B. B. Baruah, K. K. Sarma","doi":"10.1109/ETNCC.2011.6255924","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255924","url":null,"abstract":"Artificial Neural Network (ANN) based equalization and channel coding has been performed jointly to minimize Inter Symbol Interference (ISI) and noise over multipath faded channel. Further ANN equalization has been compared with a non-ANN MMSE equalizer to compare its performance and along with them (7, 4) Hamming coding is used for more minimization of the noise disturbances so as to achieve a superior BER values for the system. The designed ANN-based equalizer is tested over fading channel with a BPSK signal.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"124 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}