{"title":"Multi Objective Time Table Scheduling Using Genetic Algorithm","authors":"G. George","doi":"10.30534/IJNS/2019/23832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/23832019","url":null,"abstract":"Scheduling the class periods using traditional methods like using online spreadsheets is complex and time consuming. The complexity increases with multiple subject, student and teachers as the requirements become more complex. It is difficult to manage subjects with multiple teachers or forming student groups and assigning teachers. In addition, priority of subjects or teachers, class hours are not considered for scheduling. Class scheduling using genetic algorithm, has been developed to schedule class rooms considering various resources and parameters. The proposed algorithm accepts various parameters like priority values for teachers and subjects or class hours and give the best solution. Our new system makes the classroom scheduling easier and also reduce the time required for scheduling.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84837365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAGIC MOB – AN AUTONOMOUS TABLE CLEANING ROBOT","authors":"S. Aishwarya","doi":"10.30534/IJNS/2019/08832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/08832019","url":null,"abstract":"The autonomous table cleaning robot cleans a table after every dine-in. It is designed in a more efficient, secured and cost effective way using Internet of Things (IOT) technology and controlled using a mobile application developed using android studio with Google firebase with a secured, authenticated and cloud stored API’s. This autonomous table cleaning robot doesn’t disturb the people who are having food. This robot not only automates cleaning but also reduces man power and monthly wages to pay for employees. It also provides latest technology support with secured application interface to the user.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86431065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Public Water Complaint Management System","authors":"A. Suresh","doi":"10.30534/IJNS/2019/13832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/13832019","url":null,"abstract":"India has an extensive network of pipelines and associated components forming the water distribution system. The condition of these pipelines is poor in terms of maintenance. Pipeline failure in water distribution systems disrupts the water supply to consumers and reduces the reliability of the system. It is found that a majority of the supplied volume is wasted due to pipe leakages. Thus, proper maintenance, inspection and control activities are required. Complaints regarding pipeline damages do not reach the water authority officers or may reach them but the actions may or may not be taken. By this app people can register their complaints and it will be submitted to the water authority. Then the authority can update their status through this app. People can get complaint resolved message when the authority have taken care of the issue. Users can attach the water control flow system to their water system and monitor the water usage. This device can calculate the water flow rate and store the data on a server, which they can later use for generating waterbills.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73147086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Life Saver Using Raspberry Pi","authors":"Akshaya V Madhu","doi":"10.30534/IJNS/2019/17832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/17832019","url":null,"abstract":"Life saver using raspberry pi system is proposed to bring back the critical patients to life. It makes a good communication link between donor and recipient in the same platform. Those who are ready to provide blood, eye and kidney should register in this application and this information can be kept in the database. Any emergency situation, the patients can access through this application and the request can fulfill by using the raspberry pi and IoT.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83610665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Neural Network in Assembler","authors":"B. Jacob","doi":"10.30534/IJNS/2019/12832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/12832019","url":null,"abstract":"Assemblers are used to convert assembly language programs into corresponding machine code and therefore machine dependent system software. It is the great diversity in existing microprocessor architectures that prohibits the universal use of any simple software products. This paper introduces Neural Network in assemblers so that the assembly language of a computer can be extended which helps to process a language that is completely different from native assembly language.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87105467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Detection of Wormhole Attack in AODV Protocol based MANET","authors":"Telma George","doi":"10.30534/IJNS/2019/07832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/07832019","url":null,"abstract":"A Mobile Ad-hoc Network (MANET) is a self-configuring, infrastructure-less network of mobile devices connected wirelessly. MANET is used commonly around the world, because it has the ability to communicate with each other without any fixed network. Routing protocols are requires for communication and synchronization in such ad hoc networks. Security is most important service of all kinds of network communications. MANET are more vulnerable to security attacks due to its features like open medium, changing its topology dynamically, lack of central monitoring and management. Security attacks in MANET are classified into passive attacks and active attacks. Among some of the prominent security threats worm-hole attack is considered as one of the most severe security attack because it is difficult to detect. A wormhole attack can be easily launched by the attacker without having knowledge of the network or compromising any legitimate nodes or cryptographic mechanisms. Hence an efficient mechanism to detect wormhole attack has to be developed.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81915513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Waste Management Using Deep Learning with IoT","authors":"Jobin Joseph","doi":"10.30534/IJNS/2019/10832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/10832019","url":null,"abstract":"The emerging rise in the population and urbanisation alarms the nation for its environment safety. The incorrect handling and waste disposal will cause immense threat to these growing cities. Therefore, it has raised the need for proper waste collection and classification of wastes with proper disposal. The current waste disposal system in India consists of unclassified and unorganized wastes collected and then segregated at different stations[7]. This segregation done by manual labour forces can bring health related issues to the waste sorters and also being less efficient, time consuming and not completely feasible due to their large amount. This paper proposes a solution that can identify and classify the waste and organize it into the particular waste bin (recyclable, organic and harmful wastes) without any human hand. The system uses deep learning algorithms to identify and classify the wastes into particular category; the categorized recycled and organic wastes can be used for future better purposes. This process will help the environment in making more valuable and ecologically safe and help us to make rich green ecosystem and a promising better future.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86487731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IP Speaker with SIP and Smart Notification System","authors":"D. Xavi","doi":"10.30534/IJNS/2019/09832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/09832019","url":null,"abstract":"An IP Speaker implies the ability to drive audio to an active loudspeaker device from a network connection, usually over the Internet. In many cases this type of speaker also contains Digital Signal Processing (DSP) to provide the audio crossover and other signal processing to provide frequency division and other tonal functions that exist in conventional speakers. The IP Speaker connects to Unicast or Multicast addresses to enable the delivery of streamed data from a source on the network, to arrive at a single speaker or many speakers respectively. Electronic Notice Board is a modern device that is used to display the information on digital devices. In these types of notice boards we can leave and erase the information for the people to read and view. The wireless technology has been making enormous advance over recent years. The use of wireless is increasing not only in industrial applications but also for domestic applications in day by day life. Now a day’s, the notice boards which are using almost wireless electronic notice boards because they saves time and manpower. And we can write and delete the information to the people in time using the wireless technology through computers, GSM, mobile etc. Xampp an open-source cross platform web server platform is used.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84750509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surface Tracker: A prototypic model based on IoT and Cloud for Mars Expedition","authors":"Jithu Biju","doi":"10.30534/IJNS/2019/14832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/14832019","url":null,"abstract":"Nowadays, Mars expeditions are gaining more significance as the world scientists are searching if the red planet can handle life as the blue planet doing. This paper presents a prototypic model that can be used in Mars expeditions. The prototypic model surface tracker is a hardware device equipped with sensors for sensing temperature, humidity, and moisture content of the surface to which it is deployed. For temperature and humidity, sensing the DHT22 sensor is used and FC-28 for moisture sensing. The sensed values are uploaded to IoT platform ThingSpeak and to the Blynk android app, the values are accessed on the screens of mobile or laptop. Based on the results, the analysis is done and if the analysis result is positive, the device will deploy the seeds which it carried, to that surface. The model is a prototype of the idea that can be implemented effectively in Mars expedition by making slight changes in prototype based on the communication technologies used in mars surface as the technologies supporting communication in earth and mars are entirelydifferent.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79801476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uncovering Social Spammers -Evaluation And Detection","authors":"Geethu Thrippathy","doi":"10.30534/IJNS/2019/24832019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/24832019","url":null,"abstract":"For cyber criminals compromising social network accounts has turned into a beneficial strategy. Across the globe well known sites have millions of users and they suffer from a lot of security privacy and threats like profile cloning viral marketing rupture of security etc. By hijacking the control of a particular account, attackers or hackers can disperse their malicious information to an extensive client. It may affect the reputation of different organizations and leads to losses in financial markets. In this work, we show how we can utilize similar procedures to distinguish compromises of individual high profile accounts and they have one trademark that make this detection reliable. Behavioural analysis of each account has taken in order to get the normal behaviour of an account.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80630995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}