0% found this document useful (0 votes)
140 views8 pages

Call Admission Control for Smart Cities

The development of smart city communities prompts basic moves identified with network security and communication models. Communication between gadgets is secured, and we are certain that the security and prosperity of clients, and society, by and large, is guaranteed. The Fifth Generation (5G) structures are depended upon to experience goliath traffic clog from cell phones.

Uploaded by

IJITJournals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views8 pages

Call Admission Control for Smart Cities

The development of smart city communities prompts basic moves identified with network security and communication models. Communication between gadgets is secured, and we are certain that the security and prosperity of clients, and society, by and large, is guaranteed. The Fifth Generation (5G) structures are depended upon to experience goliath traffic clog from cell phones.

Uploaded by

IJITJournals
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

RESEARCH ARTICLE OPEN ACCESS

Call Admission Control Decision Maker for Smart City


Applications
Dr.Yojna Arora
Assistant Professor
Department of CSE Amity University-Haryana

ABSTRACT
The development of smart city communities prompts basic moves identified with network security and
communication models. Communication between gadgets is secured, and we are certain that the security and
prosperity of clients, and society, by and large, is guaranteed. The Fifth Generation (5G) structures are depended
upon to experience goliath traffic clog from cell phones. The 5G cell frameworks need to adjust to such taking
off traffic demands from these gadgets to lessen network clog in keen city applications. In this Chapter
examined the cloud-based Transistor Access Network (TAN) assumes a significant job to expand the
information rate. In spite of the fact that this Call Admission Control (CAC) method improves the framework
effectiveness, the limit of call blocking likelihood because of the traffic blockage is the primary test.
Keywords: 5G Structure, TAN, CAC.

I. INTRODUCTION
The cost of the structure, working and is one of the most vital parts, which is liable for pre-
updating these TANs is getting progressively handling and accumulation of the tactile
expensive while salary isn't creating [1-15]. information. Reliability, handiness, and
Keeping up quality of service (QoS) for non- dependability of the information obtained by the
constant (NRT) and ongoing (RT) services while communication back-end rely upon the adequacy of
overhauling usage of the asset is an important test the sensing plane [47-50].
for cutting edge structures like 5G [16-24]. The 5G
cell systems will be contained a considerable The fundamental capacity of a CAC
number of contraptions like wearable devices, calculation is to accurately pick whether an
tablets, Internet of Things (IoT), iPhones, and association can be recognized into an asset
Androids related to the system with a lot of constrained system without harming the
employments. All these smart gadgets, that will administration obligations made to them starting at
contain the IoT, will have the ability to detect and now conceded affiliations [51-55]. In situations, for
assembling data from the physical world, send, get example, the ones existing in smart spaces and
and process any sort of active and approaching smart networks, where each gadget remotely speaks
information, both automatically and dependably with each other, it is of basic significance that the
[25-36]. Further, a smart city may contain various activity of the system, just as the transmission of
applications with fluctuating prerequisites of information is verified; that is, no element should be
network flexibility and security. For example, a [56-62] capable for increasing unapproved access to
smart power grid system will be unable to endure datasets or, all in all, compromise the system's
any break in utility networks as this may severely usefulness of smart City communication process
affect smart city tasks [37]. A significant factor in [63-65].
protecting against, an assault in such situations is
the right execution of hard and delicate limit II. REVIEW OF RECENT PAPERS
esteems for every sort of application [38].
. It gives a review of the ongoing advances by
TAN was presented by China Mobile in institutionalization bodies in considering the job of
2010 as a cost and essentialness gainful strategy for softwarization and virtualization in the beside come
passing on little cells and promising response to mobile systems of 5G networks. At last, we finish
satisfying as far as possible needs. Cloud TAN up the paper by proposing a lot of research
unions base Station to a central cloud called difficulties to be investigated [66].
baseband pool or BS cloud [39-45]. As opposed to
relying upon the expulsion of new sessions due to The open great attributes of information and
the obliged assets of base station, TAN exploits the communication technologies (ICTs) and
dispersed processing flexibility, which permits hypothetically dissect a total economy of two smart
dynamic provisioning of assets of cloud base station cities areas in which ICTs are given in either a
[46]. In smart city design, communication back-end decentralize [67]. The optimal level of ICT
arrangements in different cities communities a

ISSN: 2454-5414 www.ijitjournal.org Page 70


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

concentrated system subject to approach the deep learning system executed as a decent chief, the
arrangement of ICTs and cost-sharing. Fourth, parameters of this fuzzy system are to be enhanced
demonstrate that on the off chance that the two why standard base of this fuzzy system is to be
urban areas have a similar inclination for ICTs, at balanced for each time by changing the information
that point centralization is desirable over and yield parameters of fuzzy participation work.
decentralization insofar as there is an overflow from Our proposed TAN model relevant many smart city
the arrangement of ICTs. At last, demonstrate that applications that are Healthcare, Environmental,
in the event that the two cities have unique Transportation, smart network and smart houses and
inclinations for ICTs, at that point centralization is instructions. The architecture of a smart space can't
desirable over decentralization as long as the generally be characterized as a rule, since it relies
overflow surpasses a specific threshold. upon the real condition and the motivation behind
its setup. To improve the security of smart
The emergence of the fifth-generation wireless application, outcomes of such assaults and give
standard for media communications (5G) will estimates that can, and need, to be taken all together
empower the Internet of Things (IoT), a gigantic for smart spaces and smart spaces to remain
network of interconnected gadgets that can be used shielded from malicious assaults and unapproved
in pretty much every part of our day by day lives, access.
either that is in healthcare, transportation,
environmental monitoring, etc by Hadjioannou, V., 3.1 Development Model
Mavromoustakis, C. X., in 2019 [68]. The system
and correspondence between gadgets are verified, Our proposed TAN model in the 5G network in
and we are certain that the privacy and prosperity of smart city models incorporates various classes like
clients, and society, as a rule, is guaranteed. remote radio head, clod controller, baseband unit
(BU), and virtual unit. For the communication
The cross-domain approach requires significant model, BU can communicate with one another with
level displaying so as to conquer similarity issues, X2 interface. The cloud controller is utilized to
which diminishes the accuracy of domain explicit control every single General processor (GPs) in the
simulation and optimization contrasted with BU pool.
techniques that apply definite models by [69-71].
The fundamental benefits are the exploitation of 3.2 Call Admission Control (CAC)
cross-domain associations and collaborations and,
along these lines, the improved by and large CAC alludes a compelling method to stay away
execution of the system. Be that as it may, the from network traffic congestion in this way giving
cross-domain approach requires significant level an ensured quality of service. Utilizing cutting-edge
demonstrating so as to defeat similarity issues, strategies, for example, artificial intelligence in a
which diminishes the accuracy of space explicit 5G network gives greater capacity to deal with
recreation and optimization contrasted with traffic. Non-access control, classes incorporate
techniques that apply point by point models. A few deferral delicate administrations, for example, video
optimization definitions and strategies are applied to calls, live streaming, and TCP based administrations
the test situation to exhibit the idea, look at the shared networks. Truly, smart cities may contain
outcomes and assess the computational presentation different applications with various prerequisites of
of the application. network accessibility and security. Barely any
applications that are basic in nature, stringent
III. CURRENT SYSTEM AND requirements of security and accessibility [18]. The
CAC gives a higher need for the handover brings in
DEVELOPMENT MODEL the overlaid macrocellular network by offering a
It might prompt increment in the call blocking rate QoS adjustment arrangement. The QoS adjustment
and usage of the asset. Along these lines, to arrangement is just accessible to acknowledge the
manifest this blockage, Call Admission Control handover calls in macrocellular network.
(CAC) strategy assumes a significant job in 5G
3.3 Optimal Fuzzy Model-based CAC
Transistor Access Network (TAN). To decrease the
traffic clog further in 5G TAN the accompanying The optimal fuzzy model settles on the choice by
arrangements must be done in this research work. playing out the four levels, for example,
Organizing these diverse help types is the Fuzzification, generation of the fuzzy guideline
underlying advance to decrease clog in Smart City base, fuzzy surmising system, and defuzzification
applications. This Smart city communication [20]. In this model, service type, accessible limit,
process three different, administration types are and effective limit are given as a contribution to
viewed as like, Prime Real-Time (Type 1), Prime settle on the choice. Rely upon these info factors;
Non-Real-Time (Type 2) and Real-Time (Type 3). input fresh estimations of the fuzzy logic model are
In numerous IoT procedures, machine learning and prepared, its shows in figure 2.

ISSN: 2454-5414 www.ijitjournal.org Page 71


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

(i) Fuzzification factors of the TAN model are characterized as Low,


Medium and High in the range [0, 1Mbps]. Fuzzy
Info crisp qualities are changed over into fuzzy variables of the yield Admittance are Outsource,
factors. At that point, for every fuzzy variable, Accept, and Reject and furthermore the accessibility
enrollment capacity is resolved. In addition, fuzzy referenced as far as Sufficient or non-Sufficient.
Table 1: Communication process Sample Fuzzy sets

saRule No Service Type Efficiency Availability Admittance Output Level


R1 Type 1 Low Sufficient Reject
R2 Type 2 Medium Sufficient Reject
R3 Type 3 Low Non-Sufficient Accept
R4 Type 1 High Non-Sufficient Outsource
R5 Type 2 Medium E Accept
R6 Type 2 High Sufficient Outsource
R7 Type 1 High Sufficient Outsource
R8 Type 3 Medium Non-Sufficient Reject
R9 Type 2 Low Sufficient Accept
R10 Type 3 Low Non-Sufficient Reject

Despite the fact that NRT administrations are just every time by changing the info and yield
sent to the open cloud, certain PRT and n-RT clients parameters of MFs. In this way, it is basic to decide
are also sent to the open cloud if the private cloud is an optimal combination of these parameters.
blocked. Test fuzzification guidelines are depicted
in table 1. For getting the ideal outcomes, and IV. RESULTS ANALYSIS
triangular enrollment capacities are used in this
model. Our proposed GG network system, smart city
correspondence model implemented in MATLAB
(iii) Defuzzification 2018a with a system having i3 processor and 8GB
RAM. Simulation parameters of execution
In the defuzzification process, the factors are procedure appear in table 1, The attributes of the
changing over the fuzzy set qualities into fresh CAC system discussed by different parameters like
qualities. The proposed defuzzification methods are network traffic, Mean, Standard Deviation, control
Bisector of Area Method (BOA). Every time, the traffic rate, asset usage, blocking Probability and
standard base of this FIS system is to be balanced throughput parameters for proposed optimal Fuzzy
and some ordinary technique's.

Table 2: Parameters Evaluated by Proposed Model for Smart city communication

Network
Packet Service Delay Resource Throughput
Rate(kbps) Traffic rate SD Mean
Size Type (ms) Utilization (Mbps)
(Mbps)

100 Type 1 100 64 55.56 0.95 3.38 0.02 1052

200 Type 1 200 248 60.85 1.05 4.45 0.09 1100

400 Type 3 150 120 85.55 1.66 4.92 0.09 1150

500 Type 2 300 550 90.85 2.22 5.66 0.08 1350

700 Type 1 350 512 60 1.88 5.88 0.1 1470

900 Type 3 175 300 69.78 1.74 4.14 0.12 1560

1000 Type 2 400 156 85.61 1.65 5.25 0.11 1700

ISSN: 2454-5414 www.ijitjournal.org Page 72


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

Proposed CA-TAN model outcomes appear in table size elements. It should be seen that the solicitation
2, the cost of enduring an association demand for in size, range, and QoS can outline the reason of how a
the open cloud is believed to be 25% of what the lot of the solicitation can be charged at this point
private cloud TAN operator will make when dealing this will be viewed as later on, yet in this paper,
with the solicitation. On the off chance that the simply 15% is diminished by the open cloud.
bundle size fluctuating the administration Control traffic Rate of different methods appears in
effectively to recognized by which type chose for figure 4, it's expanded bit by bit, however the heap
examination, from that lone ready to discover isn't conveyed to another fuzzy model If increment
network traffic rate and Standard Deviation (SD), control traffic at the controller prompting execution
mean values. In general perception, the SD as 1.6 in corruption or complete denial of service.
400 parcels size with 1150Mbps, likeness all bundle

Figure 1: Comparative between Time and Control Traffic Rate

At that point Figure, 1 described Resource framework builds, execution might be influenced.
Utilization of Multi technique resembles Fuzzy with The circulated processing model can be used for
Genetic Algorithm (GA), Conventional Fuzzy enormous systems to guarantee the predictable
Model and our proposed procedure. The figure execution of the optimal Fuzzy structure. The main
shows that as the traffic load, asset usage in the reason for optimization in fuzzy methodology has
cloud in like manner increases since more demands been improved than that of the traditional fuzzy
are being taken care of and include the accessible framework. Additionally, the quantity of re-
limit. In view of the attributes of various service appropriated brings in the open cloud infrastructure
types (Type 1, Type 2 and Type 3) the proposed is decreased because of the decrease in asset use in
Fuzzy-CFO based CAC plan offers the need to the private cloud infrastructure.
every client for sharing assets from the baseband
unit cloud pool. Additionally, as, because of the REFERENCE
seizure, the stacked requests will be re-appropriated
from private cloud to open cloud with a specific [1] Chakchai So-In, Tri Gia Nguyen, Gia Nhu
cost in this methodology. In light of these causes, Nguyen: Barrier Coverage Deployment Algorithms
asset usage of the proposed plan is decreased to for Mobile Sensor Networks. Journal of Internet
26% than that of the current plan. Technology 12/2017; 18(7):1689-1699.

V. CONCLUSION [2] Suresh, G., Epsiba, P., & Kumaratharan,


N. (2016). Content based Image Retrieval Based on
To be sure security and privacy are the most Curvelet and PCA using HTF. Asian Journal of
extreme significant structure parameter for every Research in Social Sciences and Humanities, 6(8),
individual segment of a smart city framework. From 2165-2176.
this part, the smart city communication model the
traffic burden is significant alongside the asset use, [3] Shankar, K., Zhang, Y., Liu, Y., Wu, L., &
throughput factor. In any case, as the number of Chen, C. H. (2020). Hyperparameter tuning deep
quires associated with a cloud-based TAN

ISSN: 2454-5414 www.ijitjournal.org Page 73


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

learning for diabetic retinopathy fundus image [14] Epsiba, P., Suresh, G., & Kumaratharan,
classification. IEEE Access, 8, 118164-118173. N. (2020). Edge Detection-Based Depth Analysis
Using TD-WHOG Scheme. In Intelligent
[4] Kumar, M. R., Lenine, D., & Babu, C. S. Computing in Engineering (pp. 397-407). Springer,
(2011). A variable switching frequency with boost Singapore.
power factor correction converter. Telkomnika,
9(1), 47. [15] Anand Nayyar, Vikram Puri, Nhu Gia
Nguyen, BioSenHealth 1.0: A Novel Internet of
[5] Lenine, D., Babu, C. S., & Shankaraiah, G. Medical Things (IoMT) Based Patient Health
(2012). Performance Evaluation of Fuzzy and PI Monitoring System, Lecture Notes in Networks and
Controller for Boost Converter with Active PFC. Systems. Springer, 2019
International Journal of Power Electronics and
Drive Systems, 2(4), 445. [16] Kumari, J. Surya, Ch Sai Babu, and Mr D.
Lenine. "An Enhancement of Static Performance of
[6] Kathiresan, S., Sait, A. R. W., Gupta, D., Multilevel Inverter for Single Phase Grid Connected
Lakshmanaprabu, S. K., Khanna, A., & Pandey, H. Photovoltaic modules." International journal of
M. (2020). Automated detection and classification Recent Trends in Engineering, Academy Publishers,
of fundus diabetic retinopathy images using Finland 3.3 (2010): 20-24.
synergic deep learning model. Pattern Recognition
Letters. [17] Ezhilarasu, P., Krishnaraj, N., & Babu, S.
V. (2015). Applications of finite automata in text
[7] Ezhilarasu, P., & Krishnaraj, N. (2015). search-a review. International Journal of Science,
Triple Substring Based Classification for Engineering and Computer Technology, 5(5), 116.
Nondeterministic Finite Automata. IJAER, 10(59),
177-82. [18] Suresh, G., Epsiba, P., Sivanandam, S. N.,
& Rajaram, M. (2011). Block Based Motion
[8] Epsiba, P., Kumaratharan, N., & Suresh, Estimation using FWS-LMedS Algorithm for Video
G. (2020). A novel discrete CURVELET transform Compression. European Journal of Scientific
and modified WHOG for video surveillance Research, 49(4), 533-541.
services. Concurrency and Computation: Practice
and Experience, 32(4), e5046. [19] Shankar, K., Lakshmanaprabu, S. K.,
Gupta, D., Khanna, A., & de Albuquerque, V. H. C.
[9] Shankar, K., & Elhoseny, M. (2019). Trust (2020). Adaptive optimal multi key based
Based Cluster Head Election of Secure Message encryption for digital image security. Concurrency
Transmission in MANET Using Multi Secure and Computation: Practice and Experience, 32(4),
Protocol with TDES. J. UCS, 25(10), 1221-1239. e5122.
[10] Le, D.-N.a, Kumar, R.b, Nguyen, G.N., [20] Lenine, D., Babu, C. S., & Kumari, J. S.
Chatterjee, J.M.d, Cloud Computing and (2010, October). A static improvement of predictive
Virtualization, DOI: 10.1002/9781119488149, control for single phase voltage fed power factor
Wiley. correction converters. In 2010 International
Conference on Advances in Recent Technologies in
[11] Kumari, J. S., Babu, C. S., Lenine, D., & Communication and Computing (pp. 116-120).
Lakshman, J. (2009, December). Improvement of IEEE.
static performance of multilevel inverter for single-
phase grid connected photovoltaic modules. In 2009 [21] Shankar, K., Elhoseny, M., Kumar, R. S.,
Second International Conference on Emerging Lakshmanaprabu, S. K., & Yuan, X. (2020). Secret
Trends in Engineering & Technology (pp. 691-697). image sharing scheme with encrypted shadow
IEEE. images using optimal homomorphic encryption
technique. Journal of Ambient Intelligence and
[12] Senthil Kumar, B. V., Kumar, A., & Humanized Computing, 11(5), 1821-1833.
Suresh, G. (2016). Functional equations related to
spatial filtering in image enhancement. Int. J. [22] Reddy, J. N., Lenine, D., & Kumar, M. V.
Control Theory Appl, 9(28), 555-564. (2018). Experimental Study of Seven Level
Magnetic Coupled Impedance Source Inverter.
[13] Shankar, K., Lakshmanaprabu, S. K.,
Khanna, A., Tanwar, S., Rodrigues, J. J., & Roy, N. [23] Suresh, G. (2009). IMAGE AND VIDEO
R. (2019). Alzheimer detection using Group Grey CODING WITH A NEW WASH TREE
Wolf Optimization based features with ALGORITHM FOR MULTIMEDIA SERVICES 1.
convolutional classifier. Computers & Electrical
Engineering, 77, 230-243.

ISSN: 2454-5414 www.ijitjournal.org Page 74


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[24] Shankar, K., Elhoseny, M., Chelvi, E. D., [33] Shankar, K., Elhoseny, M.,
Lakshmanaprabu, S. K., & Wu, W. (2018). An Lakshmanaprabu, S. K., Ilayaraja, M., Vidhyavathi,
efficient optimal key based chaos function for R. M., Elsoud, M. A., & Alkhambashi, M. (2020).
medical image security. IEEE Access, 6, 77145- Optimal feature level fusion based ANFIS classifier
77154. for brain MRI image classification.
CONCURRENCY AND COMPUTATION-
[25] EPSIBA, P., SUBATHRA, S., SARDAR PRACTICE & EXPERIENCE, 32(1).
BASHA, N., SURESH, G., &
KUMARATHARAN, N. (2013). METADATA [34] Dey, N., Ashour, A.S., Chakraborty, S.,
BASED HIGH QUALITY IMAGE/VIDEO Le, D.-N., Nguyen, G.N, Healthy and unhealthy rat
STREAMING USING CURVELET hippocampus cells classification: A neural based
TRANSFORM. Journal of Theoretical & Applied automated system for Alzheimer disease
Information Technology, 57(2). classification, Journal of Advanced Microscopy
Research, 11(1), pp. 1-10
[26] Lopez-Martinez, F., Schwarcz, A., Núñez-
Valdez, E. R., & Garcia-Diaz, V. (2018). Machine [35] Rubini, L. Jerlin, and Eswaran Perumal.
learning classification analysis for a hypertensive "Hybrid Kernel Support Vector Machine Classifier
population as a function of several risk factors. and Grey Wolf Optimization Algorithm Based
Expert Systems with Applications, 110, 206-215. Intelligent Classification Algorithm for Chronic
Kidney Disease." Journal of Medical Imaging and
[27] Ezhilarasu, P., Prakash, J., Krishnaraj, N., Health Informatics 10.10 (2020): 2297-2307.
Satheesh Kumar, D., Sudhakar, K., &
Parthasarathy, C. (2014). A Novel Approach to [36] Sreenivas, M. B. S., Babu, C. S., & Lenine,
Classify Nondeterministic Finite Automata Based M. D. (2012). Design and Analysis of Predictive
on More than Two Loops and its Position. SSRG control using PI controller for Boost Converter with
International Journal of Computer Science and Active Power Factor Correction. International
Engineering (SSRG-IJCSE), 1(10), 46-49. Journal of Emerging Technology and Advanced
Engineering, 2(6).
[28] Suresh, G., Epsiba, P., Rajaram, D. M., &
Sivanandam, D. S. (2010). Scalable ACC-DCT [37] Krishnaraj, N., Ezhilarasu, P., Karthik, S.,
Based Video Compression Using Up/Down & Prabhakar, M. (2016). J,” Enhancing Security in
Sampling Method. International Journal of Mobile Devices through Multimodal biometrics”.
Computer and Network Security, 2(6). Middle-East Journal of Scientific Research, 23(8),
1598-1603.
[29] Lenine, D., Babu, C. S., & Kumari, J. S.
(2010, October). A static improvement of predictive [38] Shankar, K., Lakshmanaprabu, S. K.,
control for single phase voltage fed power factor Gupta, D., Maseleno, A., & De Albuquerque, V. H.
correction converters. In 2010 International C. (2020). Optimal feature-based multi-kernel SVM
Conference on Advances in Recent Technologies in approach for thyroid disease classification. The
Communication and Computing (pp. 116-120). Journal of Supercomputing, 76(2), 1128-1143.
IEEE.
[39] Suresh, G., Epsiba, P., Rajaram, M., &
[30] Van, V.N., Chi, L.M., Long, N.Q., Sivanandam, S. N. (2010). An improved low
Nguyen, G.N., Le, D.-N, A performance analysis of complex spatially scalable ACC-DCT based video
openstack open-source solution for IaaS cloud compression method. IJCSE) International Journal
computing, Advances in Intelligent Systems and on Computer Science and Engineering, 2(03).
Computing, 380, pp. 141-150.
[40] Lambert, J. R., Arulanthu, P., & Perumal,
[31] Suresh, G., Epsiba, P., Rajaram, M., & E. Identification of Nominal Attributes for
Sivanandam, S. N. (2010, July). A low complex Intelligent Classification of Chronic Kidney Disease
scalable spatial adjacency ACC-DCT based video using Optimization Algorithm.
compression method. In 2010 Second International
conference on Computing, Communication and [41] Bhateja, V., Gautam, A., Tiwari, A., Nhu,
Networking Technologies (pp. 1-6). IEEE. N.G., Le, D.-N, Haralick features-based
classification of mammograms using SVM,
[32] Nieto, Y., García-Díaz, V., Montenegro, Advances in Intelligent Systems and Computing,
C., & Crespo, R. G. (2019). Supporting academic Volume 672, 2018, Pages 787-795.
decision making at higher educational institutions
using machine learning-based algorithms. Soft [42] López-Martínez, F., Núñez-Valdez, E. R.,
Computing, 23(12), 4145-4153. Gomez, J. L., & García-Díaz, V. (2019). A neural

ISSN: 2454-5414 www.ijitjournal.org Page 75


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

network approach to predict early neonatal sepsis. [52] Núñez-Valdez, E. R., García-Díaz, V.,
Computers & Electrical Engineering, 76, 379-388. Lovelle, J. M. C., Achaerandio, Y. S., & González-
Crespo, R. (2017). A model-driven approach to
[43] Lenine, D., & Bau, S. (2009). Comparison generate and deploy videogames on multiple
between variable switching frequency and timer platforms. Journal of Ambient Intelligence and
controller with constant switching frequency Humanized Computing, 8(3), 435-447.
techniques for PFC converters. International Journal
of Computer and Electrical Engineering, 1(2), 183- [53] Huyen, D.T.T., Binh, N.T., Tuan, T.M.,
187. Nguyen, G.N, Dey, N., Son, L.H, Analyzing trends
in hospital-cost payments of patients using ARIMA
[44] Shankar, K., & Eswaran, P. (2017). RGB and GIS: Case study at the Hanoi Medical
based multiple share creation in visual cryptography University Hospital, Vietnam, Journal of Medical
with aid of elliptic curve cryptography. China Imaging and Health Informatics, 7(2), pp. 421-429.
Communications, 14(2), 118-130.
[54] Uthayakumar, J., Elhoseny, M., &
[45] Ezhilarasu, P., Thirunavukkarasu, E., Shankar, K. (2020). Highly Reliable and Low-
Karuppusami, G., & Krishnaraj, N. (2015). Single Complexity Image Compression Scheme Using
substring based classification for nondeterministic Neighborhood Correlation Sequence Algorithm in
finite automata. International Journal on WSN. IEEE Transactions on Reliability.
Applications in Information and Communication
Engineering, 1(10), 29-31. [55] Jiménez, A. C., García-Díaz, V., &
Bolaños, S. (2018). A decentralized framework for
[46] Rao, S. K., Lenine, D., & Sujatha, P. multi-agent robotic systems. Sensors, 18(2), 417.
(2020). Constant Current Analysis of Shell Type
Transformer at Different Temperatures of Core by [56] Elhoseny, M., & Shankar, K. (2019).
Using Quickfield Software. In Emerging Trends in Reliable data transmission model for mobile ad hoc
Electrical, Communications, and Information network using signcryption technique. IEEE
Technologies (pp. 175-184). Springer, Singapore. Transactions on Reliability.

[47] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu [57] Krishnaraj, N., Kumar, P., & Bhagavan, S.
Nguyen, Vikrant Bhateja, Suresh Chandra K. (2018). Conceptual Semantic Model for Web
Satapathy (2017), Optimizing Feature Selection in Document Clustering Using Term Frequency. EAI
Video-based Recognition using Max-Min Ant Endorsed Transactions on Energy Web, 5(20).
System for the Online Video Contextual
Advertisement User-Oriented System, Journal of [58] Jerlin Rubini, L., & Perumal, E. (2020).
Computational Science, Elsevier ISSN: 1877-7503. Efficient classification of chronic kidney disease by
Vol.21, pp.361-370. using multi‐kernel support vector machine and fruit
fly optimization algorithm. International Journal of
[48] Arulanthu, P., & Perumal, E. (2020). An Imaging Systems and Technology, 30(3), 660-673.
intelligent IoT with cloud centric medical decision
support system for chronic kidney disease [59] Elhoseny, M., Shankar, K., &
prediction. International Journal of Imaging Uthayakumar, J. (2019). Intelligent diagnostic
Systems and Technology. prediction and classification system for chronic
kidney disease. Scientific reports, 9(1), 1-14.
[49] Shankar, K., & Eswaran, P. (2016). RGB-
based secure share creation in visual cryptography [60] Elhoseny, M., Selim, M. M., & Shankar,
using optimal elliptic curve cryptography technique. K. (2020). Optimal Deep Learning based
Journal of Circuits, Systems and Computers, Convolution Neural Network for digital forensics
25(11), 1650138. Face Sketch Synthesis in internet of things (IoT).
International Journal of Machine Learning and
[50] Ezhilarasu, P., & Krishnaraj, N. (2015). Cybernetics, 1-12.
Double Substring based Classification for
Nondeterministic Finite Automata. Indian Journal [61] Krishnaraj, N., Kavitha, M. G., Jayasankar,
Of Science And Technology, 8, 26. T., & Kumar, K. V. A Glove Based Approach to
Recognize Indian Sign Languages.
[51] Velu, K., Arulanthu, P., & Perumal, E.
(2019, October). Energy Reduction Stratagem in [62] Montenegro-Marin, C. E., Cueva-Lovelle,
Smart Homes Using Association Rule Mining. In J. M., Sanjuán-Martínez, O., & García-Díaz, V.
International Conference on Innovative Data (2012). Domain specific language for the generation
Communication Technologies and Application (pp. of learning management systems modules. Journal
188-193). Springer, Cham. of Web Engineering, 11(1), 23.

ISSN: 2454-5414 www.ijitjournal.org Page 76


International Journal of Information Technology (IJIT) – Volume 6 Issue 5, Sep-Oct 2020

[63] Pustokhina, I. V., Pustokhin, D. A., Gupta, [72] Sankhwar, S., Gupta, D., Ramya, K. C.,
D., Khanna, A., Shankar, K., & Nguyen, G. N. Rani, S. S., Shankar, K., & Lakshmanaprabu, S. K.
(2020). An effective training scheme for deep (2020). Improved grey wolf optimization-based
neural network in edge computing enabled Internet feature subset selection with fuzzy neural classifier
of medical things (IoMT) systems. IEEE Access, 8, for financial crisis prediction. Soft Computing,
107112-107123. 24(1), 101-110.

[64] Amira S. Ashour, Samsad Beagum, [73] García-Díaz, V., Fernández-Fernández, H.,
Nilanjan Dey, Ahmed S. Ashour, Dimitra Sifaki Palacios-González, E., G-Bustelo, B. C. P.,
Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le, Fuqian Sanjuán-Martínez, O., & Lovelle, J. M. C. (2010).
Shi (2018), Light Microscopy Image De-noising Talisman mde: Mixing MDE principles. Journal of
using Optimized LPA-ICI Filter, Neural Computing Systems and Software, 83(7), 1179-1191.
and Applications, Vol.29(12), pp 1517–1533,
Springer, ISSN: 0941-0643. [74] Le Nguyen, B., Lydia, E. L., Elhoseny, M.,
Pustokhina, I., Pustokhin, D. A., Selim, M. M., ... &
[65] Tolosa, J. B., Sanjuán‐Martínez, O., Shankar, K. (2020). Privacy Preserving Blockchain
García‐Díaz, V., G‐Bustelo, B. C. P., & Lovelle, J. Technique to Achieve Secure and Reliable Sharing
M. C. (2011). Towards the systematic measurement of IoT Data. CMC-COMPUTERS MATERIALS &
of ATL transformation models. Software: Practice CONTINUA, 65(1), 87-107.
and Experience, 41(7), 789-815.
[75] Ezhilarasu, P., & Krishnaraj, N. (2015).
[66] Raj, R. J. S., Shobana, S. J., Pustokhina, I. Applications of Finite Automata in Lexical Analysis
V., Pustokhin, D. A., Gupta, D., & Shankar, K. and as a Ticket Vending Machine–A Review. Int. J.
(2020). Optimal Feature Selection-Based Medical Comput. Sci. Eng. Technol, 6(05), 267-270.
Image Classification Using Deep Learning Model in
Internet of Medical Things. IEEE Access, 8, 58006-
58017.

[67] García-Díaz, V., Espada, J. P., Crespo, R.


G., G-Bustelo, B. C. P., & Lovelle, J. M. C. (2018).
An approach to improve the accuracy of
probabilistic classifiers for decision support systems
in sentiment analysis. Applied Soft Computing, 67,
822-833.

[68] Mohanty, S. N., Ramya, K. C., Rani, S. S.,


Gupta, D., Shankar, K., Lakshmanaprabu, S. K., &
Khanna, A. (2020). An efficient Lightweight
integrated Blockchain (ELIB) model for IoT
security and privacy. Future Generation Computer
Systems, 102, 1027-1037.

[69] Krishnaraj, N., Ezhilarasu, P., & Gao, X.


Z. Hybrid Soft Computing Approach for Prediction
of Cancer in Colon Using Microarray Gene Data.
Current Signal Transduction Therapy, 11(2).

[70] Cueva-Fernandez, G., Espada, J. P.,


García-Díaz, V., García, C. G., & Garcia-
Fernandez, N. (2014). Vitruvius: An expert system
for vehicle sensor tracking and managing
application generation. Journal of network and
computer applications, 42, 178-188.

[71] Anand Nayyar, Vikram Puri, Nhu Gia


Nguyen, Dac Nhuong Le, Smart Surveillance Robot
for the Real Time Monitoring and Control System
in Environment and Industrial Applications,
Advances in Intelligent System and Computing, pp
229-243, Springer

ISSN: 2454-5414 www.ijitjournal.org Page 77

You might also like