Anda di halaman 1dari 5

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 4 | Issue 4 | September 2017

ISSN (online): 2349-6010

Artificial Intelligence Network Load Comparison


in Ant Colony Optimization
M. Sibisakkaravarthi P. Subramaniam
Research Scholar Head of Dept. & Associate Professor
Department of Computer Science Department of Computer Science
Muthayammal College of Arts & Science, India Muthayammal College of Arts & Science, India

Abstract
Ants first evolved around 120 million years ago, take form in over 11,400 different species and are considered one of the most
successful insects due to their highly organized colonies, sometimes consisting of millions of ants. One particular notability of ants
is their ability to create "ant streets", long bi-directional lanes of single file pathways in which they navigate landscapes in order to
reach a purpose in optimal time. These ever-changing networks are made possible by the use of pheromones which guide them
using a shortest path mechanism. This practice allows an adaptive routing system which is updated should a more optimal path be
found or an obstruction placed across an existing pathway. Computer scientists began researching the behavior of ants in the early
1990's to discover new routing algorithms. The result of these studies is Ant Colony Optimization (ACO) and in the case of well
implemented ACO techniques, optimal performance is comparative to existing top-performing routing algorithms. This article
details how ACO can be used to vigorously route traffic efficiently. An efficient routing algorithm will minimize the number of
nodes that a call will need to connect to in order to be completed thus; minimizing network load and growing reliability. An
implementation of ANT Net based on Marco Dorigo has been designed and through this a number of visually aided test were
produced to compare the genetic algorithm to a non-generic algorithm. The report will final conclude with a synopsis of how the
algorithm perform and how it could be further optimized.
Keywords: Neural Networks, Optical Language, Multi-Layer, Artificial Intelligence
_______________________________________________________________________________________________________

I. INTRODUCTION

Artificial intelligence (AI) is defined as intelligence exhibited by an artificial entity. Such a system is generally assumed to be a
computer. Although AI has a strong science fiction connotation, it forms a vital branch of computer science, dealing with intelligent
behavior, learning and version in machines. Research in AI is concerned with producing machines to mechanize tasks requiring
intelligent behavior. Examples include control, planning and preparation, the ability to answer diagnostic and consumer questions,
handwriting, speech, and facial recognition.
As such, it has become a scientific discipline, focused on providing solutions to real life problems. AI systems are now in routine
use in economics, medicine, engineering and the martial, as well as being built into many common home computer software
applications, traditional policy games like computer chess and other video games.
Categories of AI
AI divides roughly into two schools of thought:
Conventional AI
Conventional AI mostly involves methods now classified as machine learning, characterized by formalism and statistical analysis.
This is also known as symbolic AI, logical AI, neat AI and Good Old Fashioned Artificial Intelligence (GOFAI).
 Expert systems: apply reasoning capabilities to reach a conclusion. An expert system can process large amounts of known
information and provide conclusions based on them.
 Case based reasoning
 Bayesian networks
 Behavior based AI: a modular method of building AI systems by hand.
Computational Intelligence (CI)
Computational Intelligence involves iterative growth or learning (e.g. parameter tuning e.g. in connectionist systems). Learning is
based on empirical data and is associated with non-symbolic AI, scruffy AI and Neural networks: systems with very strong pattern
recognition capabilities.
 Fuzzy systems: techniques for reasoning under uncertainty, has been widely used in modern industrial and consumer product
control systems.
 Evolutionary computation: applies biologically inspired concepts such as populations, mutation and survival of the fittest to
generate increasingly better solutions to the problem. These methods most notably divide into evolutionary algorithms (e.g.
genetic algorithms) and swarm intelligence (e.g. ant algorithms).

All rights reserved by www.ijirst.org 60


Artificial Intelligence Network Load Comparison in Ant Colony Optimization
(IJIRST/ Volume 4 / Issue 4/ 012)

American Association for Artificial Intelligence (AAAI)


Founded in 1979, the American Association for Artificial Intelligence (AAAI) is a nonprofit scientific society devoted to advancing
the scientific considerate of the mechanisms underlying thought and intelligent behavior and their embodiment in machines. AAAI
also aims to increase public understanding of artificial intelligence, improve the teaching and training of AI practitioners, and
provide guidance for research planners and funders concerning the importance and potential of current AI developments and future
directions.
Applications of AI
Game Playing
You can buy machines that can play master level chess for a few hundred dollars. There is some AI in them, but they play well
against people mainly through brute force computation--looking at hundreds of thousands of positions.
Speech Recognition
In the 1990s, computer speech recognition reached a practical level for limited purposes. Thus United Airlines has replaced its
keyboard tree for flight information by a system using speech recognition of flight numbers and city names. It is quite convenient.
On the other hand, while it is possible to instruct some computers using speech, most users have gone back to the keyboard and
the mouse as still more convenient.
Understanding Natural Language
Just getting a sequence of words into a computer is not enough. Parsing sentences is not enough either. The computer has to be
provided with an understanding of the domain the text is about, and this is presently possible only for very limited domains.

II. COMPUTER VISION

The world is composed of three-dimensional objects, but the inputs to the human eye and computer’s TV cameras are two
dimensional. Some useful programs can work solely in two dimensions, but full computer vision requires partial three-dimensional
information that is not just a set of two-dimensional views. At present there are only limited ways of representing three-dimensional
information directly, and they are not as good as what humans evidently use.

III. PROFESSIONAL SYSTEMS

A “information engineer'” interviews experts in a certain domain and tries to embody their knowledge in a computer program for
carrying out some task. How well this works depends on whether the intellectual mechanisms required for the task are within the
present state of AI. One of the first expert systems was MYCIN in 1974, which diagnosed bacterial infections of the blood and
suggested treatments. It did better than medical students or practicing doctors, provided its limitations were observed.
Heuristic Classification
One of the most feasible kinds of expert system given the present knowledge of AI is to put some information in one of a fixed set
of categories using several sources of information. An example is advising whether to accept a proposed credit card purchase.
Information is available about the owner of the credit card, his record of payment and also about the item he is buying and about
the establishment from which he is buying it (e.g., about whether there have been previous credit card frauds at this establishment).
Background
Electronic communication networks can be categorized as either circuit-switched or packet-switched. Circuit-switched networks
rely on a dedicated connection from source to destination which is made once at start-up and remains constant until the tear-down
of the connection. An example of a circuit switched network would be British Telecom’s telephone network. Packet-switched
networks work quite differently however and all data to be transmitted is divided into segment and sent as data-packet. Data-
packets can arrive out of order in a packets-switched network with a variety of paths taken through different nodes in order to get
to their destination. The internet and office local area networks are both good examples of packet-switched networks.
A number of techniques can be employed to optimize the flow of traffic around a network. Such techniques include flow and
congestion control where nodes action packet acknowledgements from destination nodes to either ramp-up or decrease packet
transmission speed. The area of interest in this report concentrates on the idea of network routing and routing tables. These tables
hold information used by a routing algorithm to make a local forwarding decision for the packet on the next node it will visit in
order to reach its final destination.
One of the issues with network routing (especially in very large networks such as the internet) is adaptability. Not only can
traffic be randomly high but the structure of a network can change as old nodes are removed and new nodes added. This perhaps
makes it almost impossible to find a combination of constant parameters to route a network optimally.
Routing algorithms
Packet-switched networks dynamically guide packets to their destination via routing tables stored in a link state and are selected
via a link state algorithm.

All rights reserved by www.ijirst.org 61


Artificial Intelligence Network Load Comparison in Ant Colony Optimization
(IJIRST/ Volume 4 / Issue 4/ 012)

The Link state algorithm works by giving every node in the network a connectivity graph of the network. This graph depicts
which nodes are directly connected. Values are stored for connected nodes in map which represent the shortest path to other nodes.
One such link state algorithm used in network routing is Dijkstras algorithm. When a path between two nodes is found, its weight
is updated in the table. Should a shorter path be found the new optimal weight will be updated to the table replacing the old value.
The algorithm allows traffic to be routed around the network whilst connecting to the least numb nodes as possible. The system
works but doesn't take into account influx of traffic and load balancing.

IV. ARTIFICIAL INTELLIGENCE

We now move to a discussion of architectural proposals within the information processing perspective. Our goal is to try to place
the multiplicity of proposals into perspective. As we review various proposals, we will present some judgments of our own about
relevant issues. But first, we need to review the notion of architecture and make some additional distinctions.
Form and Content Issues in Architectures
In computer science, a programming language corresponds to a virtual architecture. A specific program in that language describes
a particular (virtual) machine, which then responds to various inputs in ways defined by the program. The architecture is thus what
Newell calls the fixed structure of the information processor that is being analyzed, and the program specifies a variable structure
within this architecture. We can regard the architecture as the form and the program as the content, which together fully instantiate
a particular information processing machine. We can extend these intuitions to types of machines which are different from
computers. For example, the connectionist architecture can be abstractly specified as the set {{N}, {nI}, {nO}, {zi}, {wij}}, where
{N} is a set of nodes, {nI} and {nO} are subsets of {N} called input and output nodes respectively, {zi} are the functions computed
by the nodes, and {wij} is the set of weights between nodes. A particular connectionist machine is then instantiated by the
"program" that specifies values for all these variables.
We have discussed the prospects for separating intelligence (a knowledge state process) from other mental phenomena, and also
the degree to which various theories of intelligence and cognition balance between fidelity to biology versus functionalism. We
have discussed the sense in which alternatives such as logic, decision tree algorithms, and connectionism are all alternative
languages in which to couch an information processing account of cognitive phenomena, and what it means to take a Knowledge
Level stance towards cognitive phenomena. We have further discussed the distinction between form and content theories in AI.
We are now ready to give an overview of the issues in cognitive architectures. We will assume that the reader is already familiar
in some general way with the proposals that we discussing. Our goal is to place these ideas in perspective.
Intelligence as Just Computation
Until recently the dominant paradigm for thinking about information processing has been the Turing machine framework, or what
has been called the discrete symbol system approach. Information processing theories are formulated as algorithms operating on
data structures. In fact AI was launched as a field when Turing proposed in a famous paper that thinking was computation of this
type (the term "artificial intelligence" itself was coined later) . Natural questions in this framework would be whether the set of
computations that underlie thinking is a subset of Turing-computable functions, and if so how the properties of the subset should
be characterized.
Most of AI research consists of algorithms for specific problems that are associated with intelligence when humans perform
them. Algorithms for diagnosis, design, planning, etc., are proposed, because these tasks are seen as important for an intelligent
agent. But as a rule no effort is made to relate the algorithm for the specific task to a general architecture for intelligence. While
such algorithms are useful as technologies and to make the point that several tasks that appear to require intelligence can be done
by certain classes of machines, they do not give much insight into intelligence in general.
Architectures for Deliberation
Historically most of the intuitions in AI about intelligence have come from introspections about the relationships between
conscious thoughts. We are aware of having thoughts which often follow one after another. These thoughts are mostly couched in
the medium of natural language, although sometimes thoughts include mental images as well. When people are thinking for a
purpose, say for problem solving, there is a sense of directing thoughts, choosing some, rejecting others, and focusing them towards
the goal. Activity of this type has been called "deliberation." Deliberation, for humans, is a coherent goal-directed activity, lasting
over several seconds or longer. For many people thinking is the act of deliberating in this sense. We can contrast activities in this
time span with other cognitive phenomena, which, in humans, take under a few hundred milliseconds, such as real-time natural
language understanding and generation, visual perception, being reminded of things, and so on. These short time span phenomena
are handled by what we will call the subdeliberative architecture, as we will discuss later.
Researchers have proposed different kinds of deliberative architectures, depending upon which kind of pattern among conscious
thoughts struck them. Two groups of proposals about such patterns have been influential in AI theory-making: the reasoning view
and the goal-subgoal view.

All rights reserved by www.ijirst.org 62


Artificial Intelligence Network Load Comparison in Ant Colony Optimization
(IJIRST/ Volume 4 / Issue 4/ 012)

Alternative Proposals
The various proposals differ along a number of dimensions: what kinds of tasks the architecture performs, degree of parallelism,
whether it is an information processing architecture at all, and, when it is taken to be an information processing architecture,
whether it is a symbolic one or some other type.
With respect to the kind of tasks the architecture performs, we mentioned Newell’s view that it is just recognition architecture.
Any smartness it possesses is a result of good abstractions and good indexing, but architecturally, there is nothing particularly
complicated. In fact, the good abstractions and indexing themselves were the result of the discoveries of deliberation during
problem state search. The real solution to the problem of memory, for Newell, is to get chunking done right: the proper level of
abstraction, labeling and indexing is all done at the time of chunking. In contrast to the recognition view are proposals that see
relatively complex problem solving activities going on in subdeliberative cognition. Cognition in this picture is a communicating
collection of modular agents, each of whom is simple, but capable of some degree of problem solving. For example, they can use
the means-ends heuristic (the goal-subtotaling feature of deliberation in the Soar architecture).
Deliberation has a serial character to it. Almost all proposals for the subdeliberative architecture, however, use parallelism in
one way or another. Parallelism can bring a number of advantages. For problems involving similar kinds of information processing
over somewhat distributed data (like perception), parallelism can speed up processing. Ultimately, however, additional problem
solving in deliberation may be required for some tasks.
Situated Cognition
Real cognitive agents are in contact with the surrounding world containing physical objects and other agents. A new school has
emerged calling itself the situated cognition movement which argues that traditional AI and cognitive science abstract the cognitive
agent too much away from the environment, and place undue emphasis on internal representations. The traditional internal
representation view leads, according to the situated cognition perspective, to large amounts of internal representation and complex
reasoning using these representations. Real agents simply use their sensory and motor systems to explore the world and pick out
the information needed, and get by with much smaller amounts of internal representation processing. At the minimum, situated
cognition is a proposal against excessive "intellection." In this sense, we can simply view this movement as making different
proposals about what and how much needs to be represented internally. The situated cognition perspective clearly rejects the former
view with respect to internal (sub-deliberative) processes, but accepts the fact deliberation does contain and use knowledge. Thus
the Knowledge Level description could be useful to describe the content of agent’s deliberation.

V. CONCLUSION

We conclude that if the machine could successfully pretend to be human to a knowledgeable observer then you certainly should
consider it intelligent. AI systems are now in routine use in various field such as economics, medicine, engineering and the military,
as well as being built into many common home computer software applications, traditional strategy games etc. AI is an exciting
and rewarding discipline. AI is branch of computer science that is concerned with the automation of intelligent behavior.
The revised definition of AI is - AI is the study of mechanisms underlying intelligent behavior through the construction
and evaluation of artifacts that attempt to enact those mechanisms. So it is concluded that it work as an artificial human brain
which have an unbelievable artificial thinking power.

REFERENCES
[1] Artificial Intelligence and cognitive science © 2006, Nils J. Nilsson Stanford AI Lab. Off-line Handwriting Recognition Using Artificial Neural Networks ©
2000, Andrew T. Wilson University of Minnesota, Morris http://wilsonat@mrs.umn.edu
[2] Using Neural Networks to Create an Adaptive Character Recognition System © 2002, Alexander J. Faaborg Cornell University, Ithaca NY
[3] Hand-Printed Character Recognizer using Neural Network © 2000, Shahzad Malik
[4] Neural Networks and Fuzzy Logic. © 1995, Rao, V., Rao, H. MIS Press, New York
[5] A.S.Syed Navaz , T.Dhevisri & Pratap Mazumder “Face Recognition Using Principal Component Analysis and Neural Networks“ March -2013, International
Journal of Computer Networking, Wireless and Mobile Communications. Vol No – 3, Issue No - 1, pp. 245-256.
[6] A.S.Syed Navaz, H.Iyyappa Narayanan & R.Vinoth.” Security Protocol Review Method Analyzer (SPRMAN)”, August – 2013, International Journal of
Advanced Studies in Computers, Science and Engineering, Vol No – 2, Issue No – 4, pp. 53-58.
[7] A.S.Syed Navaz & K.Girija “Hacking and Defending in Wireless Networks” Journal of Nano Science and Nano Technology, February 2014, Volume- 2,
Issue – 3, pp - 353-356.
[8] A.S.Syed Navaz & R.Barathiraja “Security Aspects of Mobile IP” Journal of Nano Science and Nano Technology (International), February 2014, Volume-
2, Issue – 3, pp - 237-240.
[9] A.S.Syed Navaz, G.M. Kadhar Nawaz & B.Karthick.” Probabilistic Approach to Locate a Mobile Node in Wireless Domain”, April – 2014, International
Journal of Computer Engineering and Applications, Vol No – 6, Issue No – 1, pp.41-49.
[10] Neural Networks © 2003, StatSoft Inc. http://www.statsoft.com/textbook/stneunet.html.
[11] G.Naveena, A.Anusha Priya, A Certain Investigation on Cluster Based Medium Access Control and QoS Aware Routing Protocol for Heterogeneous
Networks, 2016, International Journal for Scientific Research & Development, Volume 4, Issue 7, Pages 1117-1122.
[12] S.Yasmin, A.Anusha Priya, Decentralized Entrance power with Secret Endorsement of data Stored in Clouds, 2015/8, International Journal of Innovative
research in Computer and Communication Engineering, Volume 3, Issue 8, Pages 7279-7284.
[13] V.Yamuna, A.Anusha Priya, Efficient and Secure Data Storage in Cloud Computing RSA and DSE Function, 2015/7, International Journal of Innovative
Research in Computer and Communication Engineering, Volume 3, Issue 7, Pages 6758-6763.

All rights reserved by www.ijirst.org 63


Artificial Intelligence Network Load Comparison in Ant Colony Optimization
(IJIRST/ Volume 4 / Issue 4/ 012)

[14] P.Vijayakumar, A.Anusha Priya, Stabilize the Movement of Nodes on anycast Routing with jamming responsive in mobile ad-hoc networks, September 2015,
international Journal of Engineering Sciences & Research Technology, Volume 4 Issue 9,Pages – 207 -214.
[15] M.Balaji, E.Aarthi, K.Kalpana, B.Nivetha, D.Suganya “Adaptable and Reliable Industrial Security System using PIC Controller” 2017/5, Journal International
Journal for Innovative Research in Science & Technology, Volume 3, Issue 12, Page 56-60.
[16] A.S.Syed Navaz, C.Prabhadevi & V.Sangeetha”Data Grid Concepts for Data Security in Distributed Computing” January 2013, International Journal of
Computer Applications, Vol 61 – No 13, pp 6-11.
[17] A.S.Syed Navaz, V.Sangeetha & C.Prabhadevi, “Entropy Based Anomaly Detection System to Prevent DDoS Attacks in Cloud” January 2013, International
Journal of Computer Applications, Vol 62 – No 15, pp 42-47.
[18] A.S.Syed Navaz, A.S.Syed Fiaz, C.Prabhadevi, V.Sangeetha & S.Gopalakrishnan “Human Resource Management System” Jan – Feb 2013, International
Organization of Scientific Research Journal of Computer Engineering, Vol 8, Issue 4, pp. 62-71.
[19] A.S.Syed Navaz, S.Gopalakrishnan & R.Meena “Anomaly Detections in Internet Using Empirical Measures” February 2013, International Journal of
Innovative Technology and Exploring Engineering, Vol 2 – Issue 3. pp. 58-61.
[20] A.S.Syed Navaz, M.Ravi & T.Prabhu, “Preventing Disclosure of Sensitive Knowledge by Hiding Inference” February 2013, International Journal of
Computer Applications, Vol 63 – No 1. pp. 32-38.
[21] A.S.Syed Navaz & G.M. Kadhar Nawaz, “Ultra Wideband on High Speed Wireless Personal Area Networks” August – 2014, International Journal of Science
and Research, Vol No – 3, Issue No – 8, pp.1952-1955.
[22] M.Ravi A.M.Nirmala, P.Subramaniam, A.Anusha Priya, Enriched Performance on Wireless Sensor Network using Fuzzy based Clustering Technique, 2013,
International Journal of Advanced Studies in Computer Science and Engineering, Volume 2, Issue 3, Pages 11-17.
[23] A Anusha Priya, A Mohanapriya, An Effective Scrutiny of Static and Dynamic Load Balancing In Cloud, August 2016, International Journal of Emerging
Technology in Computer Science & Electronics, Volume 23 Issue 4, Pages – 27 -30.
[24] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz & A.S.Syed Fiaz “Slot Assignment Using FSA and DSA Algorithm in Wireless Sensor Network” October –
2014, Australian Journal of Basic and Applied Sciences, Vol No –8, Issue No –16, pp.11-17.
[25] A.S.Syed Navaz, S.Ravishankar & M.Sudarson, “Tracking Objects Using Multiple Acoustic Video Systems DISCOVERY The International Daily journal,
September 2015, Volume – 37, Issue - 168, pp - 59-64.
[26] A.S.Syed Navaz & A.S.Syed Fiaz, “Load Balancing in P2P Networks using Random Walk Algorithm” March – 2015, International Journal of Science and
Research, Vol No – 4, Issue No – 3, pp.2062-2066.
[27] J.Antony Daniel Rex,s.jensy Mary & M.Balaji, Mobile collision and secured system using PIC controller, International journal for innovative research science
and technology, Volume 4, Issue 4, Pp 1-5.
[28] A.S.Syed Navaz, J.Antony Daniel Rex, S.Jensy Mary. “Cluster Based Secure Data Transmission in WSN” July – 2015, International Journal of Scientific &
Engineering Research, Vol No - 6, Issue No - 7, pp. 1776 – 1781.
[29] A.S.Syed Navaz, J.Antony Daniel Rex, P.Anjala Mary. “An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay
Tolerant Network” September – 2015, International Journal of Scientific & Engineering Research, Vol No - 6, Issue No - 9, pp. 421 – 428.
[30] A.Anusha Priya G.Vijayalakshmi, Perceiving Kernel-Level Rootkits Using Data Structure Invariants, 2015/7, International Journal of Innovative Research
in Computer and Communication Engineering, Volume 3, Issue 7, Pages 6719-6724.
[31] N.Thavamani, A.Anusha Priya, A QOD-Slanting Scattered Steering Procedure for Fusion Wireless Set of Connections, 2015/7, International Journal of
Innovative Research in Computer and Communication Engineering, Volume 3, Issue 7, Pages 6752-6757.
[32] A.S.Syed Navaz, P.Jayalakshmi, N.Asha. “Optimization of Real-Time Video Over 3G Wireless Networks” September – 2015, International Journal of
Applied Engineering Research, Vol No - 10, Issue No - 18, pp. 39724 – 39730.
[33] M.Ravi & A.S.Syed Navaz. “Development of Mail Tracking System” October – 2015, International Journal of Innovative Research in Computer and
Communication Engineering, Vol No - 3, Issue No - 10, pp.9757-9762.
[34] S.Jensy Mary, A.S Syed Navaz & J.Antony Daniel Rex, “QA Generation Using Multimedia Based Harvesting Web Information” November – 2015,
International Journal of Innovative Research in Computer and Communication Engineering, Vol No - 3, Issue No - 11, pp.10381-10386.
[35] A.S Syed Navaz & A.S.Syed Fiaz “Network Intelligent Agent for Collision Detection with Bandwidth Calculation” December – 2015, MCAS Journal of
Research, Vol No – 2, pp.88-95, ISSN: 2454-115X.
[36] A.S Syed Navaz & K.Durairaj “Signature Authentication Using Biometric Methods” January – 2016, International Journal of Science and Research, Vol No
- 5, Issue No - 1, pp.1581-1584.
[37] A.S.Syed Fiaz, N.Asha, D.Sumathi & A.S.Syed Navaz “Data Visualization: Enhancing Big Data More Adaptable and Valuable” February – 2016,
International Journal of Applied Engineering Research, Vol No - 11, Issue No - 4, pp.–2801-2804.
[38] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz “Flow Based Layer Selection Algorithm for Data Collection in Tree Structure Wireless Sensor Networks” March
– 2016, International Journal of Applied Engineering Research, Vol No - 11, Issue No - 5, pp.–3359-3363.
[39] A.S.Syed Fiaz, I.Alsheba & R.Meena “Using Neural Networks to Create an Adaptive Character Recognition System”, Sep 2015, Discovery - The International
Daily journal, Vol.37 (168), pp.53-58.
[40] A.S.Syed Fiaz, M. Usha and J. Akilandeswari “A Brokerage Service Model for QoS support in Inter-Cloud Environment“,March 2013, International Journal
of Information and Computation Technology, Vol.3, No.3, pp 257-260,
[41] A.S.Syed Fiaz, R.Pushpapriya, S.Kirubashini & M.Sathya “Generation and allocation of subscriber numbers for telecommunication“, March2013,
InternationalJournal of Computer Science Engineering and Information Technology Research, Vol No: 3; Issue No: 1, pp. 257-266.
[42] A.S.Syed Fiaz, N.Devi, S.Aarthi "Bug Tracking and Reporting System", March 2013, International Journal of Soft Computing and Engineering, Vol No: 3;
Issue No: 1, pp. 257-266.
[43] M. Usha, J. Akilandeswari and A.S.Syed Fiaz “An efficient QoS framework for Cloud Brokerage Services”, Dec. 2012, International Symposium on Cloud
and Service Computing, pp: 76-79, 17-18, IEEE Xplore.
[44] A.S.Syed Navaz & Dr.G.M. Kadhar Nawaz “Layer Orient Time Domain Density Estimation Technique Based Channel Assignment in Tree Structure Wireless
Sensor Networks for Fast Data Collection” June - 2016, International Journal of Engineering and Technology, Vol No - 8, Issue No - 3, pp.–1506-1512.
[45] M.Ravi & A.S.Syed Navaz "Rough Set Based Grid Computing Service in Wireless Network" November - 2016, International Research Journal of Engineering
and Technology, Vol No - 3, Issue No - 11, pp.1122– 1126.
[46] A.S.Syed Navaz, N.Asha & D.Sumathi “Energy Efficient Consumption for Quality Based Sleep Scheduling in Wireless Sensor Networks” March - 2017,
ARPN Journal of Engineering and Applied Sciences, Vol No - 12, Issue No - 5, pp.–1494-1498.

All rights reserved by www.ijirst.org 64

Anda mungkin juga menyukai