Simulative Performance Evaluation of a Free Space Optical Communication Link Operating at 1550 nm using Different Modulation Formats

FSO enables to provide last mile transmission reach with some advantages such as inherent security and no electrical hazards without laying any fiber or cable. In this paper we have analyzed the performance of free space optics communication system by employing five transmitters (CSNRZ CSRZ DBNRZ MDBNRZ and MDBRZ) for different attenuation values at 10Gbps up to the transmission distance of 1100m. The effect of beam divergence, transmitter losses, receiver losses and receiver aperture diameter is also calculated on the performance of proposed hybrid modulation format based free space optical communication system.

[1]  Bogdan Filipic,et al.  DEMO: Differential Evolution for Multiobjective Optimization , 2005, EMO.

[2]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[3]  Yanqing Zhang,et al.  A genetic algorithm-based method for feature subset selection , 2008, Soft Comput..

[4]  Xin-She Yang,et al.  Binary Flower Pollination Algorithm and Its Application to Feature Selection , 2015, Recent Advances in Swarm Intelligence and Evolutionary Computation.

[5]  Philip S. Yu,et al.  Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns , 2011, IEEE Transactions on Knowledge and Data Engineering.

[6]  Xin-She Yang,et al.  Engineering Optimization: An Introduction with Metaheuristic Applications , 2010 .

[7]  Pradeep K. Khosla,et al.  Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .

[8]  Ashwin Kothari,et al.  Linear antenna array optimization using flower pollination algorithm , 2016, SpringerPlus.

[9]  Kun-Chan Lan,et al.  Rapid Generation of Realistic Mobility Models for VANET , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[10]  L. Plümer,et al.  Original paper: Early detection and classification of plant diseases with Support Vector Machines based on hyperspectral reflectance , 2010 .

[11]  A Sudheer Kumar,et al.  A New Meta Heuristic Algorithm Based Shunt Capacitive Compensation for Power Loss Reduction on Radial Distribution System , 2014 .

[12]  Amir-Masoud Eftekhari-Moghadam,et al.  An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..

[13]  Shih-Fu Chang,et al.  Using Relevance Feedback in Content-Based Image Metasearch , 1998, IEEE Internet Comput..

[14]  Dheerendra Singh,et al.  Robust and Efficient 'RGB' based Fractal Image Compression: Flower Pollination based Optimization , 2013 .

[15]  Vipin Kumar,et al.  Feature Selection: A literature Review , 2014, Smart Comput. Rev..

[16]  Ferat Sahin,et al.  A survey on feature selection methods , 2014, Comput. Electr. Eng..

[17]  Ivan B. Djordjevic,et al.  A survey on recent advances in optical communications , 2014, Comput. Electr. Eng..

[18]  V. S. S. S. Chakravarthy Vedula,et al.  Synthesis of Circular Array Antenna for Sidelobe Level and Aperture Size Control Using Flower Pollination Algorithm , 2015 .

[19]  Djamel-Eddine Saïdouni,et al.  A discrete flower pollination algorithm for graph coloring problem , 2015, 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF).

[20]  C Shilaja,et al.  Optimal Line Flow in Conventional Power System using Euclidean Affine Flower Pollination Algorithm , 2016 .

[21]  W. Diepenbrock,et al.  A method to extract morphological traits of plant organs from 3D point clouds as a database for an architectural plant model , 2007 .

[22]  Ali Harounabadi,et al.  Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods , 2013 .

[23]  Pavel Paclík,et al.  Adaptive floating search methods in feature selection , 1999, Pattern Recognit. Lett..

[24]  Volker Steinhage,et al.  Semantic Skeletonization for Structural Plant Analysis , 2013 .

[25]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[26]  Younghwan Yoo,et al.  A Partition-Based LEACH Algorithm for Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[27]  Lale Özbakır,et al.  Artificial Bee Colony Algorithm and Its Application to Generalized Assignment Problem , 2007 .

[28]  Pan Feng,et al.  Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).

[29]  Ching-Nung Yang,et al.  A general multi-secret visual cryptography scheme , 2010 .

[30]  Bijay Ketan Panigrahi,et al.  Hybrid flower pollination algorithm with time-varying fuzzy selection mechanism for wind integrated multi-objective dynamic economic dispatch , 2015 .

[31]  Mihai Datcu,et al.  A fast compression-based similarity measure with applications to content-based image retrieval , 2012, J. Vis. Commun. Image Represent..

[32]  Sasongko Pramono Hadi,et al.  Flower pollination algorithm for optimal control in multi-machine system with GUPFC , 2014, 2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE).

[33]  Mohamed Abdel-Baset,et al.  A Novel Hybrid Flower Pollination Algorithm with Chaotic Harmony Search for Solving Sudoku Puzzles , 2014 .

[34]  Yongquan Zhou,et al.  Flower Pollination Algorithm with Dimension by Dimension Improvement , 2014 .

[35]  Pedro Larrañaga,et al.  A review of feature selection techniques in bioinformatics , 2007, Bioinform..

[36]  H. Kabir Research Issues on Vehicular Ad hoc Network , 2013 .

[37]  B. S. Manjunath,et al.  NeTra: A toolbox for navigating large image databases , 1997, Multimedia Systems.

[38]  Manoj Kumar,et al.  Performance evaluation of 16 channel DWDM radio-over-fiber link , 2013 .

[39]  Ishfaq Ahmad,et al.  Comparison and analysis of ten static heuristics-based Internet data replication techniques , 2008, J. Parallel Distributed Comput..

[40]  Li Zhuo,et al.  A genetic algorithm based wrapper feature selection method for classification of hyperspectral images using support vector machine , 2008, Geoinformatics.

[41]  Vaishali D. Khairnar,et al.  DEMO: Simulation of Realistic Mobility Model and Implementation of 802.11p (DSRC) for Vehicular Networks (VANET) , 2013, ArXiv.

[42]  B. S. Manjunath Image Browsing in the Alexandria Digital Library (ADL) Project , 1995, D Lib Mag..

[43]  Lili Qiu,et al.  On the placement of Web server replicas , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[44]  Amir-Massoud Bidgoli,et al.  A Hybrid Feature Selection Method to Improve Performance of a Group of Classification Algorithms , 2013, ArXiv.

[45]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[46]  Bok-Min Goi,et al.  Cloud enabled spam filtering services: Challenges and opportunities , 2011, 2011 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT).

[47]  Arnold W. M. Smeulders,et al.  PicToSeek: combining color and shape invariant features for image retrieval , 2000, IEEE Trans. Image Process..

[48]  Pei-Ling Chiu,et al.  Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.

[49]  G. Wiselin Jiji,et al.  Hybrid data clustering approach using K-Means and Flower Pollination Algorithm , 2015, ArXiv.

[50]  Carlos Alberto Ochoa Ortíz Zezzatti,et al.  Implementing flower multi-objective algorithm for selection of university academic credits , 2014, 2014 Sixth World Congress on Nature and Biologically Inspired Computing (NaBIC 2014).

[51]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[52]  Mazin Ali,et al.  Analysis of Data Rate for Free Space Optical Communications System , 2014 .

[53]  Sushil Jajodia,et al.  Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems , 2003, IEEE Trans. Parallel Distributed Syst..

[54]  Klaudia Kaiser,et al.  Wireless Communication Systems From Rf Subsystems To 4g Enabling Technologies , 2016 .

[55]  Ishfaq Ahmad,et al.  Static and adaptive distributed data replication using genetic algorithms , 2004, J. Parallel Distributed Comput..

[56]  Dewan Md. Farid,et al.  Literature Review of Feature Selection for Mining Tasks , 2015 .

[57]  Dimitrios Zissis,et al.  Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..

[58]  Anu Sheetal,et al.  Comparison of CSRZ, DRZ and MDRZ Modulation Formats for High Bit Rate WDM-PON System using AWG , 2012 .

[59]  Ching-Nung Yang,et al.  Aspect ratio invariant visual cryptography by image filtering and resizing , 2012, Personal and Ubiquitous Computing.

[60]  Mooi Choo Chuah,et al.  Design and Performance of 3G Wireless Networks and Wireless LANs , 2005 .

[61]  Wenye Wang,et al.  ART: an asymmetric and reliable transport mechanism for wireless sensor networks , 2007, Int. J. Sens. Networks.

[62]  Asoke Nath,et al.  Symmetric Key Cryptography Using Random Key Generator , 2010, Security and Management.

[63]  K. Kersting,et al.  Early drought stress detection in cereals: simplex volume maximisation for hyperspectral image analysis. , 2012, Functional plant biology : FPB.

[64]  Yuh-Shyan Chen,et al.  Routing Protocols in Vehicular Ad Hoc Networks: A Survey and Future Perspectives , 2010, J. Inf. Sci. Eng..

[65]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[66]  Ulas Kilic,et al.  Optimal Reactive Power Dispatch Problem Solved By Using Flower Pollination Algorithm , 2016 .

[68]  Albert Y. Zomaya,et al.  On the Characterization of the Structural Robustness of Data Center Networks , 2013, IEEE Transactions on Cloud Computing.

[69]  W. Cao,et al.  The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXVIII-4/C7 CLASSIFICATION OF HIGH RESOLUTION OPTICAL AND SAR FUSION IMAGE USING FUZZY KNOWLEDGE AND OBJECT-ORIENTED PARADIGM , 2010 .

[70]  Joan Feigenbaum,et al.  Graph distances in the streaming model: the value of space , 2005, SODA '05.

[71]  Ethem Alpaydin,et al.  Introduction to Machine Learning (Adaptive Computation and Machine Learning) , 2004 .

[72]  Hossein Shahamat,et al.  Feature selection using genetic algorithm for classification of schizophrenia using fMRI data , 2015 .

[73]  S. S. Dorle,et al.  Particle Swarm Optimization based Routing Protocol for Vehicular Ad Hoc Network , 2015 .

[74]  Rui Wang,et al.  An Improved Flower Pollination Algorithm for Optimal Unmanned Undersea Vehicle Path Planning Problem , 2016, Int. J. Pattern Recognit. Artif. Intell..

[75]  Choong Seon Hong,et al.  Multipath Congestion Control for Heterogeneous Traffic in Wireless Sensor Network , 2008, 2008 10th International Conference on Advanced Communication Technology.

[76]  Aditi Malik,et al.  Free Space Optics: Current Applications and Future Challenges , 2015 .

[77]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[79]  Youngshin Han,et al.  Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[80]  Bo Li,et al.  A survey of transport protocols for wireless sensor networks , 2006, IEEE Network.

[81]  B. V. Babu,et al.  Multi-objective differential evolution (MODE) for optimization of supply chain planning and management , 2007, 2007 IEEE Congress on Evolutionary Computation.

[82]  Miss. Dhanashree S. Kalel,et al.  Color, Shape and Texture feature extraction for Content Based Image Retrieval System: A Study , 2016 .

[83]  Yuxiang Zhou,et al.  Local Greedy Flower Pollination Algorithm for Solving Planar Graph Coloring Problem , 2015 .

[84]  Ji Young Lee,et al.  Multi-objective optimisation using the Bees Algorithm , 2010 .

[86]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[87]  Rajinder Singh Kaler,et al.  Simulation of high capacity 40 Gb/s long haul DWDM system using different modulation formats and dispersion compensation schemes in the presence of Kerr's effect , 2010 .

[88]  mahmoud mohamed ismail ali,et al.  An Improved Chaotic Flower Pollination Algorithm for Solving LargeInteger Programming Problems , 2014 .

[89]  N. Madavan Multiobjective optimization using a Pareto differential evolution approach , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[90]  Heiner Kuhlmann,et al.  Surface feature based classification of plant organs from 3D laserscanned point clouds for plant phenotyping , 2013, BMC Bioinformatics.

[91]  M. Singh,et al.  A single As2Se3 chalcogenide Highly Non-Linear Fiber (HNLF) based simultaneous all-optical half-adder and half-subtracter , 2015 .

[92]  T. Devi,et al.  Design and Development of an Algorithm for Image Clustering In Textile Image Retrieval Using Color Descriptors , 2012 .

[93]  Jeremy S. Smith,et al.  Image pattern classification for the identification of disease causing agents in plants , 2009 .

[94]  D. Turgay Altilar,et al.  HYBRIST Mobility Model- A Novel Hybrid Mobility Model for VANET Simulations , 2014, ArXiv.

[95]  Yuhong Yang,et al.  Information Theory, Inference, and Learning Algorithms , 2005 .

[96]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[97]  Mohamed Abdel-Baset,et al.  A Hybrid Flower Pollination Algorithm for Engineering Optimization Problems , 2016 .

[98]  Giorgos Kappes,et al.  Dike : Virtualization-aware Access Control for Multitenant Filesystems , 2013 .

[99]  Oindrilla Dutta,et al.  DE-FPA: A hybrid differential evolution-flower pollination algorithm for function minimization , 2014, 2014 International Conference on High Performance Computing and Applications (ICHPCA).

[100]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[101]  Xin-She Yang,et al.  Flower Pollination Algorithm for Global Optimization , 2012, UCNC.

[102]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[103]  Nikita Arora,et al.  Block and Stream Cipher Based Cryptographic Algorithms : A Survey , 2014 .

[104]  Kai Liu,et al.  Upstream hop-by-hop congestion control in wireless sensor networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[105]  Junli Liang,et al.  Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps , 2015 .

[106]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[107]  Xin-She Yang,et al.  Bat algorithm: a novel approach for global engineering optimization , 2012, 1211.6663.

[108]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[109]  Harish Kundra,et al.  A hybrid FPAB/BBO Algorithm for Satellite Image Classification , 2010 .

[110]  Lei Yu,et al.  Fast Correlation Based Filter (FCBF) with a different search strategy , 2008, 2008 23rd International Symposium on Computer and Information Sciences.

[111]  Tao Wang,et al.  A Hybrid Feature Selection Algorithm: Combination of Symmetrical Uncertainty and Genetic Algorithms , 2008 .

[112]  Naresh Kumar,et al.  Performance analysis of different modulation format on free space optical communication system , 2013 .

[113]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[114]  Xin-She Yang,et al.  Flower pollination algorithm: A novel approach for multiobjective optimization , 2014, ArXiv.

[115]  Rohini K. Srihari,et al.  Intelligent Indexing and Semantic Retrieval of Multimodal Documents , 2004, Information Retrieval.

[116]  Duncan Fyfe Gillies,et al.  A Review of Feature Selection and Feature Extraction Methods Applied on Microarray Data , 2015, Adv. Bioinformatics.

[117]  Shivinder Devra Dispersion Compensation Using Raised Cosine Filter inOptical Fibers , 2011 .

[118]  Alex Pentland,et al.  Photobook: Content-based manipulation of image databases , 1996, International Journal of Computer Vision.

[119]  Emad Nabil,et al.  A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..

[120]  Jacob John Cryptography for Resource Constrained Devices: A Survey , 2012 .

[121]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[122]  Ari Juels,et al.  New approaches to security and availability for cloud data , 2013, CACM.

[123]  Shivinder Devra,et al.  Different Compensation Techniques To Compensate Chromatic Dispersion In Fiber Optics , 2011 .

[124]  Florian David Scintillation loss in free-space optic IM/DD systems , 2004, SPIE LASE.

[125]  Mrs. P. Nalini Review on Content Based Image Retrieval : From Its Origin to the New Age , 2016 .

[126]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[127]  Jasbir S. Arora,et al.  Survey of multi-objective optimization methods for engineering , 2004 .

[128]  Kalyanmoy Deb,et al.  Mechanical Component Design for Multiple Objectives Using Elitist Non-dominated Sorting GA , 2000, PPSN.

[129]  Jeremy S. Smith,et al.  An image-processing based algorithm to automatically identify plant disease visual symptoms. , 2009 .

[130]  Farooq Khan,et al.  LTE for 4G Mobile Broadband: Air Interface Technologies and Performance , 2009 .

[131]  Li Qiang Tao,et al.  ECODA: enhanced congestion detection and avoidance for multiple class of traffic in sensor networks , 2009, IEEE Transactions on Consumer Electronics.

[132]  Mohamed Abdel-Baset,et al.  A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems , 2014 .

[133]  Shih-Fu Chang,et al.  Querying by color regions using VisualSEEk content-based visual query system , 1997 .

[134]  Chien-Ming Chou,et al.  Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations , 2008, 2008 8th International Conference on ITS Telecommunications.

[135]  Panos M. Pardalos,et al.  A survey of data mining techniques applied to agriculture , 2009, Oper. Res..

[136]  Shailendra Singh,et al.  An ensemble approach for feature selection of Cyber Attack Dataset , 2009, ArXiv.

[137]  Raghupathy Sivakumar,et al.  ATP: a reliable transport protocol for ad hoc networks , 2003, IEEE Transactions on Mobile Computing.

[138]  Perica Strbac,et al.  Toward optimal feature selection using ranking methods and classification algorithms , 2011 .

[139]  Edoardo Ardizzone,et al.  JACOB: just a content-based query system for video databases , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[140]  M. Sumathi Swarm Intelligence based Bee inspired routing protocol for multipath routing in MANET , 2015 .

[141]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[142]  Peng Li,et al.  On the optimal placement of secure data objects over Internet , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[143]  Preeti Nagrath,et al.  Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm , 2013 .

[144]  G. H. Raisoni,et al.  Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks , 2014 .

[145]  Khalil AL-Wagih,et al.  An Improved Flower Pollination Algorithm for Solving Integer Programming Problems , 2015 .

[146]  Arthur C. Sanderson,et al.  Multi-objective differential evolution: theory and applications , 2004 .

[147]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[148]  Antony Selvadoss Thanamani,et al.  Feature Selection Based on Information Gain , 2013 .

[149]  Jitendra Malik,et al.  Blobworld: A System for Region-Based Image Indexing and Retrieval , 1999, VISUAL.

[150]  Lloyd A. Smith,et al.  Practical feature subset selection for machine learning , 1998 .

[151]  JaeWon Kang,et al.  TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[152]  Don R. Hush,et al.  Query by image example: The CANDID approach , 1995 .

[153]  Hesham N. Elmahdy,et al.  Flower Pollination Optimization Algorithm for Wireless Sensor Network Lifetime Global Optimization , 2014, SOCO 2014.

[154]  Václav Snásel,et al.  Retinal Vessel Segmentation Based on Flower Pollination Search Algorithm , 2014, IBICA.

[155]  Jose A. Regalado,et al.  Optimal power flow solution using Modified Flower Pollination Algorithm , 2015, 2015 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC).

[156]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .

[157]  Amarnath Gupta,et al.  Virage image search engine: an open framework for image management , 1996, Electronic Imaging.

[158]  S. Sasikala,et al.  Multi Filtration Feature Selection (MFFS) to improve discriminatory ability in clinical data set , 2016 .

[159]  DISPERSION COMPENSATION USING ALL PASS FILTERS IN OPTICAL FIBERS , .

[160]  Siddhant K. Jaiswal,et al.  Hybrid Approach for Routing in Vehicular Ad-hocNetwork (VANET) Using Clustering Approach , 2013 .

[161]  Michael Stonebraker,et al.  Chabot: Retrieval from a Relational Database of Images , 1995, Computer.

[162]  Linda G. Shapiro,et al.  A flexible image database system for content-based retrieval , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[163]  D. Rajya Lakshmi,et al.  Feature Extraction Methods for Color Image Similarity , 2012, ArXiv.

[164]  O. Mohamed,et al.  Hybridizing Filters and Wrapper Approaches for Improving the Classification Accuracy of Microarray Dataset , 2013 .

[165]  Günther Greiner,et al.  A Model-based Approach to Extract Leaf Features from 3D Scans , 2013 .

[166]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[167]  Osama Abdel Raouf,et al.  An Improved Flower Pollination Algorithm with Chaos , 2014 .

[168]  Sougata Mukherjea,et al.  AMORE: A World Wide Web image retrieval engine , 1999, World Wide Web.

[169]  Miss Laiha Mat Kiah,et al.  Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.

[170]  Divya Chadha,et al.  Query by Image for Efficient Information Retrieval: A Necessity , 2011 .

[171]  Mohamed Abdel-Baset,et al.  A Hybrid Flower Pollination Algorithm with Tabu Search for Unconstrained Optimization Problems , 2016 .

[172]  Linda K. Moore Wireless Technology and Spectrum Demand: Advanced Wireless Services , 2006 .

[173]  D. Straeten,et al.  Seeing is believing: imaging techniques to monitor plant health. , 2001, Biochimica et biophysica acta.

[174]  Ivanka Menken,et al.  Cloud Computing Virtualization Specialist Complete Certification Kit - Study Guide Book and Online Course - Second Edition , 2009 .

[175]  Hamid R. Rabiee,et al.  WCCP: A congestion control protocol for wireless multimedia communication in sensor networks , 2014, Ad Hoc Networks.

[176]  Linesh Raja,et al.  The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks , 2014 .