Mezbahur Rahman, Samah Al-thubaiti, Reid W Breitenfeldt, Jinzhu Jiang, Elliott B Light, Rebekka H Molenaar, Mohammad Shaha A Patwary, and Joshua A Wuollet – July 2016 – Page No.: 01-09
The Box-Cox transformation is a well known family of power transformations that brings a set of data into agreement with the normality assumption of the residuals and hence the response variable of a postulated model in regression analysis. In this paper we use six different data sets to implement adaptive maximum likelihood Box-Cox transformation parameter estimation in regression analysis. In addition, we perform random permutation and Monte-Carlo simulation to investigate the performances of the adaptive method.
- Page(s): 01-09
- Date of Publication: 31 July 2016
- Mezbahur Rahman
Minnesota State University, Mankato, MN 56001, USA. - Samah Al-thubaiti
Minnesota State University, Mankato, MN 56001, USA. - Reid W Breitenfeldt
Minnesota State University, Mankato, MN 56001, USA. - Jinzhu Jiang
Minnesota State University, Mankato, MN 56001, USA. - Elliott B Light
Minnesota State University, Mankato, MN 56001, USA. - Rebekka H Molenaar
Minnesota State University, Mankato, MN 56001, USA. - Mohammad Shaha A Patwary
Minnesota State University, Mankato, MN 56001, USA. - Joshua A Wuollet
Minnesota State University, Mankato, MN 56001, USA.
References
[1]. Bickel, P. J. and K. A. Doksum (1981). “An Analysis of Transformations Revisited.” Journal of the American Statistical Association, 76, 296-311.
[2]. Box, G. E. P. and D. R. Cox (1982). “An Analysis of Transformations Revisited (Rebutted).” Journal of the Ameran Statistical Association, 77, 209-210.
[3]. Box, G. E. P. and D. R. Cox (1964). “An Analysis of Transformations.” Journal of the Royal Statistical Society, Series B., 26, 211-252.
[4]. Carroll, R. J. (1980). “A Robust Method for Testing Transformations to Achieve Approximate Normality.” Journal of the Royal Statistical Society, Series B., 42, 71-78.
[5]. Halawa, A. M. (1996). “Estimating the Box-Cox Transformation via an Artificial Regression Model.” Communications in Statistics — Simulation and Computation, 25(2), 331-350.
[6]. Harter, H. L. (1961). “Expected Values of Normal Order Statistics.” Biometrika, 48, 1 and 2, 151-165.
[7]. Hinkley, D. V. (1975). “On Power Transformation to Symmetry.” Biometrika, 62, 101-111.
[8]. Hinkley, D. V. (1977). “On Quick Choice of Power Transformation.” Applied Statistics, 26, 67-68.
[9]. Lin, L. I. and E. F. Vonesh (1989). “An Empirical Nonlinear Data-Fitting Approach for Transforming Data to Normality.” American Statistician, 43, 237-243.
[10]. Montgomery, D. C., E. A. Peck, and G. G. Vining (2012). Introduction to Linear Regression Analysis. John Wiley & Sons, Inc., New Jersey, USA.
[11]. Rahman, M. and L. M. Pearson (2008). “A Note on the Maximum Likelihood Box-Cox Transformation Parameter.” Journal of Probability and Statistical Science, 6(2), 155-168.
[12]. Rahman, M. and L. M. Pearson (2000). “Shapiro-Francia W‟ Statistic Using Exclusive Simulation”, Journal of the Korean Data & Information Science Society, 11(2), 139-155.
[13]. Rahman, M. (1999). “Estimating the Box-Cox Transformation via Shapiro-Wilk W Statistic.” Communications in Statistics – Simulation and Computation, 28(1), 223-241.
[14]. Shapiro, S. S. and M. B. Wilk (1965). “An Analysis of Variance Test for Normality.” Biometrika, 52, 3 and 4, 591-611.
[15]. Shapiro, S. S., M. B. Wilk, and H. J. Chen (1968). “A Comparative Study of Various Tests of Normality.” Journal of the American Statistical Association, 63, 1343-1372.
[16]. Taylor, J. M. G. (1985). “Power Transformations to Symmetry.” Annals of Mathemaical Statistics, 33, 1-67.
Mezbahur Rahman, Samah Al-thubaiti, Reid W Breitenfeldt, Jinzhu Jiang, Elliott B Light, Rebekka H Molenaar, Mohammad Shaha A Patwary, and Joshua A Wuollet “A Note on Adaptive Box-Cox Transformation Parameter in Linear Regression” International Journal of Research and Innovation in Applied Science -IJRIAS vol.1 issue 4, pp.01-09 2016
Suchita B. Patel, Dr. Samratvivekanand O Khanna – July 2016 – Page No.: 10-15
Mobile Adhoc Networks (MANET) is a set of wireless cellular nodes which creates transient network with none infrastructure. The channel is wi-fi, topology is dynamic so, there may be no clear line of defense. due to those motives, MANET constantly stays under extra danger to attacks. The Black hole assault is considered one of such safety issue in MANET. In a Black hole assault a malicious node replies with having a shortest path to destination and drops the send packet by way of supply node in preference to forwarding it to the vacation spot node. on this paper, we propose 2-tier trust based model to preventattacks by using calculating believe cost for source to destination in between hops as well as consider for course and store facts for routing motive. by using depended on routing protocol named 2-tier NTPTSAODV (Node accept as true with course accept as true with comfy AODV) affords at ease network transmission direction. The NTPTSAODV protocol has been implemented and simulated on NS-2. The overall performance of NTPTSAODV has been additionally analyzed with appreciate to Blackhole attack and examine with normal AODV, BAODV and NTPTSAODV.
- Page(s): 10-15
- Date of Publication: 31 July 2016
- Suchita B. Patel
Ph.D. Student, S. P. University,
Assistant Professor, ISTAR College, V.V.Nagar, Gujarat, India - Dr. Samratvivekanand O Khanna
Professor & Head, MSc(IT) Dept., ISTAR College, V.V Nagar, Gujarat, India
References
[1]. C.E. Perkins, S,R, Das, and E. Royer: “Ad-I-Ioe on Demand Distance Vector(AODV)”, RFC 3561.
[2]. Payal N. Raj and Prashant B. Swadas, “DPRAODV: A Dynamic Learning System Against Black Hole Attack InAODV Based Manet”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
[3]. Z. Li, A. Das, J. Zhou; “Theoretical Basis for Intrusion Detection”; Proceedings of 6th IEEE Information Assurance Workshop (IAW), 2005
[4]. JENSEN C.D., CONNELL P.O.: „Trust-based route selection in dynamic source routing‟. Proc. Int. Conf. on TrustManagement, Pisa, Italy, May 2006, pp. 150–163
[5]. H. Xia, Z. Jia, X. Li, L. Ju and E.H.M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks”, Ad Hoc Networks, 2012, Available online 25 February 2012,https://dx.doi.org/10.1016/j.adhoc.2012.02.009.
[6]. Suchita B. Patel, “Blackhole Attack Putting into Practice in AODV Routing Protocol”, International Journal of Mobile & Adhoc Network|Vol 4|issue 4|Nov. 2014, pp. 352-355.
[7]. Suchita B. Patel, Dr. Samrat O. Khanna, “Black Hole Attack Detection Solutions Using AODV Protocol for MANET: A Review” International Journal of Computer Networks and Security, ISSN:2051-6878, Vol.24, Issue.1, RECENT SCIENCE PUBLICATIONS ARCHIVES |April 2014|$25.00 | 27703429| PP. 1224-1233.
[8]. Asad Amir Pirzada and Chris McDonald. Establishing Trust InPure Ad-hoc Networks. In Proceddings 27th AustralasianComputer Science Conference (ACSC’04), Dunedin, New Zealand,26(1), pages 47-54, January 2004.
[9]. A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks.PhD thesis, Department of Computer Science and Engineering,The Chinese University of Hong Kong, 2003.
[10]. N. Bhalaji, A. Shanmugam, “A Trust Based Model to MitigateBlack Hole Attacks in DSR Based Manet”, European Journal ofScientific Research, ISSN 1450-216X Vol.50 No.1,2011.
Suchita B. Patel, Dr. Samratvivekanand O Khanna “2-Tier Trust Based Model Forintrusion Detection System in Mobile Adhoc Network” International Journal of Research and Innovation in Applied Science -IJRIAS vol.1 issue 4, pp.10-15 2016