IOSR Journal of Computer Engineering (IOSR-JCE)

Jan – Feb. 2015 Volume 17 - Issue 1

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Application of Big Data in Intelligent Traffic System
Country : China
Authors : Gang Zeng

Abstract: With the rapid developmentof society, transportation industryis also facing unprecedented challenges, if big data is used in this area, the advantage is obvious, it can resolve the questions of traditional traffic management system, in this article we propose an architecture of intelligent transportation system on big data platform, then we disuse the key technology in ITS:calculation of bayonet traffic flow, calculation of average speed of a road, querying the travel path of a vehicle, checking and controlling the fake vehicles. keywords: big data; Intelligent traffic system; application

[[1]. C. Dobre, F. Xhafa. Intelligent services for Big Data science. Future Generation Computer Systems 37 (2014) 267–281
[2]. Nanning Zheng, Jun Zhang,Chenghong Wang. Special issue on big data research in China.Knowledge and Information Systems.2014,41(2):247-249.
[3]. Jin Peng Tang, Ling Lin Li. Big Data Sensing Information Processing Platform for Intelligent Traffic. Applied Mechanics and Materials.2014,667:324-327
[4]. PR Newswire. Gigamon Announces Multi-Purpose Visibility Fabric Node for Big Data Traffic Intelligence. PR Newswire US. 2014.
[5]. Krzysztof Walkowiak,MichałWoźniak,MirosławKlinkowski,WojciechKmiecik. Optical networks for cost-efficient and scalable provisioning of big data traffic. International Journal of Parallel, Emergent and Distributed Systems.2015,30(1):15-28.

Paper Type : Research Paper
Title : Implementation of Emotional Intelligence in a machine
Country : India
Authors : Indrajit Sinha || Dr. Kanhaiya Lal

Abstract: This paper is an extended work of our paper "A New Concept on Thinking Machines: Cyber Personality" published in IJCS journal. Our previous work dealt with a new concept on implementing the entire personality in a machine. In this paper we have provided an implementation of introducing emotional intelligence inside a computer by providing a pseudo-code along with a partial implementation of the same. Suitable results have been included to prove our work.

Keywords: Artificial Intelligence, Cyber Personality, Emotional Intelligence, Psychology and Turing Machine.


Paper Type : Research Paper
Title : Correlation Coefficient Based Average Textual Similarity Model for Information Retrieval System in Wide Area Networks
Country : India
Authors : Jaswinder Singh || Parvinder Singh || Yogesh Chaba

Abstract: In wide area networks, retrieving the relevant text is a challenging task for information retrieval because most of the information requests are text based. The focus of paper is on the similarity measurement, performance evaluation and design of information retrieval techniques using the four similarity functions i.e. Jaccard, Cosine, Dice and Overlap. The performance evaluation of these similarity functions has been done for the similarity between the documents retrieved by the search engine for the entered text using the vector space model. The correlation coefficient was applied for evaluating the performance of similarity functions. All the possible combination of similarity functions have been explored and textual similarity model has been proposed for the information retrieval system in wide area networks.

Keywords: Information Retrieval System, Similarity Functions, Proposed Model of textual similarity, Wide Area Networks.

[1]. R. Baeza-Yates, B. Ribiero-Neto, Modern Information Retrieval, Pearson Education, 1999.
[2]. M.P.S. Bhatia, Akshi Kumar Khalid, "A Primer on the Web Information Retrieval Paradigm", Journal of Theoretical and Applied Information Technology, Vol.4, No.2, pp.657-662, 2008.
[3]. Nicholas J. Belkin, W. Bruce Croft, "Information Filtering and Information Retrieval: Two Sides of the Same Coin?" Communications of the ACM, Vol.35, No.12, p29 (10), 1992.
[4]. Jaswinder Singh, Parvinder Singh, Yogesh Chaba, "A Study of Similarity Functions Used in Textual Information Retrieval in Wide Area Networks", International Journal of Computer Science and Information Technologies, Vol. 5, Issue 6, pp. 7880-7884,2014.
[5]. G. Salton and M.H. McGill, Introduction to Modern Information Retrieval, McGraw Hill, 1983.
[6]. Nicholas J. Belkin, W. Bruce Croft, "Retrieval Techniques," Annual Review of Information Science & Technology, M.E Williams, Ed. Chapter. 4, pp.109-145 Elsevier, 1987.

Paper Type : Research Paper
Title : Visual Representations in High School Edublogs
Country : India
Authors : Suneet Madan || Ila Joshi

Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. When prepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verbal language. Easily available at an affordable cost, smart phones with high megapixel cameras have made everyone turn into a photographer. In contrast with the difficulties faced in the analog world, today it is way easier to click, confirm and document experiments or to click photographs to support the topics being blogged about. Besides, the intuitive interfaces of graphic and video editing softwares allow even amateurs to be able to do the basic editing. Social media is saturated with photographs, videos and graphics. However, blogging for educational purposes is yet to take benefit of this. A survey was conducted to find the preference of educational bloggers from the high school environment, which included the students, teachers, and other educational stakeholders, in terms of using verbal or visual content for writing their blogs. Edubloggers preferred to make their blogs unique and interesting through verbal content than by using graphics or photographs. The edublogs by students exhibited much more creativity and experimentation with color as compared to the edublogs of senior bloggers.

Keywords: Visual Communication, Visual Representation, Edublogs, High School Blogs, Contemporary Educational Environment

[1]. T. Anderson, and J. Dron, Three Generations of Distance Education Pedagogy, The International Review of Research in Open and Distributed Learning,12(3), 2011, 80-97.
[2]. B.R. Barber, Which technology and which democracy, in H. Jenkins and D. Thornburn (Eds.), Democracy and New Media, (Cambridge, MA: MIT Press, 2003) 33-48.
[3]. N. Andrzejczak, G. Trainin, and M. Poldberg, From image to text: Using images in the writing process, International Journal of Education and the Arts, 6(12), 19 October 2005.
[4]. T.A. Ukrainetz, Teaching Narrative Structure: Coherence, Cohesion, and Captivation, in T.A. Ukrainetz (Ed.) Contextual Language Intervention: Scaffolding PreK-12 Literacy Achievement, (Eau Claire, WI: Thinking Publication, 2006) 195-245.
[5]. M. Bailey, M. O‟Grady-Jones, and L. McGown, The impact of integrating visuals in an elementary creative writing process. Eyes on the future: Converging images, ideas, and instruction, in R.E. Griffin, D.G. Beauchamp, J.M. Hunter and C.B. Schiffman (Eds.), Selected readings from the Annual Conference of the International Visual Literacy Association, (Chicago: International Visual Literacy Association, 1996) 135-44.

Paper Type : Research Paper
Title : A Review Paper on Cross Platform Mobile Application Development IDE
Country : India
Authors : Chaitanya Kaul || Saurav Verma

Abstract: Cross Platform Mobile Application Development is the development of mobile based applications so that the development of these types of applications can be made platform-independent. A review has been made in this field while considering Integrated Development Environment is being proposed which will help a software developer to code an application in a single code base and deploy that single code base to multiple operating systems meaning if a developer codes in Java for Android, the developer can deploy the same Java code to iOS[6] subsystem. First the development of a operating system compatibility architecture which helped to run unmodified iOS binaries on Android operating system and second phase of proposed solution helped to understands the cross-platform application development tools which are currently available in the market. The third step is to understand such cross-platform development tools in more detail and finally a mathematical model based application.

Keywords: Cross-Platform Mobile application development, IDE, Android development, iOS development, Cross-Platform.

[1]. Cider: Native Execution of iOS Apps on Android, Jeremy Andrus, Alexander Vant Hof, Naser AlDuaij, Christof-fer Dall, Nicolas Viennot, and Jason Nieh, IEEE Micro, 2008,Vol.1.
[2]. Heitktter, Henning, Sebastian Hanschke, and Tim A. Ma-jchrzak. "Evaluating cross-platform development approaches for mobile applications." Web Information Systems and Tech-nologies. Springer Berlin Heidelberg, 2013. 120-138.
[3]. About PhoneGap (2011),
[4]. Android Development Tools plugin for Eclipse (2012),
[5]. D Keuper, (s1019775, XNU a security evaluation), University of Twente and Certified Secure, December 13, 2012.

Paper Type : Research Paper
Title : Implementation of English-Text to Marathi-Speech (ETMS) Synthesizer
Country : India
Authors : Sunil S. Nimbhore || Ghanshyam D. Ramteke || Rakesh J. Ramteke

Abstract: This paper describes the Implementation of Natural Sounding Speech Synthesizer for Marathi Language using English Script. The natural synthesizer is developed using unit selection on the basis of concatenative synthesis approach. The purpose of this synthesizer is to produce natural sound in Marathi language by computer. The natural Marathi words and sentences have been acquired by 'Marathi Wordnet' because all Marathi linguists are referred Wordnet. In this system, around 28,580 syllables, natural words and sentences were used. These natural syllables have been spoken by one female speaker. The voice signals were recorded through standard Sennheiser HD449 Wired Headphone using PRAAT tool with sampling frequency of 22 KHz. The ETMS-system was tested and generated the natural output as well as waveform. The formant frequencies (F1, F2 and F3) were also determined by MATLAB and PRAAT tools. The formant frequencies results are to be found satisfactory.

Keywords: Formant Frequency, Natural Synthesizer, Concatenative, LPC, Speech Corpus

[1]. A. Watanabe, "Formant estimation method using inverse-filter control, " IEEE Trans. Speech and Audio Processing, vol. 9, 2001, pp. 317-326.
[2]. Roy C. Snell and Fausto Milinazzo, "Formant location from LPC analysis data", IEEE Transaction on Speech and Audio Processing, Vol.1, No-2, 1993.
[3]. R.K. Bansal, and J.B. Harrison, "Spoken English for India, a Manual of Speech and Phonetics'", Orient Longman, 1972.
[4]. Aimilios Chalamandaris, Sotiris Karabetsos, "A Unit Selection Text-to-Speech Synthesis System Optimized for Use with Screen Readers", IEEE Transactions on Consumer Electronics, Vol. 56, No. 3, 2010, pp.1890-1897.
[5]. Akemi Iida, Nick Campbell," A database design for a concatenative speech synthesis system for the disabled", ISCA, ITRW on Speech Synthesis, 2001.
[6]. A.Chauhan, Vineet Chauhan, Gagandeep Singh, Chhavi Choudhary, Priyanshu Arya, "Design and Development of a Text-To-Speech Synthesizer System", IJECT Vol. 2, Issue 3, Sept. 2011.

Paper Type : Research Paper
Title : Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Country : India
Authors : Manas Srivastava || C.Jawahar Sandeep

Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wireless sensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, it is crucial for them to efficiently use their battery resources. Most of the existing power-saving protocols achieve power savings by periodically putting sensor nodes to sleep. Such a regular sleep/awake mechanism fails to adjust a sensor node's snooze period based on its traffic congestion, thus causing either inferior power efficacy or higher latency. Furthermore, sensors may be positioned in antagonistic atmospheres and may thus surprisingly fail. Most power-saving protocols do not promptly react to such link breakage, resulting in long transmission delays. This paper, proposes a quorum-based medium access control (QMAC) protocol that enables sensor nodes to snooze longer under light loads. As the flow is towards the sink node i.e., the next-hop group, is also proposed to reduce transmission latency. Results authenticate that the planned QMAC hoards more energy and keeps the communication potential low.

Keywords: QMAC, Quorums, Latency

[1]. Geetha V, K.Chandrasekaran, A Distributed Trust Based Secure Communication Framework for Wireless Sensor Networks, Scientific Research An Academic Publisher/Wireless Sensors Network.
[2]. Mekkaoui Kheireddine, Rahmoun Abdellatif, Analysis Of Hops Length in Wireless Sensor Networks, Scientific Research An Academic Publisher/Wireless Sensors Network.
[3]. Waltenegus Dargie, Christian Poellabauer, Fundamentals of Wireless Sensor Networks (Wiley Publications ISBN-13 978-0470997659, ISBN-10 04070997656
[4]. Robert Faludi, Building Wireless Sensors Networks (O'Reilly Media Print ISBN 978-0-596-80773-3)
[5]. Massimo Vecchio, Wireless Sensor Networks: Novel approaches to distributed data aggregation and compression (Vdm Verlag Publishers ISBN – 10 3639039998
[6]. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks (Wiley Publications ISBN – 10: 0470095105 ISBN –13: 978-0470095102

Paper Type : Research Paper
Title : Mining Of Big Data Using Map-Reduce Theorem
Country : India
Authors : Manas Srivastava || C.Sabarinathan || Rishi Sankineni || Manoj TM

Abstract: Big Data can be defined as the large data that has a continuous evolving property and is quite complex in nature, problems related to Big Data can't be solved using normal processing algorithms and techniques. This paper presents a Map Reduce theorem for efficient extraction of large and complex data. This application can be used in large volume of data storage system. In this all the modules are totally dependent on the graph methodology that satisfies the processing model, storage systems are directly connected to the cloud platform and thus all the queries passed will be answered in the server engine. MP libraries are written in many programming languages and thus it supports portability. In all the current data driven approaches we are thus been using the original dimensional data stream that can thus propose up a work structure for participating in the current neutral data streams order and process for taking in the normal data from the servers that has to be extracted . Thus, using MP Libraries it can thus provide a higher and more reliable approach of taking up the data in the current form of usual transmission that are thus more implied to higher data streams.

Keywords: Map Reduce, HDFS, Big Query, HACE, Autonomous, Apache Tomcat

[1]. Viktor Mayer-Schonberger Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think (English) ISBN-10 – 1848547900, ISBN-13 9781848547902
[2]. Davenport, Big Data At Work, ISBN-10 1422168166, ISBN-13 9781422168165
[3]. Gokula Mishra , Robert Stackowiak , Keith Laker , Khader Mohiuddin , Bruce Nelson , Tom Plunkett , Helen Sun , Mark F. Hornick , Debra L. Harding , Brian Macdonald , David Segleau, Oracle Big Data Handbook : Plan and Implement an Enterprise Big Data Infrastructure (English) 1st Edition, ISBN-10 9351343154, ISBN-13 9789351343158
[4]. Vignesh Prajapati, Big Data Analytics with R and Hadoop (English) 1st Edition, ISBN-10 9351104109, ISBN-139789351104100
[5]. Phil Simon, Too Big to Ignore : The Business Case for Big Data (English), ISBN-8126543256, ISBN-13 9788126543250
[6]. Daniel G. Murray, Tableau Your Data! : Fast and Easy Visual Analysis with Tableau Software (English), ISBN-108126551399, ISBN-13 9788126551392
[7]. Christopher Price , Adam Jorgensen , James Rowland-Jones , Brian Mitchell , John Welch , Dan Clark, Microsoft Big Data Solutions(English) 1st Edition, ISBN-10 8126548762, ISBN-13 97881265448767

Paper Type : Research Paper
Title : A Location Dependent Cryptographic Approach Based on Target Coordinate & Distance Tolerant Key transfer for GPS mobile Receiver
Country : India
Authors : Sourish Mitra || Avijit Chakraborty || Arunabha Bhaumik || Joy Dewanjee || Mainak Maulik

Abstract: Independent location based cryptography technique ensures that after transferring encrypted data from sending end ,decryption can takes place at anywhere from receiving point of view. But according to demand of mobile users if we want to ensures more security at the time of data transfer in mobile communication we need location dependency .It means ,when we encrypt a particular data packet at sending end and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from a particular location (not from anywhere) specified by the sender by transferring location based coordinate target .In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate is incorporated with a random key for data encryption. The receiver can only decrypt the cipher text when the coordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficult to exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposed approach to increase its practicality. The security analysis shows that to probability to break our proposed algorithm is almost impossible since the length of the random key is adjustable.

Keywords: Location dependency, latitude/longitude, GPS, Distance tolerant, Target coordinates.

[1]. Jiang, J., 1996.Pipeline algorithms of RSA data encryption and data compression .In: proceeding IEEE International Conference on Communication Technology, 2:1008-1091
[2]. Lian, S., J.Sun,Z. Wang and Y. Dai ,2004.A fast video encryption technique based on chaos .In: Proceeding the 8th IEEE International Conference on Control , Automation ,Robotics and Vision, 1 :126-131.
[3]. Liao,H.C., P.C Lee , Y.H Chao and C.L Chen ,2007 .A location -dependent data encryption approach for enhancing mobile information system security .In:Proceeding the 9th International Conference on Advance Communication Technology, 1 :625-628.
[4]. McLoone , M. and J.V. McCanny , 2000.A high performance FPGA implementation of DES. In: Proceeding IEEE Workshop on Signal Processing Systems, pp:374-383.
[5]. Aikawa, M., K. Takaragi,S. Furuya and M. Sasamoto, 1998.A light weight encryption method suitable for copyright protection IEEE Trans. consumer Electron, 44:902-910.
[6]. Eagle, N. and A. Pentland, 2005. Social Serendipity: Mobilizing social software .IEEE Pervasive computing, pp:4.
[7]. Shaar, M., M. Saeb,M. Elmessiery and U . Badwi,2003.A Hybrid Hiding Encryption Algorithm (HHEA) for data documentation

Paper Type : Research Paper
Title : Face Image Restoration based on sample patterns using MLP Neural Network
Country : Iran
Authors : Mahdi Nadiri Andabili || Kaveh Kangarloo || Fardad Farokhi

Abstract:In this paper, a sample based face image restoration method using MLP neural networks is presented. First, an HR (High Restoration) image is changed to a number of LR (Low Resolution) images by the observation model. Then, using a set of patches extracted from HR & LR images the MLP network is trained. After the training, a model is created which can be used for restoration. The proposed algorithm has been applied on ORL database. The sensitivity of algorithm to geometry changes and noise level was studied. The results reveal that the proposed method had better results of statistical criteria and visual evidences respect to some other methods.
Keywords: Face, MLP Neural Network, Observation- Model, Image Restoration

[1]. Sh.Zhang and Y.LU , Image Resolution Enhancement Using a Hopfield Neural Network, International Conference on Information Technology , 2007 , 224-228.
[2]. A.J. Shah , Image Super Resolution-A Survey ,1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking, 2012 ,1-6.
[3]. V.H.Patil, D.S.Bormane, and V.S.Pawar, Super Resolution using Neural Network, Second Asia International Conference on Modelling & Simulation, 2008 , 492-496 .
[4]. P. Milanfar, Super-Resolution, 1(CRC Press is an imprint of Taylor & Francis Group, 2011), 1-24.
[5]. S. CHaudhuri , SUPER-RESOLUTION IMAGING, (Kluwer Academic Publishers, 2002 ) .
[6]. K.Nasrollahi and T.B.Moeslund, Super-resolution: a comprehensive survey, Machine Vision and Applications , , 2014, 1423–1468.
[7]. H.Huang , X.Fan , Ch.Qi and Sh.H.Zhu , A learning based POCS algorithm for face image super resolution reconstruction, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, 2005, 5071-5076.

Paper Type : Research Paper
Title : Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protection in Data Mining
Country : India
Authors : Cynthia Selvi.P || Mohamed Shanavas.A.R

Abstract: Privacy Preserving Data Mining(PPDM) is an emerging research area. Its objective is to extend the traditional data mining techniques to work with transformed data while protecting confidential information with minimized loss of privacy and information. In other words PPDM techniques aimed at modifying the original data while still being able to recover the data mining results from the modified data. This article analyses the existing PPDM techniques and presents the analysis of the proposed algorithms in the research work.

Keywords: Cover, privacy preservation, restrictive patterns, sanitization, sensitive transactions, victim transactions

[1]. V.Verykios, E.Bertino, I.N.Favino, L.P.Provenza, Y.Saygin, and Y.Theodoridis. "State-of-the-art in privacy preserving data minin", SIGMOD Record, Vol. 33, No. 1, 2004.
[2]. R.Bayardo, R.Agrawal, "Data Privacy Through Optimal k-Anonymization", In Proceedings the 21st International Conference on Data Engineering, pp.217-228, 2005.
[3]. K.Lefevre, J.Dewittd, R.Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity", In Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp.49-60, 2005.
[4]. B.Fung, K.Wang, P.Yu, "Top-down Specialization for Information and Privacy Preservation", In Proceedings of the 21st IEEE International Conference on Data Engineering, pp.205-216, 2005.
[5]. R.Agrawal, R.Srikant,"Privacy-Preserving Data Mining", ACM SIGMOD Record (29): 439-450, 2000.
[6]. A.Evfimievski, R.Srikant, R.Agarwal, Gehrke, "Privacy Preserving mining of association rules", Proceedings of 8th ACM SIGKDD international conference on Knowledge discovery and data mining, Alberta, Canada, p.217-28, 2002.
[7]. M.Atallah, E.Bertino, A.Elamagarmid, M.Ibrahim and V.Verykios, "Disclosure Limitation of Sensitive Rules", In Proc. of IEEE knowledge and Data Engg.workshop, p.45-52, Chicogo, Illinois, Nov.1999.
[8]. E.Dessani, V.S.Verykios, A.K.Elamagarmid and E.Bertino, "Hiding association rules by using confidence and support", In 4th information hiding workshop, p.369-383, Pitsburg, PA, Apr 2001.

Researcher can also search IOSR published article contents through

IOSR Xplore