IOSR Journal of Computer Engineering (IOSR-JCE)

Mar – Apr. 2015 Volume 17 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Review of Mobile Ad Hoc Network Protocols
Country : Nigeria
Authors : Afolayan A. Obiniyi || Oyenike Mary Olanrewaju

Abstract: Mobile Ad-hoc Network is one of the types of Wireless Ad-Hoc Networks which has distinguished characteristics. It is a self-configuring, decentralized and infrastructure less wireless network where mobile nodes in such a network communicate with each other through wireless links. Since the nodes can move around, routing in such a setup is always a challenge. To overcome this challenge of routing as a prerequisite to network communication, the Mobile Ad hoc Networking (MANET) routing protocols must establish an efficient route between network nodes. It should also be able to adjust efficiently to the frequently varying topology of moving nodes. In this paper, the main characteristics and the research challenge of routing in MANET, which may be considered in designing various routing protocols were discussed. Various MANET protocols surveyed and their classification; proactive, reactive and hybrid discussed. The review also present the strength and weaknesses of some specific protocols, discuss the various extensions made to the major protocols by researchers in this field and itemized out areas of future research work.

Keywords: Hybrid, MANET, Protocols, proactive, Reactive

[1]. Kurose J. F. and Ross W. K (2013) Computer Networking, A Top-Down Approach Copyright © 2013, Pearson Education, Inc., publishing as Addison-Wesley.
[2]. Gaurav Sachan, D. K. Sharma, Karishma Tyagi, Abhimanyu Prasad (2013) Enhanced Energy Aware Geographic Routing Protocol in MANET: A Review International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-845-848 ISSN: 2249-6645
[3]. Gang Wang and Guodong Wang(2010), An Energy Aware Geographic Routing Protocol for Mobile Ad Hoc Networks, Int J Software informatics, Vol. 4, No. 2, June 2010, pp. 183-196.
[4]. Behrouz A. Forouzan and Sophia Chung Fegan(2007) Data Communications And Networking Fourth Edition Mc Graw Hill Higher Education ISBN 978-0-07-296775-3
[5]. Pranshu Sakalley, J. Ratnaraja Kumar(2013) Review and Analysis of Various Mobile Ad Hoc Network Routing Protocols, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-5, November 2013


Paper Type : Research Paper
Title : IVRS and DTMF based Voting System
Country : India
Authors : Anisha Sachdev || Nidhi Shetty || Mansi Nagdev

Abstract: A Voting System will be developed where a person can vote using a cell phone. A phone connected to the voting system, will decode the DTMF pulses sent by another phone (mobile/landline) belonging to the voter. There will be two databases, 1st will keep record of voter's information and 2nd will about the electing parties. The voter will call the number assigned to the IVRS voting system, which will instruct the user how to proceed further. Then the voter will enter his/her password. If he/she is authenticated then he/she will be allowed to vote. If the person has already voted then his record will be updated as "voted" in the database. An Admin will log into the system and begin the system. After the voting time period is over, reports will be generated showing the results of election, which will be seen by the admin.

Keywords: Intereactive Voice Response, Dual Tone Multi Frequency.

[1]. Ankit Anand, Pallavi Divya, An Efficient Online Voting System, International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2631-2634.
[2]. G.O. Ofori-Dwumfuo and E. Paatey Methodist University College, Ghana, The Design of an Electronic Voting System, Research Journal of Information Technology 3(2): 91-98, 2011 ISSN: 2041-3114.
[3]. Kosuke Hashizumea, Tuan Phung-Duc, Shoji Kasaharaa and Yutaka Takahashia, Queueing Analysis of Internet-Based Call Centers with Interactive Voice Response and Redial, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[4]. http://www.polar-electric.com/DTMF/Index.html
[5]. http://www.engineersgarage.com/tutorials/dtmf-dual-tone-multiple-frequency
[6]. http://en.wikipedia.org/wiki/Dual-tone_multi-frequency_signaling


Paper Type : Research Paper
Title : Bandwidth Management on Cloud Computing Network
Country : Sudan
Authors : Eng.Randa Ibrahim Mohammed Ibnouf || Dr.Amin Babiker A/Nabi Mustafa

Abstract: To be able to manage the available bandwidth and distribute it among the Cloud Applications users effectively is a very critical issue to avoid network congestion and network resources abuse. In this paper we will explore a mechanism that enables us to distribute the bandwidth more effectively and in a smart way on cloud service for CBS Company. The Cloud Application users were divided into three distinctive groups of network consumption capacity, each capacity is determined as per actual work done and the bandwidth is determined accordingly. We monitored the network performance for all the three groups, to make sure of the quality of the network service. The results showed that we had succeeded through our mechanism to manage the bandwidth in an ideal way that granted to us the maximum usage of the cloud service.

Key work: Bandwidth, Cloud computing, Response time, Network traffic, Monitoring

[1]. http://www.tomsitpro.com/cloud_bandwdith

[2]. http://sdu.ictp.it/lowbandwidth/

[3]. http://searchenterprisewan.techtarget.com

[4]. http://www.ithound.com


Paper Type : Research Paper
Title : Optical Character Recognition (OCR) System
Country : India
Authors : Najib Ali Mohamed Isheawy || Habibul Hasan

Abstract: In the running world, there is growing demand for the software systems to recognize characters in computer system when information is scanned through paper documents as we know that we have number of newspapers and books which are in printed format related to different subjects. These days there is a huge demand in "storing the information available in these paper documents in to a computer storage disk and then later reusing this information by searching process". One simple way to store information in these paper documents in to computer system is to first scan the documents and then store them as IMAGES. But to reuse this information it is very difficult to read the individual contents and searching the contents form these documents line-by-line and word-by-word. The reason for this difficulty is the font characteristics of the characters in paper documents are different to font of the characters in computer system. As a result, computer is unable to recognize the characters while reading them. This concept of storing the contents of paper documents in computer storage place and then reading and searching the content is called DOCUMENT PROCESSING. Sometimes in this document processing we need to process the information that is related to languages other than the English in the world. For this document processing we need a software system called CHARCATER RECOGNITION SYSTEM. This process is also called DOCUMENT IMAGE ANALYSIS (DIA).

Keywords: Optical Character Recognition, Neural Network, Fuzzy Logic

[1]. ShamikSural,P.K.Das,Recognition of an Indian Script using Multilayer Perceptrons and Fuzzy Features Sixth International
Conference on Document Analysis and Recognition (ICDAR2001), Seattle, 2001, pp. 1120-1124.
[2]. MamtaMaloo, Dr. K.V. Kale, Gujarati Script Recognition: A Review, IJCSI International Journal of Computer Science Issues, Vol .
8, Issue 4, No 1, July 2011 ISSN (Online): 1694-0814
[3]. Sujata S. Magare and Ratnadeep R. Deshmukh, Offline Handwritten Sanskrit Character Recognition Using Hough Transform and
Euclidean Distance, International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 10 No. 2 Oct. 2014, pp. 2-
302
[4]. Rajiv Kapoor, AmitDhamija, A New Method for Identification of Partially Similar Indian Scripts, International Journal of Image
Processing (IJIP), Volume (6) : Issue (2) : 2012
[5]. Swapnil A. Vaidya, Balaji R. Bombade, A Novel Approach of Handwritten Character Recognition using Positional Feature
Extraction, IJCSMC, Vol. 2, Issue. 6, June 2013, pg.179 – 186
[6]. ImanYousif, Adnan Shaout, Off-Line Handwriting Arabic Text Recognition: A Survey, Volume 4, Issue 9, September 2014 ISSN:
2277 128X International Journal of Advanced Research in Computer Science and Software Engineering


Paper Type : Research Paper
Title : Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Country : Nigeria
Authors : Nwogu Emeka Reginald

Abstract: This work discusses electronic voting for the Nigerian electoral system, modeling a two-level hierarchical architecture that includes the national and state level infrastructure. This solves most of the electoral challenge in the country. The system proposed is a form of Public Network Direct Recording Electronic Voting System (PNDRE Voting System) that run on a Virtual Private Network (VPN) implemented on the existing General System for Mobile (GSM) communication network infrastructure. It makes use of asymmetric cryptography, with the preferred protocol being RSA algorithm running on a Public Key Infrastructure (PKI) that enables the various communicating units of the system to be authenticated for information exchange; making it impossible for attackers to break into the system. Smartcards are used as voter accreditation tokens, with every prospective voter having to first register by supplying their biological and voting information to the Voter Information Database. This allows very good mobility and flexibility on the system, as voters can register and cast their votes at different polling stations other than where they were registered. The system is proposed with the good ergonomics, allowing even non ICT compliant persons to use it efficiently.

Keywords: E – Voting, Public Key Infrastructure, Electronic Voting System, Electronic Voter Register, Voter Information Database, Smartcard.

[1]. G.O. Ofori-Dwumfuo and E. Paatey (2011), The Design of an Electronic Voting System, Research Journal of Information Technology 3(2): 91-98, ISSN: 2041-3114
[2]. Marco Ramilli (2008) Designing A New Electronic Voting System. M.Sc Thesis Alma Mater Studiorum - University of Bologna
[3]. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein (2001), Introduction to Algorithms, second edition.MIT press and MC Graw Hill
[4]. A.V.N.Krishna (2009), Performance Evaluation of New Encryption Algorithms with Emphasis on Probabilistic Encryption & Time Stamp in Network Security. Department of Computer Science and Engineering, Acharya Nagarjuna University, Nagarjuna Nagar – 522 510 Andhra Pradesh, India
[5]. Ane Divine Jinor (2011), Pro-active Architecture and Implementation of a Secure Online Banking System that Uses Fingerprint Data as Part of Client Side Digital Signatures. M.Sc Thesis, Information Technology University of Copenhagen, ftware Development Technology Department
[6]. Abu-Shanab E., Knight M. and Refai H. (2010) E-Voting Systems: a Tool for E-Democracy, Management Research and Practice Vol. 2 Issue 3, pp: 264-274
[7]. Kuye C.O, Coker J.O, Ogundeinde I.A and Coker C.A. (2013), Design and Analysis of Electronic Voting System in Nigeria, International Archive of Applied Sciences and Technology IAAST; Vol 4 [2]: 15-20


Paper Type : Research Paper
Title : Privacy Protection in Distributed Industrial System
Country : India
Authors : P.Sheela Rani || B.Malavika || D.Menaka

Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense) can be exposed to serious cyber threats, many people still think that the same countermeasures, developed to protect general-purpose computer networks, can be effectively adopted also in those situations where a physical system is managed/controlled through some distributed Information and Communication Technology (ICT) infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in the last decade, and more frequently in the very recent past, have dramatically shown. Experts in this area know very well that often the peculiarities of industrial networks prevent the adoption of classical approaches to their security and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy. This paper is a contribution, from the security point of view, to the assessment of the current situation of a wide class of industrial distributed computing systems. In particular, the analysis presented in this paper takes into account the process of ensuring a satisfactory degree of security for a distributed industrial system, with respect to some key elements such as the system characteristics, the current state of the art of standardization and the adoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined, acceptable threshold.

Keywords: Industrial networks, information security, network security, risk assessment, security analysis and monitoring, security countermeasures.

[1]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007.
[2]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008.
[3]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005.
[4]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2011.
[5]. Security for Industrial Automation and Control Systems Part 1: Termi-nology, Concepts, Models, ANSI/ISA Std. 99.00.01-2007.
[6]. K. Stouffer, J. Falco, and K. Scarfone, ―Guide to Industrial Control Systems (ICS) Security,‖ NIST SP 800-82, 2008.
[7]. D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, ―Security for industrial control systems,‖ Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005.
[8]. G. N. Ericsson, ―Cyber security and power system communica-tion—Essential parts of a smart grid infrastructure,‖ IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501–1507, Aug. 2010.


Paper Type : Research Paper
Title : A Survey on Research work in Educational Data Mining
Country : India
Authors : D.Fatima || Dr.Sameen Fatima || Dr.A.V.Krishna Prasad

Abstract: Educational Data Mining is an emerging discipline that focuses on applying Data Mining tools and techniques to educationally related data. The discipline focuses on analyzing educational data to develop models for improving learning experiences and institutional effectiveness. A literature review on educational data mining follows, which covers topics such as student retention and attrition, personal recommender systems with in education and how data mining can be used to analyze course management system data. Gaps in the current literature and opportunities for further research are presented.

Keywords: Data mining, Educational Data Mining, Student Modelling, Student Retention, Recommendation Systems, Learning Experience etc.

[1]. C. Romero, S. Ventura, Educational data mining: A survey from 1995 to 2005
[2]. Agrawal, R., Imielinski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on management of data, Washington, DC (pp. 207–216).
[3]. Agrawal, R., & Srikant, R. (1995). Mining sequential patterns. In Eleventh international conference on data engineering (pp. 3–14). Taipei, Taiwan: IEEE Computer Society Press.
[4]. Arroyo, I., Murray, T., Woolf, B., & Beal, C. (2004). Inferring unobservable learning variables from students' help seeking behaviour. In Intelligent tutoring systems (pp. 782–784).
[5]. Baker, R., Corbett, A., & Koedinger, K. (2004). Detecting student misuse of intelligent tutoring systems. In Intelligent tutoring systems (pp. 531– 540).
[6]. Beck, J., & Woolf, B. (2000). High-level student modelling with machine learning. In Intelligent tutoring systems (pp. 584–593).


Paper Type : Research Paper
Title : A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
Country : India
Authors : S.Aakasham || S.R.Mugunthan

Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time transmission for wireless application. But it stream including critical mission application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment (EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion-detection, overhead, transmission delay. Index Terms: Hybrid Wireless Networks, Mobile ad-hoc network (MANET), Quality of Service (QoS), QoS-Oriented Distributed Routing Protocol (QOD), Enhanced Adaptive ACKnowledgment (EAACK)

[1]. H. Wu and X. Jia, ―QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks,‖ Ad Hoc Networks, vol. 5, pp. 600-612, 2009.
[2]. H. Luo, R. Ramjeey, P. Sinhaz, L. Liy, and S. Lu, ―UCAN: A Unified Cell and Ad-Hoc Network Architecture,‖ Proc. ACM MobiCom, 2003.
[3]. P.K. Mckinley, H. Xu, A. Esfahanian, and L.M. Ni, ―Unicast-Based Multicast Communication in Wormhole-Routed Direct Networks,‖ IEEE Trans. Parallel Data and Distributed Systems, vol. 5, no. 12, pp. 1252-1265, Dec. 1992.
[4]. H. Wu, C. Qiao, S. De, and O. Tonguz, ―Integrated Cell and Ad Hoc Relaying Systems: iCAR,‖ IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5]. J. Zhou and Y.R. Yang, ―PAR CelS: Pervasive Ad-Hoc Relaying for Cell Systems,‖ Proc. IFIP Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2002.
[6]. R. Braden, D. Clark, and S. Shenker, Integrated Services in the Internet Architecture: An Overview, IETF RFC 1633, 1994.


Paper Type : Research Paper
Title : A Secure Framework for Cloud Computing With Multi-cloud Service Providers
Country : India
Authors : Monali Shrawankar || Prof. Mahendra Sahare

Abstract: Cloud computing conveys IT assets as a Service over web. The point of interest of cloud computing is everlasting anyway it brings a ton of issues together with security. ensuring the security of cloud computing may be a premier consider the computing climate, as clients generally store touchy data with cloud storage suppliers, however these suppliers could likewise be untrusted Customers don't have to lose their delicate data attributable to malignant insiders and programmers inside the cloud. Furthermore, the loss of administration accessibility has created a few issues for an oversized scope of as of late. Information interruption system create a few issues for the clients of distributed computing. The inverse issues like data burglary, data lost should be overcome to supply higher administrations to the customers.

[1]. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, 34(1), 2011, pp 1-11.
[2]. "Cloud security An enterprise perspective" Hewlett-Packard Development Company, L.P. The information, 2012. Available from https://h30613.www3.hp.com/media/files/.../BB237 _Nielson.pdf
[3]. O.P. Verma, "Performance analysis of data Encryption Algorithm", IEEE 3rd International Conference on Electronics Computer Technology (ICECT), vol.5, April 2011, pp. 399-403.
[4]. R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Communications of the ACM, vol. 21, No.2, 1978, pp. 120-126.
[5]. Miller, "Uses of elliptic curves in cryptography", Advances in cryptology-CRYPTO '85, Lecture Notes in Computer science, 1986, pp. 417- 426.
[6]. M. Vukolic,"The Byzantine empire in the intercloud", ACM SIGACT News, 41,2010, pp. 105-111


Paper Type : Research Paper
Title : Virtualization: A Sustainable Resource Management Strategy in Computing Practices
Country : Nigeria
Authors : Olaitan O. Afolabi || Ibrahim K. Ogundoyin

Abstract: Many computing practitioners are challenged with resource inefficiencies and insufficiencies emanating from poor management strategy. In order to reduce complexity and risk while improving productivity, practitioners need to virtualize their resources. Virtualization of devices allows fast installation of applications and reduces cost of procuring equipments and time spent on placing orders, delivery and set-up. The socio-political ramifications of global warming requiring good corporate citizens to meet greenhouse gas reduction targets, creates an added incentive for virtualization. This paper unleashes the many potentials of virtualization technology and explores how it promises to address much of the problems confronting computing practices. The results of the analysis of survey obtained from the industry-leading virtualization software company (VMware) ascertained virtualization as a solution for sufficiency and efficiency in computing practices as the main objectives of this paper.

Keywords: Computing, Efficiency, Sufficiency, Technology, Virtualization

[1]. T. Burger, Mar. 2012, "The advantages of using virtualization technology in the enterprise", https://software.intel.com/enus/
articles/the-advantages-of-using-virtualization-technology-in-the-enterprise
[2]. A. Murphy, Dec. 2007, "Virtualization defined eight different ways", https://f5.com/resources/white-papers/virtualization-definedeight-
different-ways
[3]. O. Afolabi, J. Uhomoibhi, Studies of energy use, green IT practices and the role of entrepreneurship in higher engineering education
in Nigeria, Proc. ICEER2014 –McMaster Conf, Hamilton, Ontario, Canada, 2014, 208-209
[4]. L. McCabe, May 2009, "What is Virtualization, and Why Should You Care?",
http://www.smallbusinesscomputing.com/testdrive/article.php/3819231/What-is-Virtualization-and-Why-Should-You-Care.htm
[5]. T. Toperczer, 2011, "Video Conferencing 2.0", http://pubs.royle.com/publication/?i=73978&p=12

Researcher can also search IOSR published article contents through

IOSR Xplore