IOSR Journal of Computer Engineering (IOSR-JCE)

July – Aug. 2015 Volume 17 - Issue 4

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Country : India
Authors : K V Umashankar || Dr.C.Chanadrasekar

Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.However, bandwidth effective sensor node is not effective in improving the energy-saving protocol in wireless sensor network. The wake-up process with high energy consumption leads to maximal overhead count on packet transmission channel. To reduce the energy consumption in wireless sensor network, Energy Efficient Traffic Routing based on the Point Synchronization Fitness Functioning (EETR-PSFF)mechanism is proposed in this paper.

[1]. Ruqiang Yan, Hanghang Sun and YuningQian, "Energy-Aware Sensor Node Design With Its Application in Wireless Sensor Networks," IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 62, NO. 5, MAY 2013
[2]. GholamHosseinEkbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S, "Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks," Computer Networks., Elsevier journal
[3]. KoushikSinha, Bhabani P. Sinha, and DebasishDatta," An Energy-Efficient Communication Scheme forWireless Networks:A Redundant Radix-Based Approach", IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011
[4]. EyuphanBulut, Ibrahim Korpeoglu," Sleep scheduling with expected common coverage in wirelesssensor networks", Wireless Networks, Springer, July 2010

Paper Type : Research Paper
Title : Name Entity Detection and Relation Extraction from Unstructured Data by N-gram Features on Hidden Markov Model and Kernel Approach
Country : India
Authors : Naincy Priya || Amanpreet Kaur

Abstract: In recent years Name entity extraction and linking have received much attention. However, correct classification of entities and proper linking among these entities is a major challenge for researcher. We propose an approach for entities and their relation extraction with feature including lexicon, n-gram and parts of speech clustering and then apply hidden markov model for entity extraction and CRF with kernel approach to detect relationship among these entities.

[1]. Daljit Kaur and Ashish Verma, Name Entity Recognition by New Framework using Machine learning Algorithm, IOSR Journal of Computer Engineering, Volume 16, Issue 5, Ver. IV, September-October 2014.
[2]. Navneet Kaur AulaKh and Er.Yadwinder kaur , Review Paper on Name Entity Recognition of Machine Translation, International journal of advanced Research in computer science and software engineering, Volume 4, Issue 4, April 2014.
[3]. Roman Prokofyev, Gianluca Demartini, and Phillipe Curde Mauroux Effective Named Entity Recognition for Idiosyncratic Web Collections, International World Wide Web Conference Committee, April 7–11, 2014.
[4]. Abhishek Gattani, Digvijay S. Lamba, Nikesh Garera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, Anand Rajaraman, Venky Harinarayan, AnHai Doan, Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach, International Conference on Very Large Data Bases, Vol. 6, No. 11, 26th- 30th August, 2013.

Paper Type : Research Paper
Title : Use of Non Monetary Incentives to Improve Service Delivery in Public Institutions In Tharaka Nithi County
Country : Kenya
Authors : Lucy Kagwiria Mwirigi || Florence Karambu Angaine

Abstract: Service delivery is of critical importance for the organisations which are offering services as their core product. It is what the clients pay for and determines their retention as well as growth and profitability of the organization. For public institutions, the quality of the service offered by them has not been of very keen interest due to the monopolistic nature of the services they offer and lack of incentives. Thus this study focused on use of non monetary incentives to improve service delivery in public institutions. The study will be useful to the public institution as well as other private and non-governmental institution in enhancing quality services. Descriptive research design was used.

[1]. Musungu, L. L. & Nasongo, J. W. (2008). The head-teacher‟s instructional role in academic achievement in secondary schools in Vihiga district, Kenya. Department of Educational Planning and Management, Kenya and Department of Educational Foundations, Masinde Muliro University of Science and Technology, Kenya
[2]. Allen and Cale (2013); "Financial Stability Analysis Using Aggregated Data".
[3]. Deshields W. Oscar , Kara Ali and Kaynak Erdener (2005) Determinants of business student satisfaction and retention in higher education: applying Herzberg's two‐factor theory [4]. Pollitt K., Allonisius G.A & Eliud H. (2004). Public Management Reform: A Comparative Analysis. Revised edition. Oxford: Oxford University Press.
[5]. Wendy P. & Mary M. (2006) Career Development and Systems Theory: Connecting Theory and Practice ,Sense Publishers

Paper Type : Research Paper
Title : A New Approach and Algorithm for Baseline Detection of Arabic Handwriting
Country : Saudi Arabia
Authors : Abdullah Baz || Mohammed Baz

Abstract: Automatic baseline detection of handwritten Arabic words is a crucial task for OCR. It is extensively used in many preprocessing processes such as text normalization, skew/slant correction, and letters segmentation. Due to its importance, many techniques and algorithms were proposed in the literature to meet this need. However, most of the proposed methods cannot correctly detect the baseline of words that are skewed, short, have stacked-letters, and/or have unbalanced letters sizes.

[1] Märgner, V.; El Abed, H., Guide to OCR for Arabic Scripts (Springer London).
[2] Lorigo, L.M.; Govindaraju, V., Offline Arabic handwriting recognition: a survey, Pattern Analysis and Machine Intelligence, IEEE Transactions on, 28(5), 2006, 712-724.
[3] Pechwitz, M.; Margner, V., Baseline estimation for Arabic handwritten words, Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop, 2002, 479-484.
[4] Farooq, F.; Govindaraju, V.; Perrone, M., Pre-processing methods for handwritten Arabic documents, Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on, 1(29), 2005, 267-271.
[5] Al-Shatnawi, A.; Omar, K., Detecting Arabic handwritten word baseline using Voronoi Diagram, Electrical Engineering and Informatics, 2009. ICEEI '09. International Conference on, 2009, 18-22.
[6] Abu-Ain, T.; Sheikh Abdullah, S.; Bataineh, B.; Omar, K.; Abu-Ein, A. A Novel Baseline Detection Method of Handwritten Arabic-Script Documents Based on Sub-Words, Soft Computing Applications and Intelligent Systems, Communications in Computer and Information Science, 67-77.

Paper Type : Research Paper
Title : Analysis of Iris Recognition Based On FAR and FRR Using Hough Transform
Country : India
Authors : Simranjit Kaur || Sourav Garg

Abstract: Iris recognition is an identification method of biometric that uses pattern-recognition techniques. It is one of the most biometrical techniques used for personal identification. In this paper, we give a brief overview of different methods used in iris recognition system and use houghman transform and rubber sheet method for increasing accuracy by calculating metrics like FAR and FRR.

Keywords: Biometrics, Canny edge detection, FAR, FRR, Houghman Transform, Normalization Basic Rubber Sheet Model

[1]. Namrata P. Joshi, Roopal K. Lamba, Devang U. Shah, Bhargav V. Ghadia, Implementation of Various Approaches for Iris Image Normalization, Institute Of Technology, Nirma University, Ahmedabad –382 481,IEEE,08-10 dec, 2011
[2]. J. Daugman, "How iris recognition works‟, Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002.
[3]. Emmanvel Raj.M.Chirchi, Dr.R.D.Kharadkar, Improvement of Iris Pattern Authentication System using Cumulative Sum Algorithm, International Journal of Engineering and Innovative Technology, ISSN: 2277-3754, Vol 2, Issue 5, Nov 2012.
[4]. Anu Sharma Dr. Vijay Kumar Banga, Improving Performance Of An Iris Recognition System Using Correlation Based Matching, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 4, April -2013.
[5]. Dolly Choudhary, Ajay Kumar Singh, Shamik Tiwari, A Statistical Approach for Iris Recognition Using K-NN Classifier, I.J. Image, Graphics and Signal Processing, 2013, 4, 46-52 Published Online April 2013 in MECS.
[6]. Alinka P. Takale, Vanaja Roselin. E.Chirchi, Iris Recognition: Cumsum Based CPA Approach, -International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume- 1, Issue- 5, July-2013.

Paper Type : Research Paper
Title : Fuzzy Logic based Individual Crop Advisory System based on Weather Input Data
Country : India
Authors : Swati P. Pawar || Sarika A Hajare || Prajakta A. Satarkar

Abstract: Weather has the most significant influence on agriculture. Various weather phenomenon such as cloudiness, precipitation, temperature, and wind have significant influence on agri-management decisions, management practices and cost of cultivation. Therefore, there is need for development of crop specific advisory to an individiual farmers based on various crop parameters such as type of crop, age of crop, location of crop etc. However, existing advisories are region specific and gives vague advisory and also not available for specific location. This paper is focused on giving overview of development of fuzzy logic based to generate automatic advisory based on type of crop, location of crop and age of the crop.

[1]. V. Rao., G. Rao., A. Rao., & M.K. Rao., (2009) ―Synergizing agro meteorology for managing future agricultural in India‖ Journal of Agro meteorology 11 (Special Issue) : 11-17.
[2]. Rathore L., Parvinder M., (2008) ―Project Report on Economic Impact Assessment of Agrometerological advisory Service of NCMRWF‖ National Centre for Medium Range Weather Forecasting, Ministry of Earth Sciences, Government of India.
[3]. Anurag., Diwan Singh., and Surender singh., (2009) ―Application of Geographical Information System in agrometeorology‖ Journal of Agrometeorology 11, 208-216.
[4]. Surender Singh., Diwan Singh., and V Rao., (2009) ―Web based Agrometeorological information system for sustainable agricultural development‖, Journal of Agrometeorology 11, 234-237.
[5]. Weiss A., Van L., and Bernardi M., (2000) ―Communicating agrometeorological information to farming communities‖, Agricultural and Forest Meteorology 103, 185–196.
[6]. Sue Walker., ―Dissemination of Agrometeorological Information‖, University of the Free State, Bloemfontein, South Africa, 145-155.

Paper Type : Research Paper
Title : Data Hiding Inside the Image Using Uniform Embedding Techniques
Country : India
Authors : J. S. Harini

Abstract: The main aim of steganography is to hide data in the text media such as image, text, audio and video so that it cannot be identified by others. One of the advantages of steganography is that it can be used to transmit the secret messages without knowing the fact of transmission being discovered.

[1]. (Piyush Goel),Data Hiding in Digital Images: A Steganographic Paradigm
[2]. (Dr. Oleg Victorov), Enhancement of A Steganographic algorithm for Hiding Text Messages in Images

Paper Type : Research Paper
Title : An Improved Feature Vector storage metric for fast Android Malware Detection Framework
Country : India
Authors : Mohit Sharma || Meenu Chawla || Vinesh Jain || Jyoti Gajrani

Abstract: Android based devices are rapidly flourishing day-by-day, due to its ease of use and popularity. As a result, the number of malware attacks on Android is also increasing. This paper is based on the Text Mining approach for analyzing Android malware families. The proposed methodology is motivated by the method introduced by Guillermo Suarez-Tangil which aims to automate malware analysis process based on DENDROID. The main issue in this regard is the storage of Family Feature Vectors (FFV) which is stored as sparse matrix. Therefore, this work presents a novel concept of Compressed Row Storage (CRS) to store the statistical features intellectually.

[1] "IDC", "Smartphone OS Market Share, Q1 2015",
[2] Khalid Alfalqi, Rubayyi Alghamdi and Mofareh Waqdan: Android Platform Malware Analysis, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 1, 2015.
[3] Android Introduction: Platform Overview, Mihail L. Sichitiu, 2011 SECURITY RESPONSE: Mobile Adware and Malware Analysis: Symantec 2013.
[4] Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez and Jorge BlascoAlis: Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families. Expert Systems with Applications, Elsevier, July 2013.
[5] androguard, Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja!),

Paper Type : Research Paper
Title : PAPR Reduction in OFDM Model
Country : India
Authors : Er.Stephy Gupta || Er. Rajnish Kansal

Abstract: Multipath reflects the signal with different phases. The best solution of multipath fading is OFDM.Orthogonal frequency division multiplexing (OFDM) has been focused on in high data rate wireless communication research. But the high peak to average power ratio (PAPR) is one of the main obstacles of OFDM. For better transmission, even single – carrier waves are being replaced by multi – carriers. Multi carrier systems like CDMA and OFDM. In the OFDM system, orthogonally placed sub – carriers are used to carry the data from the transmitter end to the receiver end. Presence of guard band in this system deals with the problem of ISI. . But the large Peak – to – Average Power Ratio of these signal have some undesirable effects on the system.

Keywords: OFDM, PAPR, CCDF, Multipath fading, BER.

[1]. M. Schwartz, "Mobile Wireless Communications" Cambridge University Press, 2005.
[2]. Tao Jiang and Yiyan Wu,"AnOverview: Peak to Average power Ratio Reduction Techniques for OFDM signals", IEEE Transactionon Broadcasting, Vol.54, no.2, 2008,pp.257-268.
[3]. S. H. Han, J. H. Lee, "An Overview of Peak – to – Average Power Ratio Reduction Techniques for Multicarrier Transmission", IEEE Transaction on Wireless Communication, April 2005.
[4]. D. Gerakoulis; P.Salmi. "An interference suppressing OFDM system for wireless communications," ICC 2002. IEEE International Conference onCommun. YoU, pp.480-484, 2010.
[5]. Cherif Rezgui, Slaheddine Jarboui –"A PAPR reduction technique based on Golay sequences and Fractional Fourier Transform for OFDM Systems", 2012 IEEE

Paper Type : Research Paper
Title : A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
Country : India
Authors : Er.Kamaldeep Kaur || Er. Simranjit Kaur Dhindsa

Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anomaly or intrusion is presented. . This paper proposes genetic algorithm and fuzzy to generate that are able to detect anomalies and some specific intrusions. The goal of intrusion detection is to monitor network activities automatically, detect malicious attacks and to establish a proper architecture of the computer network security. Experimental results demonstrate that we can achieve better running time and accuracy with these modifications.

Keywords: anomaly, clustering, fuzzy algorithm, fuzzy set., genetic algorithm, intrusion detection.

[1]. Shingo Mabu, Member, IEEE, Ci Chen, Nannan Lu, Kaoru Shimada,and Kotaro Hirasawa, Member, IEEE, "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming" in January 2011.
[2]. Monowar H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita , "Network Anomaly Detection: Methods, Systems and Tools" in 2014.
[3]. Z. Bankovi´c, D. Stepanovi´c, S. Bojani´c, and O. Nieto-Taladriz, "Improving network security using genetic algorithm approach," Comput. Elect.Eng., vol. 33, pp. 438–451, 2007.
[4]. A. Sundaram, "An introduction to intrusion detection," Crossroads,vol. 2, no. 4, pp. 3–7, April 1996.
[5]. V. Chandola, A. Banerjee, and V. Kumar, "Anomaly Detection : A Survey," ACM Computing Surveys, vol. 41, no. 3, pp. 15:1–15:58,September 2009.

Paper Type : Research Paper
Title : A Genetic Algorithm For Scheduling JobsWith Burst Time And Priorities
Country : India
Authors : Shuchi Juyal Bhadula || Bhanvi Rohilla || Bhaskar Nautiyal

Abstract: Scheduling play extremely important role in our day-to-day life, same as the performance of system is highly affected by the CPU scheduling. For the better scheduling the performance is depend upon the parameter of jobs (arrival time, burst time, priority etc). In this paper we proposed a method for process scheduling using a deadline aware approximation algorithm (Genetic Algorithm) to provide efficient process scheduling, where required schedule is nearby or equal to SJF schedule. We made a comparison among PreemptivePriority algorithm, Preemptive SJF algorithm and GA in terms of number of test case and Total-Turnaround-Time (TAT). The results demonstrate that GA approach produces solutions very close to the optimal SJF algorithm and far better than Priority algorithm.

Keywords: CPU Scheduling, Optimization, Genetic Algorithm, Crossover.

[1]. D. E. Goldberg, Genetic Algorithms in Search. Optimization and Machine Learning, Addison Wesley, 1989.
[2]. J. H. Holland, Adaptation in Natural and Artificial Systems. Ann Arbor, MI: Univ. Michigan Press, 1975.
[3]. K. A. De Jong, ―Adaptive system design: A genetic approach,‖ IEEE Trans. Syst., Man, Cybern., vol. SMC-10, pp. 566–574, 1980.
[4]. Linet Ozdamar, ―A Genetic Algorithm Approach to a General Category Project Scheduling Problem‖ IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 29, NO. 1, FEBRUARY 1999.
[5]. Annie S. Wu, Han Yu, Shiyuan Jin, Kuo-Chi Lin, and Guy Schiavone, Member, IEEE, ―An Incremental Genetic Algorithm Approach to Multiprocessor Scheduling‖, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 15, NO. 9, SEPTEMBER 2004.

Paper Type : Research Paper
Title : Integration of Search Interfaces in Deep Web Databases for Specific Domains
Country : India
Authors : Deepak Kumar || Dhanesh kumar || Dr. Mahesh Kumar

Abstract: The amount of information on Deep Web is growing rapidly, as most of the organizations put their content online behind the search forms. The information behind the search forms is often of very high quality and can be extremely valuable to many users. Therefore there has been increased interest in retrieval of deep web data. The conventional crawlers retrieve only publicly indexable web ignoring the large amount of high quality information deep behind search forms hence there is a need to build a deep web crawler that can crawl to deep web. But the main challenge for a deep web crawler is to model a query interface and to generate meaningful queries for the search interfaces.

[1]. A. K. Sharma, Komal Kumar Bhatia: "Automated Discovery of Task Oriented Search Interfaces through Augmented Hypertext Documents" accepted at First International Conference on Web Engineering & Application (ICWA2006).
[2]. A.K.Sharma and Komal Kumar Bhatia, A Framework for Domain-Specific Interface Mapper (DSIM)
[3]. AnHai Doan:Learning to Map between Structured Representations of Data. PhD thesis, University of Washington..
[4]. Luciano Barbosa, Juliana Freire, "Combining Classifiers to Identify Online Databases", WWW2007/track
[5]. T. Mitchell. Machine Learning. McGraw Hill, 1997.

Paper Type : Research Paper
Title : New Dynamical Key Dependent S-Box based on chaotic maps
Country : Iraq
Authors : F. J. Luma || H. S. Hilal || A. Ekhlas

Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear S-boxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems. In In this paper, an efficient method for designing dynamical key dependent S-boxes based on 2D logistic map and 2D cross map. S-box is a nonlinear transformation where each byte of the State is replaced by another byte using the substitution table. Each individual byte of State is mapped into a new byte by using 2D cat map. One S-box is used for each message.

[1]. Jakimoski G, Kocarev L. ―Chaos and cryptography: block encryption ciphers‖. IEEE Trans Circ Syst—I 2001;48(2):163–9 boxes based on chaotic maps, Chaos Solitons Fractals, 23(2): 413-419.
[2]. Tang, G., X. Liao and Y. Chen, 2005. ―A novel method cryptography for designing S-boxes based on chaotic maps‖, Chaos 40(1): 505-519. Solitons Fractals, 23(2): 413-419.
[3]. Tang, G. and X. Liao, 2005. ―A method for dynamical S-boxes based on discretized chaotic map‖, Chaos Solitons Fractals, 23(5): 1901-1909.
[4]. Chen, G., Y. Chen and X. Liao, 2007. ―An extended method for obtaining S-boxes based on three- dimensional chaotic baker maps‖, Chaos Solitons Fractals, 31(3): 571-579.
[5]. Muhammad Asim et al. "Efficient and Simple Method for Designing Chaotic S-Boxes‖, ETRI Journal, Volume 30, Number 1, February 2008.

Researcher can also search IOSR published article contents through

IOSR Xplore