IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. – Dec. 2015 Volume 17 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Sentiment analysis for improving healthcare system for women
Country : India
Authors : Jeyalakshmi Jeyabalan || Sindhuja Manivasagam || Poornimathi Krishnan || Sreesubha Soundarrajan || Anitha Jaikumar

Abstract: The system proposes a feedback mechanism wherein, sentiment analysis is performed from surveys and tweets based on prevailing health issues among adult women in India and the social opinion on prevalent health issues is analyzed, and measures are taken to create awareness using email, SMS, blog, forum posts or web site posts. The system focuses on study of opinions and subjects discussed in the forum. Sentiment analysis is performed on this genre and if positive emotions are asserted, then awareness programs can be initiated for Thyroid issues and Stress Control. Periodically current issues are initiated and Sentiment analysis is performed, consequently awareness initiatives are created. Thereby, helping the performance improvement of healthcare initiatives.

[1] Ms. Gaurangi Patil, Ms. Varsha Galande, Mr. Vedant Kekan, Ms. Kalpana Dange, ―Sentiment Analysis Using Support Vector Machine‖, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014, pp - 2607-2612
[2] Balamurali A R, Aditya Joshi Pushpak Bhattacharyya, ―HarnessingWordNet Senses for Supervised Sentiment Classification‖, Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, Edinburgh, Scotland, UK, July 27–31, 2011, pp- 1081–1091.
[3] Aditya Joshi, Johan T. Halseth, Pentti Kanerva, ―Language Recognition Using Random Indexing‖, Under Review As A Conference Paper At Iclr 2015, pp 1-7.


Paper Type : Research Paper
Title : A survey on Fully Homomorphic Encryption
Country : India
Authors : Siddhi Khamitkar

Abstract: Cloud computing is an ever-growing field in today's era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption, which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully homomorphic encryption and patially homomorphic encryption

[1] Simon Fau,CarolaineFontaine,CarlosAnguilar-Melchor,GuyGogniat, "Towards practical program execution over fully homomorphic encyption schemes". IEEE,Eighth international conference on P2P, parallel, grid, cloud and internet computing,2013.
[2] Craig Gentry, "Fully homomorphic encryption using ideal lattices",Proceedings of the 41st annual ACM symposium on theory of computing,2009.
[3] C.Gentry,V.Vaikuntanathan "Fully Homomorphic Encryption over the integers ",in EUROCRYPT(LNCS)vol.6110,2010.
[4] C.AnguilarMelchor,S.Fau,C.Fontaine,G.Gogniat and R.Sirdey "Recent advances in homomorphic encryption:A possible future for signal processing in the encrypted domain,IEEE signal process.Mag.,30(2).,108-117 ",2013
[5] Henning Perl,Michael Brenner and Matthew Smith,"Poster:An implementation of the fully homomorphic Smart Vercauterancryptosystem",ACM conference on Computer and Communications Security,page 837-840,2011.


Paper Type : Research Paper
Title : Review on Green Networking Solutions
Country : India
Authors : Mansi Virani

Abstract: Empirical studies have revealed that a significant amount of energy is lost unnecessarily in the network architectures, protocols, routers and various other network devices. Thus there is a need for techniques to obtain green networking in the computer architecture which can lead to energy saving. Green networking is an emerging phenomenon in the computer industry because of its economic and environmental benefits. Saving energy leads to cost-cutting and lower emission of greenhouse gases which are apparently one of the major threats to the environment. 'Greening' as the name suggests is the process of constructing network architecture in such a way so as to avoid unnecessary loss of power and energy due its various components and can be implemented using various techniques out of which four are mentioned in this review paper, namely Adaptive link rate (ALR), Dynamic Voltage and Frequency scaling(DVFS), Interface proxying and energy aware applications and software.

Keywords: Green networking, Adaptive link rate (ALR), Greening, Interface Proxying, Dynamic voltage and frequency scaling (DVFS), Energy aware applications, Energy aware software, over-provisioning, selective connectedness, resource consolidation, proportional computing

[1] Kashif Bilal, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally, Dan Chen, A survey on Green communication using Adaptive Link Rate, North Dakota State University,USA, June 29,2012

[2] Aruna Prem Bianzino, Claude Chaudet, Dario Rossi, Jean-Louis, A survey of green networking research, Rougier Institute TELECOM, TELECOM ParisTech, CNRS LTCI UMR 5141, Paris, France, August,2012

[3] Diary R. Suleiman, Muhammed A. Ibrahim, Ibrahim I. Hamarash, Dynamic voltage frequency scaling (DVFS) for microprocessors power and energy reduction, University of Salahaddin-Hawler, Eril,Iraq


Paper Type : Research Paper
Title : Adaptive Digital Filter Design for Linear Noise Cancellation Using Neural Networks
Country : India
Authors : Nikhil Verma || Rajesh Mehra

Abstract: Noise is the most serious issue in the filters and adaptive filters are subjected to this unwanted component. This paper deals with the problem of the adaptive noise and various adaptive algorithms functions which when implemented practically shows that the noise is cancelled or removed by the neural network approach using the exact random basis function. The adaptive filters are used to control the noise and it has a linear input and output characteristics. This approach is done so as to get the minimum possible error so that to obtain the error free desired signal. The designed filter will reduce this noise from measured signal by a reference signal which is highly correlated with the noise signal. This approach gives excellent result for this signal processing technique that removes or eliminates the linear noise from the different functions. The simulation results are also mentioned so as to gives a vivid idea of reduced noise using neural networks algorithm.

Keywords: Adaptive filter, Exact Random Basis Function (RBF), Linear Noise Cancellation, Neural Networks.

[1]. Divyesh Mistry, A.V. Kulkarni, "Noise Cancellation using Adaptive Filter Base On Neural Networks", ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE), Volume -1, Issue -3, pp.87-91, 2013.
[2]. Ramanpreet Kaur, Simarpreet Kaur, "Neural Networks Approach for Adaptive Noise Cancellation", International Journal of Information Technology and Knowledge Management, Volume - 4, Issue - 2, pp. 455-457, 2011.
[3]. Salah, Mohamed, Abdel-Halim Zekry, and Mohammed Kamel. "FPGA implemenatation of LMS adaptive filter", 28th National Radio Science Conference (NRSC), pp 1-8, 2011.
[4]. Kalyan Chatterjee, Mandavi, Prasannjit, Nilotpal Mrinal, Vikash Kumar Saw, Kumari Rupmala, Priyadarshani,
"Adaptive Filtering and Voice Compression Using Neural Networks", International Journal of Soft Computing and Engineering (IJSCE), Volume-3, Issue-2, pp. 409-411 May 2013.
[5]. Anamika Sharma, Rajesh Mehra, "Adaptive Filter Design for Noise Reduction in Electrocardiography", International Journal of Emerging Technologies and Engineering (IJETE), Volume 2, pp. 110-114, 2014..


Paper Type : Research Paper
Title : Using Vaccination System to Achieve Health Quality Unifying Medical Vaccination Form (UMVS)
Country : Saudi Arabia
Authors : Dr.Osamah rababah || Sohayp Abo Alshamat

Abstract: We presenting all the possible services and more ideas compatible to my opinion and in same time help to improve community and general health. After deep discussion we decided to translate the traditional Vaccination Form and its manual set and register to form into E-vaccination system that give admin and assistance more control and quality services behind enable people to check what has been done . Vaccination is the important part life part for any person to prevent from diseases. we notice that part is doesn't have take best care from maker decision .In this documentation you will show how can combined between different domain in order to achieve full Hospital service .

[1]. http://www.kau.edu.sa/
[2]. http://www.alrajhibank.com.sa/ar/pages/default.aspx
[3]. http://en.wikipedia.org/wiki/Data
[4]. http://www.who.int/topics/immunization/en/
[5]. http://medical-dictionary.thefreedictionary.com/prevention
[6]. http://www.mediafire.com/view/?zt61bon26b8ssta
[7]. The webpage (KAU) http://www.kau.edu.sa/
[8]. Oracle webpage http://www.oracle.com/index.html


Paper Type : Research Paper
Title : Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Country : India
Authors : Dhanmeet Singh Kalra || Mohit Pal Singh Birdi2\

Abstract:Cloud computing is a new design structure for large, distributed data centers. Cloud computing system promises to offer end user "pay as go" model. To meet the expected quality requirements of users, cloud computing need to offer differentiated services to users. QoS differentiation is very important to satisfy different users with different QoS requirements. In this paper, various QoS based scheduling algorithms, scheduling parameters and the future scope of discussed algorithms have been studied. This paper summarizes various cloud scheduling algorithms, findings of algorithms, scheduling factors, type of scheduling and parameters considered.
Keywords- Cloud Scheduling, algorithms, Quality of service (QoS), Qda scheduling algorithm, Improved Cost Based, PAPRIKA, ANT Colony, Cmultiqosschedule algorithm, SHEFT Workflow , Job scheduling algorithm based on berger model.

[1] Sumit khurana, Anmol Gaurav Verma "Comparison of Cloud Computing Service Models: SaaS, PaaS, IaaS" IJECT Vol. 4, Issue Spl - 3, April - June 2013
[2] Syed Muhammad Ahsan. ―A framework for QoS computation in web service and techNology selection‖computer standards & Interfaces.2006,28(6),p.714-720.
[3] Yang, B., X. Xu, F. Tan and D.H. Park "An utility based job scheduling algorithm for cloud computing considering reliability factor" Proceedings of the 2011 International Conference on Cloud and Service Computing, IEEE Xplore Press.
[4] Huifang Li, Siyuan Ge, Lu Zhang "A QoS-based Scheduling Algorithm for Instance-intensive Workflows in Cloud Environment"26th Chinese Control and Decision Conference (CCDC) 978-1-4799-3708-0/14 2014 IEEE.
[5] S. Selvarani, G.S. Sadhasivam,"Improved Cost Based Algorithm for Task Scheduling In Cloud Computing", Computational Intelligence and Computing Research, pp. 1-5,2010.


Paper Type : Research Paper
Title : A Hybrid Algorithm Using Apriori Growth and Fp-Split Tree For Web Usage Mining
Country : India
Authors : Dr. Parvinder Singh || Vijay Dahiya

Abstract: Internet is the most active and happening part of everyone's life today. Almost every business or service or organization has its website and performance of the site is an important issue. Web usage mining based on web logs is an important methodology for optimizing website's performance over the internet. Different mining techniques like Apriori method, FP Tree methodology, K-Means method etc. have been proposed by different researchers in order to make the data mining more effective and efficient. Many people have modeled Apriori or FP Tree in their own way to increase data mining productiveness. Wu proposed Apriori Growth as a hybrid of Apriori and FP Tree algorithm and improved FP Tree by mining using Apriori and removed the complexity involved in FP Growth mining.

[1] Chin Fewng Lee and Tsung-HsienShen, "An FP-split method for fast association rules mining", IEEE 2005. Pp. 459-464.
[2] Bo Wu, Defu Zhang, QihuaLan, JieminZheng, "An Efficient Frequent Patterns Mining Algorithm based on Apriori Algorithm and the FP-tree Structure", Third 2008 International Conference on Convergence and Hybrid Information Technology, IEEE 2008.
[3] Anupam Joshi, Tim Finin, Akshay Java, Anubhav Kale, and PranamKolari, "Web (2.0) Mining: Analyzing Social Media", IEEE 2008.
[4] K. R. Suneetha, Dr. R. Krishnamoorthi, "Identifying User Behavior by Analyzing Web Server Access Log File", IJCSNS International Journal of Computer Science and Network Security. VOL.9 No.4, April 2009
[5] Mehdi Heydari, Raed Ali Helal, Khairil Imran Ghauth, "A Graph-Based Web Usage Mining Method Considering Client Side Data", 2009 International Conference on Electrical Engineering and Informatics, 2009.
[6] HuipingPeng, "Discovery of Interesting Association Rules Based on Web Usage Mining", 2010 - International Conference on Multimedia Communications.


Paper Type : Research Paper
Title : Role of Operational System Design in Data Warehouse Implementation: Identifying the Operational System Design Gaps and techniques to handle them
Country : India
Authors : Deepak Asrani || Renu Jain || Usha Saxena

Abstract: Data warehouse designing process takes input from operational system of the organization. Quality of data warehousing solution depends on design of operational system. Often, operational system implementations of organizations have some limitations. Thus, we cannot proceed for data warehouse designing so easily. In this paper, we have tried to investigate operational system of the organization for identifying such limitations and determine role of operational system design in the process of data warehouse design and implementation. We have worked out to find possible methods to handle such limitations and have proposed techniques to get a quality data warehousing solution under such limitations.

[1] Shahina Ferdous, Leonidas Fegaras, Fillia Makedon ―Applying Data Warehousing Technique in Pervasive Assistive Environment‖ PETRA'10, June 23–25, 2010, Samos, Greece. Copyright © 2010 ACM ISBN 978-1-4503-0071-1/10/06... $10.00

[2] Farrah Farooq, Syed Mansoor Sarwar ―Real-Time Data Warehousing For Business Intelligence‖ FIT '10, 21-DEC-2010, Islamabad, Pakistan Copyright © 2010 ACM 978-1-4503-0342

[3] Peter Wai Yee Wong*, Ric Hendrickson*, Haider Rizvi**, Steve Pratt* ―Performance Evaluation of Linux File Systems for Data Warehousing Workloads‖ INFOSCALE '06. Proceedings of the First International Conference on Scalable Information Systems, May 29-June 1 2006

[4] Matteo Golfarelli, Stefano Rizzi, Iuris Cella ―Beyond Data Warehousing:What's Next in Business Intelligence?‖ DOLAP'04, November 12–13, 2004, Washington, DC, USA.

[5] Chung-Min Chen Munir Cochinwala Elsa Yueh‖ Dealing with Slow-Evolving Fact: A Case Study on Inventory Data Warehousing‖ DOLAP 99 Kanas city MO USA Copyright 1999 ACM


Paper Type : Research Paper
Title : Payment of Bus Fare Using Handy Card
Country : India
Authors : Shobana.M || Vaishnavi.S || Linga Dilipan.G || Krithika.P

Abstract: There are abundant people in day to day life travelling in either government bus or private bus. The foremost delinquent that the user faces is that they don't get the remaining amount from the conductor that they give for bus fare. So that there is a loss in fractions to each and every individual. When the individual becomes to be hundreds of passengers, there is no account for this loss. To minimize the chance of losing even paisa by every bus passenger, the pre-payment of bus fares through CARDS methodology can be employed.

Keywords: Handy cards, POS

[1]. https://www.mastercard.com/us/company/en/docs/All_About_Payment_Cards.pdf
[2]. https://www.creditcards.com/credit-card-news/assets/HowACreditCardIsProcessed.pdf
[3]. http://www.cba.ca/contents/files/misc/msc_cctransactions_en.pdf
[4]. http://www.foodcourtbilling.com/
[5]. http://www.atsonline.in/foodcourtCard.htm
[6]. http://www.site.pftec.com/food-court-management.aspx


Paper Type : Research Paper
Title : Matlab Based Decimeter Design Analysis Wimax Appliacation
Country : India
Authors : Shaveta || Rajesh Mehra

Abstract: A Digital down Converter (DDC), which is basically used to convert an intermediate frequency (IF) signal to its baseband form, forms an integral part of wireless receivers. The major functional blocks of a DDC constitute a mixer, Numerically Controlled Oscillator (NCO) and an FIR filter chain. In this paper, We can comparison of two window and see the costs of all Window filters Keywords: Matlab, Filter, Interpolated,

1] Rajesh Mehra, Sumeet Prashar, Design and Analysis of Multirate Filter for Wimax Application International Journal of
Engineering Research and Development Volume 5, Issue 2 (December 2012), PP. 60-63
[3] Shalu Pandey, Surabhi Agrawal,Urvashi Agrahari 'FIR FILTERIMPLEMENTATION AND ITS PERFORMANCE ANALYSIS'
International Journal of Computer Applications (0975 – 8887) Volume 120, pp-18 , June 2015
[4] Altera (Accelerating DUC & DDC System Designs for WiMAX) may 2007, version 2.2
[5] Shrita G, A.R Aswatha, Design and Implementation of an Efficient 4G Digital down Converter used in Wireless Receiver Systems
International Journal of Computer Applications , Volume 120 ,pp.18, June 2015
[6] Altera (Accelerating DUC & DDC System Designs for WiMAX) may 2007,version 2.2


Paper Type : Research Paper
Title : An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-transmission
Country : India
Authors : Avanti Anarth || Ms.Rashmi Jain

Abstract: With the next-generation cellular networks making a transition toward smaller cells, two-hop orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory component in the 4G standards (WiMAX802.16j, 3GPP LTE-Adv.). Here we are using the multicasting strategy Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the latter forms the focus of this project. The main aim of this project is to improve the performance of the OFDMA based relay networks. The OFDMA transmission Scheme is a widely accepted scheme for improving the quality and speed of communication over the 4G cellular network.

[1] Karthikeyan Sundaresan, Senior Member, IEEE, and Sampath Rangarajan, Senior Member, IEEE, " Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks" 978-1-4799-4482-8/14/$31.00 ©2014 IEEE

[2] M. Herdin, "A chunk based OFDM amplify-and-forward relaying scheme for 4G mobile radio systems," in Proc. IEEE ICC, Jun. 2006, vol. 10, pp. 4507–4512.

[3] Hossein Barzegar,"Multicast scheduling for streaming video in single frequency networks"Master's Degree Project,Royal Institute of Technology,Stockholm,Sweden May 2011

[4] Prof.Loutfi Nuaymi,"WiMAX:Technology for Broadband Wireless Access"John Wiley & Sons, 23-Mar-2007-Technology & Engineering

[5] Yufeng Zhao,"Reducing power consumption by utilizing retransmission in short range wireless networks"local comp networks proceedings IEEE 10.1109/LCN.2002.1181826.

[6] Steven W. Peters and Robert W. Heath," The Future of WiMAX: Multihop Relaying with IEEE 802.16j" 0163-6804/09/$25.00 © 2009 IEEE.


Paper Type : Research Paper
Title : Secure System Password (SSP) Application for NT Editor Hacking Tool
Country : India
Authors : T.Sethupathy || P.Veni, S. Selwin Joseph || C. Sathya

Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the windows password when the system is in ON state. The password in SAM registry will be cleared or changed by using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the proposed system as an application. If the user wants to install new OS then the data in the hard disk will be encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password re-modification or clearing the password. Features in this application is, if the user hacks the application password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the access of the driver ports, until it is re-installed or the password is set right.

Keywords: Hacking, NT Editor Tool, SAM Register, Data encryption

[1]. http://wiki.cas.mcmaster.ca/index.php/Operating_Systems_Security
[2]. http://searchsecurity.techtarget.com/definition/hacker
[3]. https://en.wikipedia.org/wiki/Security_Account_Manager#cite_note-1
[4]. https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx
[5]. http://www.techrepublic.com/blog/windows-and-office/reset-lost-windows-passwords-with-offline-registry-editor/
[6]. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=563518


Paper Type : Research Paper
Title : An Enhanced Authentication System Using Face and Fingerprint Technologies
Country : Nigeria
Authors : Ogbuokiri, B. O. || Agu, M.N

Abstract: The primary aim of this paper is to develop an enhanced authentication system using a Cascaded-Link Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerprint verification systems by combining both. Experimental results demonstrate that the system performs well. It meets the response time as well as the accuracy required. Keywords: Multi-biometric, Face recognition, Fingerprint verification, Minutiae, pattern matching

[1] Tran, T.N. and Nguyen, T.H. Building a fingerprint recognition module and making it interact with the enrollment fingerprint application.MSc Thesis, HO CHI MINH CITY, 2012.

[2] Peter, M. C. and Claudia, I. Automatic Face Recognition Systemfor Hidden Markov Model Techniques, College of Engineering &Informatics,National University of Ireland Galway, Ireland, 2010.

[3] Adini, Y., Moses, Y. and Ullman, S. Face recognition: the problem of compensating for changes in illumination direction. IEEE Trans. on Pattern Analysis and Machine Intelligence, 19(7):721–732, 1997.

[4] Lee, H.C. and Giessen, R.E, Adcances in fingerprint technology, Elsevier, New York, 1991. [5] Henry, E. R., Classification and uses of fingerprints, London: Routledge ,2000.

[6] Ching-Tang, H., Eugene, Li., and You-Chuang, W., An effective algorithm for fingerprint image enhancement base on wavelet transform, Pattern Recognition vol. 36 pp. 303-312, 2003. [7] Zho, R. W., Quek, C. and NG, G. S., Novel single pass thinning algorithm, Pattern Recognition Letter, Vol. 16, pp. 1267-1275. 2005.



Researcher can also search IOSR published article contents through

IOSR Xplore