IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. – Dec. 2015 Volume 17 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays
Country : India
Authors : Reshma.V.M || Linda Sara Mathew

Abstract: Essays are used to evalaute student's knowledge from early before itself. The aim of the proposed system is to evalaute the handwritten essays automatically. The proposed method is to develope an automated system to to evaluate handwritten student essays. For a single topic under study the students may refer more than one study material. According to the similarity of the contents a reference study material is constructed. The reference study material is used to evaluate the handwritten essays. The scanned image of the handwritten essays are used as the input in the proposed method. From the image texts are extracted for the evaluation. The Longest Common Subsequence (LCS) is used for the proposed system.

Keywords – Longest Common Subsequence

[1] Tuomo Kakkonen and Erik krisutinen, "Automatic Assessment of the Content of Essays Based on Course materials", Dept of Computer Science and Engineering
[2] Lynn Streeter and Others, " The Credible Grading Machine: Automated Essay Scoring in DOD"
[3] Semire Dikhi, " An Overview of Automated Scoring of Essays", Turkish Online Journal of Distance Education –TOJDE, January 2006, Vol: 7, No:1, Aritcle: 5
[4] Tuomo Kokken and Others, " Comparison of Dimension Reduction Methods for Automated Essay Grading", Educational Technology and Society, 11(3), PP: 275-288, 2008

Paper Type : Research Paper
Title : A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition;
Country : India
Authors : Swapnali Krushnarao Londhe || Megha Dilip Jagtap || Ranjeet Ravindra Shinde || P.P. Belsare

Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing integrity of that data. In this research encryption and decryption scheme is used based on image pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel. For that purpose we use m*n size image on which different operations are performed. This algorithm was implemented in java language. Keywords: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key

[1]. Pratik Shrivastava, Retesh jain, K.S.Raghu Wanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image,2014.
[2]. Quist Aphetsi Kester,MIEEE, Image Encryption based on the RGB PIXEL Transposition and Shuffling,2013.
[3]. Xiukum Li, Xianggian Wu* , Ning Qi, Kuanquan Wang.Anovel cryptographic Algorithm based on iris feature ,2008.
[4]. Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map", IJIGSP, vol.2, no.1, pp.61-68, 2010.
[5]. Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407, 21-22 July 2011
[6]. Christy, J.I.; Seenivasagam, V.; , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no., pp.1101-1108, 21-22 March 2011.

Paper Type : Research Paper
Title : WMNs: The Design and Analysis of Fair Scheduling
Country : India
Authors : M. Sudhakar || Vandana Khare

Abstract: In this paper an attempt has been made to address the matter of scheduling in wireless mesh networks. First, we offer a comparison of existing scheduling algorithms and then classify them based on the scheduling techniques in the degree of fairness and their implementation frameworks. Later we attempted good scheduling approach victimization multiple gateways. The projected scheduling approach consists of 4 necessary steps namely, demand tables, demand propagation in group generation and schedule generation. Simulation experiments area unit conducted to check the performance of fair scheduling with the strategy that doesn't use fair scheduling. The simulation results assert that the projected scheduling has superior performance with reference to the metrics used for performance analysis.

Keywords: WMN, QoS, Multiple Gateway, Mesh Router, Mesh Clients

[1] I. F. Akyildiz, X. Wang, and W. Wang. Wireless Mesh Networks: A Survey. Computer Networks Journal (Elsevier), 47(4), 2005. [2] P. Bahl, A. Balachandran, A. Miu, W. Russell, G. Voelker, and Y.M. Wang. PAWNs: Satisfying the Need for Ubiquitous Connectivity and Location Services. IEEE Personal Communications Magazine (PCS), 9(1), 2002.

[3] P. Bahl, A. Balachandran, and S. Venkatachary. Secure Wireless Internet Access in Public Places. In Proceedings of the IEEE Conference on Communications, 2001.

[4] Y. Bejerano, S.-J. Han, and L. Li. Fairness and Load Balancing in Wireless LANs Using Association Control. In Proceedings of MobiCom, 2004.

[5] P. Bjorklund, P. Varbrand, and D. Yuan. Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach. In Proceedings of INFOCOM, 2003.

[6] R. Bruno, M. Conti, and E. Gregori. Mesh Networks: Commodity Multihop Ad Hoc Networks. IEEE Communications Magazine, March 2005.

[7] N. Chiba and T. Nashizeki. Arboricity and Subgraph Listing Algorithms. SIAM J. Comput, 14, 1985.

Paper Type : Research Paper
Title : Generation of Search Based Test Data on Acceptability Testing Principle
Country : India
Authors : Dr.I.Surya Prabha || Dr.Chinthagunta Mukundha

Abstract: The main objective of this paper is to acquire the basic concepts related to automated search based test data generation. The use of Metaheuristic searching techniques for the automatic and generation of search based test data has been a burgeoning interest for many researchers in recent years. Metaheuristic searching techniques are much guaranted in regard to these problems. Metaheuristic searching techniques are high-level tools, which utilize heuristics to seek solutions for combinatorial problems at a considarable computational cost. Metaheuristic search techniques have been applied to automate search based test data generation for structural and functional testing. Evolutionary testing designates the use of metaheuristic search methods for test case generation.

[1] Mark Harman, "The Current State and Future of SBSE", Future of Software Engineering (FOSE'07), IEEE Computer Society, 2007, pp. 1-16.

[2] Phil McMinn, "Search-Based Software Test Data Generation: A Survey", Ph.D. Thesis,Software Testing, Verification and Reliability, 2004.

[3] Maha Alzabidi, Ajay Kumar, and A.D. Shaligram, "Automatic Software Structural Testing by Using Evolutionary Algorithms for Test Data Generations", IJCSNS International Journal of Computer Science and Network Security, VOL.9, No.4, April 2009.

[4] Kamran Ghani and John A. Clark, "Automatic Test Data Generation for Multiple Condition and MCDC Coverage", 2009 Fourth International Conference on Software Engineering Advances, 2009, pp. 152-157.

[5] Mark Harman, S. Afshin Mansouri and Yuanyuan Zhang, "Search Based Software Engineering: AComprehensive Analysis and Review of Trends, Techniques and Applications", April 9, 2009.

[6] J. Clark, J. J. Dolado, M. Harman, R. M. Hierons, B. Jones, M. Lumkin, B. Mitchell, S. Mancoridis, K. Rees, M. Roper,and M. Shepperd, "Reformulating Software Engineering as a Search Problem," IEE Proceedings - Software, vol. 150,no. 3, 2003, pp. 161–175.

Paper Type : Research Paper
Title : University Mobile Enrollment System: A Nigeria Perspective
Country : Nigeria
Authors : Blessing, O. Ogbuokiri || Monica, N. Agu

Abstract: The application of ICT in the Nigerian university system is taking up a revolutionary trend. This is especially given the fact that the ICT, if utilized well, is an indispensible tool in achieving enhanced learning environment. One consequence of the effective utilization of ICT is the integration of mobile phones and applications as a tool to facilitate admission and university entrance processes. The reason to have a mobile application is to give support for students where they can use any internet access at anytime, anywhere and anyplace. The objective of this paper therefore is to evaluate the success in utilizing a developed mobile application system for enrollment of students.

[1]. Ramos et al "COMPUTERIZE ENROLLMENT SYSTEM" B.Sc Research Study, College of Computer Study, Urdaneta City University,2011.
[2]. Academic Planning Division, "Twenty Years (1962-1982) of Academic Development in the Nigerian Federal, University System in: 20 Tears of University Education in Nigeria", pp. 84-90. NUC, 1988.
[3]. Adesina, Segun; "Planning and Educational Development in Nigeria". Lagos: Educational Industries Nigeria Ltd., pp. 163-186. 1977.
[4]. National Universities Commission: "25 Years of Centralised University Education in Higeria". Lagos: N.U.C. 1988.
[5]. National Universities Commission: Annual Reports: June 1977 to June 1978. July 1978 to December 1982. January 1985 to December 1986. January 1987 to December 1987.

Paper Type : Research Paper
Title : Implementing bigdata analytics for small and medium enterprise (SME) regional growth
Country : Nigeria
Authors : Ogbuokiri, B.O.(MSc.) || Udanor C.N. (PhD) || Agu, M.N. (PhD)

Abstract: In all economies, especially in developing and transition economies, there is now a consensus among state policy makers, development economists as well as international development partners that small and medium enterprises (SMEs) are a potent driving force for their industrial growth and indeed, overall economic development. In recent times, the concept of Big Data has been seen as a new solution to help in policy and practice in all sorts of application context and domains. The impact of abundance data collected and stored over a number of years by various organisations both public and private has led to many innovative data analytics technologies.

[1]. Margaret Rouse (2011) small to medium enterprise (SME), Business intelligence - business analytics retrieved from Accessed Wednesday, June 17, 2015 by 2:57pm GMT+1
[2]. Southard jones (2014) Retrieved from
[3]. Sonia Buchholtz, MaciejBukowski, AleksanderŚniegocki(2014), Big and open data in Europe -A growth engine or a missed opportunity?‖,Warsaw Institute for Economic Studies, report commissioned by demosEUROPA, 2014
[4]. Gabriella Catteneo (2014), The European Data Market, IDC presentation given at the NESSI summit in Brussels on 27 May 2014, available online at:
[5]. Andrew SsegawaKiggundu (2013), How can Big Data benefit SME's in developing African Countries?, MSc. Thesis, Univesity of Botswana.

Paper Type : Research Paper
Title : Ndsp: Neighbor Assisted Distributed Self-Healing Protocol for Compromised Node Recovery in Wireless Sensor Networks
Country : India
Authors : Silochana Devi || RohitVaid

Abstract: Wireless sensors network (WSN) is collection of sensors nodes and a base station. All the sensor nodes in the network collect data from the environment and sent this data to the base station (BS). This data is transmitted in hope by hope fashion, i.e. each sensor sent the data to its one hope neighbor in the direction of BS on wireless medium. As themedium is wireless which is already less securedthus more prone to attacks. Therefore security is one of the major issues in WSN. An adversary is a node which steals information stored in the memory of sensor nodes. This paper presentsa neighbor assisted distributed self-healing protocol (NDSP) for compromised node recoveryin wireless sensor networks.

[1] . V. Naik, S. Bapat, and M. Gouda, Whisper, "local secret maintenance in sensor networks," in Principles of Dependable System, 2003.
[2] . Hu, F.and Sharma, N. 2005,"Security considerations in ad hoc sensor networks, "Ad Hoc Networks (Elsevier) 3, 1, 69–89.
[3] . R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik," data survival in unattended sensor networks," in IEEE PERCOM'08, March 2008.
[4] . G. Itkis and L. Reyzin, Sibir, "signer-base intrusion-resilient signatures." in Crypto'02, 2003.
[5] . Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-insulated public key cryptosystems," in Eurocrypt'02, May 2002.
[6] . MA, D. and Tsudik, G. "DISH: Distributed self-healing in unattended wireless sensor networks". In 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS‟08). 47–62, 2008.

Paper Type : Research Paper
Title : Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
Country : India
Authors : Sara Salman SelimanAlsafi || Ashraf Gasim Elsid Abdalla || AminBabiker A/Nabi Mustafa

Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is implemented to simulate the proposed algorithm it is basedon windows for random distribution numbers such as Poisson distribution functionfor traffic generation and uniform distribution for mobile location using MATLAB. The parameters taken in this proposed simulation model are: number of user, type of traffic, user class and user bandwidth. The results of the simulation indicate that the new algorithm increases the bandwidth availability in the lower data rate network and this reduces the congestion in the high data network.

[2]. Dr. Anwar M. Mousa"Prospective of Fifth Generation MobileCommunication" University of Palestine,Gaza- Palestine.
[3]. "5G Mobile Technologies"
[5]. Metis project presentation (general overview 25/3/2013) Disclaimer .some of the icons used in the METIS project presentation are owned by Eriksson. They will be later removed and replaced by METIS specific icons.
[6]. Data communication and computer network PHI learning retrieved 10 July 2011.
[7]. V. B. Iverson, "Tele traffic engineering and network planning," Technical University of Denmark, Technical University of Denmark Building 343, May 2010. [Online]. Available: .

Paper Type : Research Paper
Title : Effects of Occupational Stress on Work Performance of Police Officers in Nakuru Police Division, Kenya
Country : Kenya
Authors : Ezra Odondi Jonyo

Abstract: fully functioning police service is vital for maintenance of peace, provision of security, and enforcement of a country's laws. The work performance of police officers in Nakuru and other divisions in Kenya has been below the expectations of the public over the recent years. Performance is affected by factors such as training, job satisfaction, career progression, remuneration, recognition, working environment, standard operating procedures, facilities and equipments, management style and occupational stress. The study examined the effects of occupational stress on work performance of police officers in Nakuru police division.

[1]. Aaron, J. (2000). Stress and Coping in Police Officers. Police Quarterly, 3, 428−450. Amnesty International (2013). Police reform in Kenya: A drop in the ocean. Amnesty International Publication.
[2]. Abbas, H. (2012). Stabilizing Pakistan through police reform. A report by the society independent commission on Pakistan police reform. Asia society 725 Park View, New York.
[3]. Allison, P. ( 2002). Missing Data. Sage Ltd, New York.
[4]. Alnaqbi, W. (2011). The relationship between human resource practices and employee retention in public organisations: An exploratory study conducted in the United Arab Emirates. Unpublished PHD Thesis, Edith Cowan University.
[5]. Amstrong, M & Baron, (2006). Human resource management practice. Kogan Page Publishers.
[6]. Anshel, M. H. (2000). A conceptual model and implications for coping with stressful events in police work. Criminal Justice and Behavior, 27, 375–400.

Paper Type : Research Paper
Title : Incorporation of GlobalIssue factors in SDLC by using Inverse Requirement
Country : Pakistan
Authors : Maham Tariq || Akmal Rehan || Raheela Nasim

Abstract: Approval of the project depends on the user's fulfillment and that is just accomplished when the item satisfies client's necessities and requests. Accuracy of necessities assumes a critical part in software development. In the event that the prerequisites are not clear or not totally gathered then the actual product can't be accomplished. The research portrays that the vast majority of the engineers focus just to the organizational needs or to the functionalities of the requested product and less to the user's prerequisites or interface requirements with which user needs to connect. Software Engineering (SE) manages the "workable product", and the research shows that the primary center of Software Engineering (SE) manages the "Functional Requirements".

[1]. R.A. Majid, N.L.M. Noor, W.A.W. AdnanandS. Mansur, A survey on User Involvement in Software Development Life Cycle from Practitioner's Perspectives,Conference: IEEE publications, 2010,240-243.
[2]. S.M. Buttand W.F.W. Ahmed, Overview of System Design And Development with Regards to the Involvement of User, HCI and Software Engineers,International Journal of Computer Application, 58(7),2012, 1-4.
[3]. R.R. Young, Requirements Engineering Handbook(London: Artech House, Inc. 2004).
[4]. S.M. Faridi, T. Mustafa andF. Jan, Human Persuasion Integration in Software Development Lifecycle (SDLC),IJCSI International Journal of Computer Science Issues, 9(4), 2012, 65-68.
[5]. S. Singh and A. Dix,Software Engineering and HCI,University of South Africa, South Africa & Dix, A. Lancaster University. UK: Idea Group Inc. 2006, 548-552.

Paper Type : Research Paper
Title : A Study on Learning Factor Analysis – An Educational Data Mining Technique for Student Knowledge Modeling
Country : India
Authors : S. Lakshmi Prabha || Dr.A.R.Mohamed Shanavas

Abstract: The increase in dissemination of interactive e-learning environments has allowed the collection of large repositories of data. The new emerging field, Educational Data Mining (EDM) concerns with developing methods to discover knowledge from data collected from e-learning and educational environments. EDM can be applied in modeling user knowledge, user behavior and user experience in e-learning platforms. This paper explains how Learning Factor Analysis (LFA), a data mining method is used for evaluating cognitive model and analyzing student-tutor log data for knowledge modeling. Also illustrates how learning curves can be used for visualizing the performance of the students. Keywords: e-learning, Educational Data Mining (EDM), Learning Factor Analysis (LFA)

[1] Baker, R. S. J. d., ( 2011), "Data Mining for Education." In International Encyclopedia of Education, 3rd ed., Edited by B. McGaw, P. Peterson, and E. Baker. Oxford, UK: Elsevier.

[2] Baker, R. S. J. D., and K. Yacef, ( 2009), "The State of Educational Data Mining in 2009: A Review and Future Visions." Journal of Educational Data Mining 1 (1): 3–17.

Paper Type : Research Paper
Title : MANCAFChat - An Application to Evaluate MANCAF Framework
Country : India
Authors : Mr. Hardik S. Mehta || Dr. Dhaval R. Kathiriya

Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication services. This paper describes the implementation of MANCAF framework by developing collaborative application named MANCAFChat. It was designed based on the MANCAF framework. The main purpose behind the design of such application is to evaluate the effectiveness of MANCAF framework and usefulness of collaborative application.

Keywords: Collaborative Application, MANCAF Framework, MANET

[1] Baecker, R., "Readings in Groupware and Computer Supported Cooperative Work", Morgan Kaufmann, San Mateo CA, ISBN 1-55860-241-0, 1993
[2] Duchamp, D., "Issues in Wireless Mobile Computing", Proc. Third Workshop on Workstation Operating Systems, Key Biscayne, Florida, U.S.A., pp 2-10, 1992
[3] Brinck, Tom's CSCW and Groupware Page

Researcher can also search IOSR published article contents through

IOSR Xplore