IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. – Dec. 2015 Volume 17 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Q-JSON - Reduced JSON schema with high Data Representation Efficiency
Country : India
Authors : Pratik Tyagi

Abstract: Mobility has already become the mainstream interface requirement for applications and the end users; this is forcing all applications/companies to adopt Web services [1] based architecture. But supporting mobility and the growing demand for better user experience comes with technical constraints such as memory space and lower data transfer rate. This paper proposes a new reduced JSON schema (Q-JSON) that improves data representation efficiency and thus improving on both constraints without any need of extra encoding/decoding. Proposed Q-JSON schema format normalizes the redundant data key information without compromising the actual business relevant information.

[1] Leonard Richardson, Sam Ruby, RESTful Web Services, Web services for the real world(O'Reilly Media,2007)
[2] JSON online: - ECMA-262 (ISO/IEC 16262), ECMAScript® Language Specification, 3rd edition (December 1999)
[3] Peter Aiken, M. David Allen, XML in Data Management (Elsevier,2004)
[4] Java Architecture for XML Binding (JAXB),

Paper Type : Research Paper
Title : Results for Web Graph Mining Base Recommender System for Query, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method
Country : India
Authors : Asst. Prof. Sonal Patil || Ankush Mahajan

Abstract: In Previous paper, We have already discussed a general framework on Web graphs mining based recommender system for Query, Image and Social Network using Query Suggestion Algorithm and Heat Diffusion Method. In this paper we are discussing final results on the same. 1) we first propose an general implementation of web graph mining base recommender system for Query, Image and social network suggestion 2) secondly we discuss results of Query and Image recommender system 3) And at the end we discuss the implementation and results of our recommendation system for social networks, which is an extension to our web graph mining base recommender system; Hao Ma, Irwin King et al in their paper "Mining Web Graphs for Recommendations" have proposed a system for query suggestion and image recommendation using heat diffusion by taking reference of that we are adding a social recommendation. Aim of this paper is to discuss the implementation and results for the proposed system.

Keywords: Recommendation, diffusion, query suggestion, image recommendation, social recommendation, Trust value.

[1]. Hao Ma, Irwin King and Michael Rung-Tsong Lyu, "Mining Web Graphs for Recommendations ", IEEE Transaction on knowledge and data engineering, Vol.24, No.6, June 2012.
[2]. Hao Ma, Haixuan Yang, Michael R. Lyu and Irwin King, "Mining Social Networks Using Heat Diffusion Processes for Marketing Candidates Selection", published in international conference on information and knowledge management – CIKM, 2008.
[3]. R.A. Baeza-Yates, C.A. Hurtado, and M. Mendoza," Query Recommendation Using Query Logs in Search Engines," Proc. Current Trends in Database Technology (EDBT) Workshops ,pp. 588-596, 2004
[4]. D. Beeferman and A. Berger, "Agglomerative Clustering of a Search Engine Query Log ,"KDD '00: Proc. Sixth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 407-416, 2000.
[5]. . J.S. Breese, D. Heckerman, and C. Kadie, "Empirical Analysis of Predictive Algorithms for Collaborative Filtering,"Proc. 14th Conf.Uncertainty in Artificial Intelligence (UAI),1998.
[6]. J. Canny, "Collaborative Filtering with Privacy via Factor Analysis," SIGIR '07: Proc. 25th Ann. Int'l ACM SIGIR Conf. Research and Development in Information Retrieval ,pp. 238-245, 2002.

Paper Type : Research Paper
Title : Design and Implementation of Thresholding Algorithm based on MFR for Retinal Fundus Images
Country : India
Authors : S. A. Jameel || Dr. A. R. Mohamed Shanavas

Abstract: In this paper, the entropy of maximum filter response (MFR) is applied followed by normalization and thresholding for retinal fundus image is used. The performance of our proposed method has been assessed on 23 images representing the publicly available dataset; High-Resolution Fundus (HRF) Image Database.

Keywords: Entropy, Fundus Image, Maximum filter response(MFR), Thresholding

[1]. Ramlugun, G. S., et al. Small retinal vessels extraction towards proliferative diabetic retinopathy screening. Expert Systems with Applications (2011), doi:10.1016/j.eswa.2011.07.115.
[2]. N. R. Pal and S.K. Pal, "Entropy: A New Defination and Its Applications", IEEE Transactions on systems, Man and Cybernetics, vol.21, No. 5, September 1991.
[3]. H. Yu, S. Barriga, C. Agurto, G. Zamora, W. Bauman, and P. Soliz, "Fast vessel segmentation in retinal images using multiscale enhancement and second-order local entropy," Proc. SPIE, vol. 8315, pp. 83151B-1–83151B-12, Feb. 2012.
[4]. Carnimeo, Leonarda, and Rosamaria Nitti. "On Classifying Diabetic Patients' with Proliferative Retinopathies via a Radial Basis Probabilistic Neural Network." Advanced Intelligent Computing Theories and Applications. Springer International Publishing, 2015. 115-126.
[5]. Zalev, Jason, and Michael C. Kolios. "Detecting abnormal vasculature from photoacoustic signals using wavelet-packet features." SPIE BiOS. International Society for Optics and Photonics, 2011.
[6]. Setacci, C., et al. "Diabetic patients: epidemiology and global impact." Journal of Cardiovascular Surgery 50.3 (2009): 263.
[7]. C. Chang, K. Chen, J. Wang, and M. Althouse, "A relative entropy-based approach to image thresholding," Pattern recognition, vol. 27, no. 9, pp. 1275–1289, 1994.

Paper Type : Research Paper
Title : Home Automation Using Mobile Communication
Country : India

Abstract: In the present paper we have designed and implemented a typical and simple Home Automation System using GSM (Global System for Mobile Communication) technology that controls electrical devices at home from a remote location by a simple mobile phone. This is achieved by sending an SMS to receiver present at home which is in turn connected to a hardware kit. The SMS received by the receiver is transmitted to the microcontroller which reads the message and controls the appropriate device. This operation is performed by program written in assembly language code that is stored in the flash memory which is in-built into the microcontroller. The practical implementation of the present prototype has been successful to control some electrical devices using an embedded circuit via SMS.

Keywords: Home Automation, GSM, Embedded System, Mobile Communication and Remote Control.

1. Shamim Akhter , Md. Abdur Rahman , Md. Ashrafur Rahaman, Razwan Kader, GSM-SMS technology for controlling home appliances remotely International Journal of Computer Aided Engineering and Technology Issue: Volume 1, Number 3 / 2009 Pages: 388 – 400
2. C. Douligeris, J. Khawand, C. Khawand, "Communications and Control for a Home Automation System"
3. Alheraish ; "Design and Implementation of Home Automation System"
4. A low cost GSM/GPRS based wireless home security system Yanbo Zhao Zhaohui Ye Dept. of Autom., Tsinghua Univ., Beijing Consumer Electronics, IEEE Transactions volume: 54 Issue: 2 On page(s): 567 – 572
5. MobileHomeAutomationAMIABABIDI@1998 Automation
7. "MOBILE CELLULAR TELECOMMUNICATIONS" - Analog and Digital Systems - by- William C.Y. Lee

Paper Type : Research Paper
Title : An Indepth Understanding of e-Procurement: A Case Study Approach
Country : India
Authors : Shaikh Imtiyaj || N.R Biswal || T.P Ray || Dr A.K Hota

Abstract: The science market has become open and accessible to all in the international community without any restriction; the rapid explosion in Information Technology has played a vital role in this mission. The use of Information Technology particularly web based internet applications to enhance the access to and delivery of government information and services to their citizens, public agencies, employees, business partners, financial institutions and government departments. The rapid growth of competition in the market and the consequent changes in economic conditions impose organizations and firms to implement new technologies to stay competitive.

[1]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , "Digital Signature Certificate: A blessing for e-Governance Application in Human Development", International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp 350-355,January 2015
[2]. William S.," Cryptography and Network Security, Principles and Practice", Prentice Hall of India, 2005.
[3]. Dhiren R. Patel ,"Information Security Theory and Practice" , 2008 Edition
[4]. Atul Kahate, "Cryptography and Network Security", Second Edition
[5]. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
[6]., last visited 07th Dec 2015
[7]. , last visited 07th Dec 2015

Paper Type : Research Paper
Title : A Review on Software Fault Detection and Prevention Mechanism in Software Development Activities
Country : India
Authors : B.Dhanalaxmi || Dr.G.Apparao Naidu || Dr.K.Anuradha

Abstract: The need of distributed and complex commercial applications in enterprise demands error free and quality application systems. This makes it extremely important in software development to develop quality and fault free software. It is also very important to design reliable and easy to maintain as it involves a lot of human efforts, cost and time during software life cycle. A software development process performs various activities to minimize the faults such as fault prediction, detection, prevention and correction. This paper presents a survey on current practices for software fault detection and prevention mechanisms in the software development. It also discusses the advantages and limitations of these mechanisms which relates to the quality product development and maintenance.

Keywords: Software development, Fault Detection, Fault Prevention, Software faults

[1]. A Monden, T Hayashi, S Shinoda, K Shirai, J Yoshida, M Barker and K Matsumoto, "Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing", IEEE Transactions on Software Engineering, DOI-098-5589, 2013.
[2]. Fadi Wedyan, Dalal Alrmuny and James M. Bieman, "The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction", ICST '09. International Conference, vol., no., pp.141,150, 1-4 April 2009.
[3]. S Liu, Y Chen, F Nagoya and J A. McDermid, "Formal Specification-Based Inspection for Verification of Programs", IEEE Transactions on software engineering, vol. 38, no. 5, september/october 2012.
[4]. Bronevetsky, G.; Laguna, I.; de Supinski, B.R.; Bagchi, S., "Automatic fault characterization via abnormality-enhanced classification," Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on , vol., no., pp.1,12, 25-28 June 2012
[5]. S Shivaji, E. J Whitehead Jr., R Akella and S Kim, "Reducing Features to Improve Code Change-Based Bug Prediction", IEEE Transactions on Software Engineering, Vol. 39, No. 4, April-2013.
[6]. S. Kim, E. Whitehead Jr., and Y. Zhang, "Classifying Software Changes: Clean or Buggy?" IEEE Trans. Software Eng., vol. 34, no. 2, pp. 181-196, Mar./Apr. 2008.

Paper Type : Research Paper
Title : A Compound Metric for Identification of Fault Prone Modules
Country : India
Authors : Ishleen Kaur

Abstract: Software Quality is a significant non-functional requirement that is not fulfilled by many software products. Faulty modules tend to degrade the software quality which may cause customer's dissatisfaction. Fault prone module prediction is an emerging area to improve the quality of the software and increase reliability of the system. Fault prone modules are predicted using various software metrics. In this paper, various metrics are investigated that have been used for fault prediction and the existing metrics are classified into three broad categories. Since no type of metric could accurately identify the fault prone modules, an integrated metric has been proposed to predict the fault prone modules.

Keywords: Decision tree, fault prone modules, software maintenance, software metrics, software quality, software testing.

[1]. C. Catal, "Software fault prediction: A literature review and current trends" Expert Systems with Applications: An International Journal, 38(4), 2011, 4626-4636.
[2]. P.S. Sandhu, S.K. Dhiman and A. Goyal, "A Genetic Algorithm Based Approach for Classification of Fault Prone Modules", in International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, 3(12), 2009.
[3]. K.O. Elish, M.O. Elish, Predicting defect-prone software modules using support vector machines, Journal of Systems and Software, 81(5), 2008, 649– 660.
[4]. D. Kaur et al, "A Clustering Algorithm for Software Fault Prediction", 16th IEEE International Conference on Computer and Communication Technology(ICCCT), 603-607, 2010.
[5]. C. Jin et al, "Artificial neural network-based metric selection for software fault-prone prediction model", The Institution of Engineering and Technology, 6(6), 2012, 479-487.
[6]. A.K. Pandey, N.K. Goyal, "Test Effort Optimization by Prediction and Ranking of Fault-prone Software Modules", in International Conference on Reliability, Safety & Hazard, 2010, 136-142.
[7]. Y. Jiang, B. Cukic and T. Menzies, "Fault Prediction Using Early Lifecycle Data" ISSRE, 18th IEEE Symposium on Software Reliability Engineering, 2007, 237-246.

Paper Type : Research Paper
Title : Chaos Encryption and Coding for Image Transmission Over Noisy Channel
Country : Egypt
Authors : Noha Ramadan || HossamEldin H. Ahmed || Said E. Elkhamy || Fathi E. Abd El-Samie

Abstract: The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don't consider the effect of errors occurring during wireless transmission. Error correction coding techniques must be used with ciphering to improve reliability and throughput. We will propose a combined ciphering and coding scheme based on the modified chaotic Logistic map with Low Density Parity-check Code (LDPC) as an error correction coding technique to overcome the limitation of wireless channel due to the factors that affect transmission such as noise and multipath propagation. The experimental results show that, this combined scheme enhanced the performance parameters such as PSNR and BER also achieved both security and reliability of image transmission through the wireless channel.

Keywords: Chaos, Filter, Image, LDPC, Logistic map

[1]. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, U.S. Government Printing Office, Washington, DC, 1977.
[2]. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197.United States National Institute of Standards and Technology (NIST). November 26, 2001.
[3]. Patidar, V., Pareek, N. K., Sud, K. K., A New Substitution–Diffusion Based Image Cipher Using Chaotic Standard And Logistic Maps, Commun. Nonlinear Sci. Numer.Simulat., 2009, 14: 3056-3075.
[4]. Zhang LH, Liao XF, Wang XB, An Image Encryption Approach Based On Chaotic Maps, Chaos, Solitons& Fractals, Vol. 24, 2005; Pp. 759–765.
[5]. Chen Wei-bin, Zhang Xin., Image Encryption Algorithm Based on Hénon Chaotic System, 978-1-4244-3986-7/09/© IEEE 2009.
[6]. S. Li, ―Analyses And New Designs Of Digital Chaotic Ciphers, Ph.D. dissertation, Info. And Comm. Eng., Xi'an Jiaotong Univ., China, 2007.

Paper Type : Research Paper
Title : A survey on recommendation system
Country : India
Authors : Gurpreet singh || Rajdavinder singh boparai

Abstract: In this paper, we give a brief introduction about recommendation systems, components of recommendation systems i.e. items, users and user-item matching algorithms, various approaches of recommendation systems i.e. Collaborative filtering (people-to-people correlation) approach, Content-based recommendation approach, Demographic recommendation approach, Social network-based recommendation approach, Hybrid recommendation approach and Context-based recommendation approach, We also explain various application areas of recommendation systems (e-government, e-business, e-commerce/e-shopping, e-library, e-learning, e-tourism, e-resource services) and challenges.

Keywords: Applications, approaches, challenges, Content, context, collaborative filtering, demographic and hybrid based recommendation.

[1]. F Ricci, L Rokach, B Shapira, Introduction to recommender systems handbook Springer US, 2011.
[2]. Sanjeev Kumar Sharma et al Design and Implementation of Architectural Framework of Recommender System for e-Commerce, International Journal of Computer Science and Information Technology & Security (IJCSITS),Vol. 1, No. 2, December 2011.
[3]. Barry Schwartz, The Paradox of Choice - Why more is Less How the Culture of Abundance Robs Us of Satisfaction, march 2014.
[4]. Dietmar Jannach, Markus zanker, Alexander felfernig and Gerhard friedrich, Recommender Systems: An Introduction US, 2011.
[5]. Joseph Huttner, From Tapestry to SVD A Survey of the Algorithms That Power Recommender Systems, Under the direction of Professor Steven Lindell Haverford College Department of Computer Science 8 May 2009.
[6]. Yading Song, Simon Dixon, and Marcus Pearce A Survey of Music Recommendation Systems and Future Perspectives 9th International Symposium on Computer Music Modelling and Retrieval (CMMR 2012) Queen Mary University of London June 2012, 19-22.
[7]. Francois Pachet, Knowledge Management and Musical Metadata, Encyclopedia of Knowledge Management 2005.
[8]. O. Celma Herrada. Music Recommendation and Discovery in the Long Tail. PhD Thesis, 2009.
[9]. Jie Lu*, DianshuangWu, Mingsong Mao, Wei Wang, Guangquan Zhang Recommender system application developments: A survey.

Paper Type : Research Paper
Title : Automated histopathological image analysis: a review on ROI extraction
Country : India
Authors : Rupesh Mandal || Mousumi Gupta

Abstract: This review paper deals with the latest technology developed on computer assisted analysis for histopathology images. The process for locating, analyzing and classification of lethal diseases like cancer, using a microscope by the pathologists is termed as histopathology. Since from decade, this is done through a manual process by the pathologists, which is entirely dependent on the level of expertise of the examiner. The analyzations of digital slides are based on the structure of tissue, cell distribution, and cell shape regularities. The whole process is more prone to internal as well as external observer. In this paper, the computerized image analysis process is reviewed for quantitative tissue diagnosis from histopathology images.

[1]. Bilge Karacali and Aydin Tozeren, "Automated detection of regions of interest for tissue microarray experiments: an image texture analysis," BMC Med Imaging, March 2007.
[2]. Ezgi Mercan, Selim Aksoy, Linda G. Shapiro, Donald L. Weaver, Tad Brunye, Joann G. Elmore, "Localization of diagnostically relevant regions of interest in whole slide images," 22nd IAPR International Conference on Pattern Recognition, Stockholm, Sweden, August 2014.
[3]. Yassine Aribi, Ali Wali, Mohamed Chakroun, Adel M.Alimi, "Automatic definition of regions of interest on renal scintigraphic images," AASRI Procedia, Elsevier, vol. 4, pp. 37-42, April 2013.
[4]. Yassine Aribi, Ali Wali, Fatma Hamza, Adel M. Alimi, Fadhel Guermazi, "Analysis of scintigraphic renal dynamic studies: an image processing tool for the clinician and researcher,"Advanced Machine Learning Technologies and Applications, Springer, vol. 322, pp. 267-275, 2012.

Paper Type : Research Paper
Title : Design of Mobile Robot Navigation system using SLAM and Adaptive Tracking Controller with Particle Swarm Optimization for Indoor Environment Monitoring
Country : India
Authors : Kapil Jajulwar || Dr.Amol Deshmukh

Abstract: Now a day mobile robot work as a autonomous machine which is used to control the locomotion and move around in environment by varying the physical location A self localization & mapping of mobile robot using fuzzy based tracking controller is design . The localization of mobile robot is calculated by slam technique. A AFTC with 9 various rule based is used to calculate the total unknown path of mobile robot in indoor monitoring system is calculate & the PSO is used to optimized the total path required for same. A system design with SLAM technique, Adaptive Fuzzy based controller & PSO which is used to solve the self localization of mobile robot.

Keywords: Fuzzy Controller, Particle Swarm Optimization, Simultaneous Location & mapping technique

[[1]. S. Rathinam; P. Almeida; Z. Kim; S. Jackson; A. Tinka; W. Grossman and R. Sengupta ," Autonomous Searching and Tracking of a River using UAV", Proceedings of the American control conference, new York city ,USA, July 11-13,2012.
[2]. D Santosh, SupreethAchar, C V Jawahar "Autonomous Image-Based Exploration for Mobil Robot Navigation", IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 2013.

Paper Type : Research Paper
Title : Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop for Extensive Data
Country : India
Authors : Sukhmani Goraya || Vikas Khullar

Abstract: Map-Reduce is drawing attention of both industrial and academic for processing of big data. In this paper, we have mainly focused on core scheduler of Hadoop i.e. Capacity Scheduler. The scheduler assigns tasks to the resources. Capacity Scheduler shares various resources in a cluster between concurrent jobs. We have performed various experiments based on Map-Reduce benchmark applications i.e. TestDFSIO, Pi, Word Count for analyzing and performance enhancement of capacity scheduler in terms of both execution time as well as capacity. We have proposed a method Synchronized and Comparative Queue Capacity Scheduler (SCQ) that makes better resource utilization which reflects enhanced performance in terms of execution time, throughput and average IO rate. Keywords: Map-Reduce, Capacity Scheduler, Fair Scheduler, HDFS, TestDFSIO, Word Count, Pi, Synchronized and Comparative Queue (SCQ)

[3] T. White, Hadoop: The Definitive Guide. O'Reilly Media, Inc., 2009.
[4] Umesh V. Nikam, Anup W. Burange, Abhishek A. Gulhane, "Big Data and HADOOP: A Big Game Changer", International Journal of Advance Research in Computer Science and Management Studies, Volume 1, Issue 7, ISSN: 2321-7782, DEC 2013.
[5] White, T., 2012, "Hadoop: The Definitive Guide", ed. Third, Tokyo: Yahoo press.
[6] Rasooli, Aysan, and Douglas G. Down. "A Hybrid Scheduling Approach For Scalable Heterogeneous Hadoop Systems." In High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion: pp. 1284-1291. IEEE, 2012.
[7] Kurazumi, Shiori, Tomoaki Tsumura, Shoichi Saito, and Hiroshi Matsuo. "Dynamic Processing Slots Scheduling for I/O Intensive Jobs of Hadoop Map-Reduce." In ICNC, pp. 288-292. 2012.

Paper Type : Research Paper
Title : Data Compression using Multiple Transformation Techniques for Audio Applications.
Country : India
Authors : Arashpreet Kaur || Rajesh Mehra

Abstract: As Multimedia Technology is growing day by day over past decades, therefore demand for digital information increasing rapidly. This digital information contains multimedia files like image files, audio files that require a large space so no other option than compression. In Compression high input stream of data is converted into small size. Data Compression for audio purposes is a field of digital signal processing that focuses on reducing bit-rate of audio signals to enhance transmission speed and storage capacity of fast developing multimedia by removing large amount of unnecessary duplicate data. The advantages of the compression technique are reduction in storage space, bandwidth, transmission power and energy. This paper is based on transform technology for compression of the audio signal.

[1] M. Arora, N. Maurya, P. Pathak, and V. Singh, "SPEECH COMPRESSION ANALYSIS USING MATLAB," pp. 538–542, 2014. [2] M. V Patil, A. Gupta, A. Varma, and S. Salil, "AUDIO AND SPEECH COMPRESSION USING DCT AND DWT TECHNIQUES," vol. 2, no. 5, pp. 1712–1719, 2013 [3] J. S. Jacaba, "AUDIO COMPRESSION USING MODIFIED DISCRETE COSINE TRANSFORM : THE MP3," no. October, 2001. [4] H. S. Malvar, "LOSSLESS AND NEAR-LOSSLESS AUDIO COMPRESSION USING INTEGER- REVERSIBLE MODULATED LAPPED TRANSFORMS." [5] H. kaur and R. kaur ,D. Cosine, "SPEECH COMPRESSION AND DECOMPRESSION USING DWT AND DCT," vol. 3, no. August, pp. 1501–1503, 2012 [6] M. Arora and N. Maurya, "AUDIO COMPRESSION IN MPEG TECHNOLOGY PEG IS AN ACRONYM FOR MOVING PICTURE EXERTS," vol. 3, no. 12, pp. 1–4, 2013. [7] M.Siffuzzaman, M.R.Islam, and M.Z. Ali, "APPLICATIONS OF WAVELET TRANSFORM AND ITS ADVANTAGES COMPARED TO FOURIER TRANSFORM, by Journal of Physical Sciences, Vol. 13, pp:121-134, October-2009.

Paper Type : Research Paper
Title : Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique
Country : Nigeria
Authors : Olaniyi Olayemi Mikail || Folorunso Taliha Abiodun || Abdullahi Ibrahim Mohammed || Abdulsalam Kayode Abdusalam

Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electronic ballot spoofing, remote voter's masquerading, voter's coercibility and ballot integrity breach are some of the security issues in electronic voting system. In this paper, we proffer solution to the problem of authentication and verification of voters as well as the integrity and confidentiality of the casted electronic ballot. The developed e-voting system adopts two levels of security: authentication of voters for whom they are using Radio Frequency Identification Technique and protection of casted votes in transit using enhanced Least Significant Audio Steganographic for credible electronic decision making.

[1]. Olaniyi O. M., Adewumi D. O., Oluwatosin E. A., Bashorun M. A. and Arulogun O. T. (2011). Framework for Multilingual Mobile E-Voting Service Infrastructure for Democratic Governance. African Journal for Computer and Information Communication Technology. 4:3( 2): 23-32.
[2]. Olaniyi, O. M.,Folorunso, T. A., Abdullahi I. M., Joseph O. (2015)," Performance Evaluation of an Enhanced Crypto-Watermarking Model for Secure Electronic Voting ", Open Journal of Information Security and Applications (OJISA),USA, In press
[3]. Abdulhamid S. M., Adebayo O. S., Ugiomoh D. S. and AbdulMalik M. D. (2013). The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity. International Journal For Computer Network and Information Security. 5(5). 9-18.
[4]. Olaniyi O. M., Arulogun O. T. and Omidiora E. A. (2013). Design of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions. International Journal of Computer and Information Technology. 2(6): 1122-1130.
[5]. Olaniyi O. M., Arulogun O. T. and Omidiora E. A. (2012b). Towards an Improved Stegano-Cryptographic Model for Secured Electronic Voting. African Journal for Computer and Information Communication Technology. 5(6): 10-16.

Paper Type : Research Paper
Title : Protocol Payment in M-commerce Transaction
Country : Morocco
Authors : K. Maazouz || H. Benlahmer || N. Achtaich

Abstract: With the rapid proliferation of Internet-enabled mobile handsets, empirical research has been undertaken in large number. The rapid growth of mobile commerce is being driven by number of factors , increasing mobile user base, rapid adoption of online commerce and technological advances. Regarding the development of mobile technology, it seems essential to have a payment protocol which provides the required security features along with an acceptable efficiency in mobile environment. This article introduces a payment protocol based on secure wireless payment using the m-check system. The proposed mobile payment protocol not only minimizes the computational operations and communication passes between the engaging parties, but also achieves a completely privacy protection for the payer.

Keywords: mobile commerce; m-payment ; M-check ; security; privacy

[1]. E, Haddad and B, King; A Simple Secure M-Commerce Protocol SSMCP*; IJCSNS International Journal of Computer Science and Network Security; 2007
[2]. Isaac,J.T.,&Camara,J.S.(2007).Anonymous payment in a client centric model for digital ecosystem. In Digital Eco Systems and Technologies Conference (DEST ‟07)(pp.422–427).
[3]. Hall, J., Killbank, S., Barbeau, M., & Kranakis, E. (2001). WPP: A secure payment protocol for supporting credit and debit card transactions over wireless networks. In Proceedings of ICT 2001 international conference on telecommunications (pp.4–7).
[4]. Wang,H.,&Kranakis,E.(2003).Securewirelesspaymentprotocol.InProceedingsoftheinternational conference on wireless networks, LasVegas,NV.
[5]. Shedid, S. M., El-Hennawy, M & Kouta, M.(2010). Modified SET protocol for mobile payment: An empirical analysis. IJCSNS International Journal of Computer Science and Network Security, 10(7), 289–295.
[6]. K.Maazouz; H.Benlahmer; N.Achtaich, Generic Architecture for Mobile Check System, International journal of computer technology and applications, vol4, issue6, 897-901pp,2013.

Paper Type : Research Paper
Title : Segmentation of the Blood Vessel and Optic Disc in Retinal Images Using EM Algorithm
Country : India
Authors : Shabana Mol S || Prof. Deepa Thomas || Dr.Jubilant J Kizhakkethottam

Abstract: Diabetic retinopathy (DR), glaucoma and hypertension are eye disease which is harmful and causes pressure in eye nerve and finally blindness. With the invention of new systems and the developing of new technologies the research in the medicine field had a great impulse. In particular, the development of the medical imaging field has been revolutionary with the availability of new techniques to acquire and process digital images. This revolution have required of significant innovation in computational techniques for the different aspects of image processing. Retinal image investigation is actually more and more dominant for nonintrusive prognosis approach inside modern day ophthalmology. On this paper, provide a book approach to be able to segment blood vessel and also optic disk inside the fundus retinal photos by making use of EM algorithm.

[1]. K. Fritzsche, A. Can, H. Shen, C. Tsai, J. Turner, H. Tanenbuam,C. Stewart, B. Roysam, J. Suri, and S. Laxminarayan, "Automated model based segmentation, tracing and analysis of retinal vasculature from digital fundus images," in State-of-The-Art Angiography, Applications and Plaque Imaging Using MR, CT, Ultrasound and X-rays.Boca Raton,FL, USA: CRC Press, 2003, pp. 225-298.
[2]. A. Hoover, V. Kouznetsova, and M. Goldbaum, "Locating blood vessels in retinal images by piecewise threshold probing of a matched filter response," IEEETrans.Med.Imag.,vol.19,no.3,pp.203-210,Mar.2000.
[3]. A. M. Mendonca and A. Campilho, "Segmentation of retinal blood vessels by combining the detection of centerlines and morph ological reconstruction," IEEE Trans. Med. Imag., vol. 25,no.9,pp.1200-1213,Sep.2006.
[4]. J. Soares, J. Leandro, R. Cesar, H. Jelinek, and M. Cree, "Retinal vessel segmentation using the 2-D gabor wavelet and supervised classification,"IEEE Trans. Med. Imag., vol. 25, no. 9,pp.1214-1222,Sep.2006.
[5]. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever, and B. van Ginneken, "Ridge-based vessel segmentation in color images of the retina,"IEEE Trans. Med. Imag., vol. 23, no. 4, pp.501-509,Apr.2004.

Paper Type : Research Paper
Title : Design and Implementation of SOA Enhanced Semantic Information Retrieval web service using Domain Ontology, WCF and .NET Technologies for a Distributed Environment
Country : India
Authors : S. Meenakshi || Dr. R.M. Suresh

Abstract: Information retrieval services serve a critical role in numerous business knowledge systems. There are different mature IR algorithms that have been implemented and it is by all seems to be a waste of resources and time to re-implement them. The implemented IR algorithms can be distributed and or their functions can be made accessible and open through the framework of SOA enhanced semantic web services. SOA enhanced Web services in the IR domain have not been widely attempted. Concept relevancy ranking of link and page content retrieval is an imperative area in traditional IR. Demonstrated that it can be easily adopted as IR web services and can be accessed in numerous ways. For the IR web services, we exploit the semantic web which is presently an evolution of the current web that represents information in a machine-readable format, while keeping the human-friendly mark up language representation and whereby avoiding key word searching.

[1]. Edgar Meij, Krisztian Balog, Daan Odijk, "Entity linking and retrieval for semantic search‖, WSDM '14, Proceedings of the 7th ACM international conference on Web search and data mining, 2004
[2]. Christoph Mangold , "A survey and classification of semantic search approaches‖, Int. J. Metadata, Semantics and Ontology, Vol. 2, No. 1, 2007
[3]. Xiaomin Ning, Hai Jin, Hao Wu, "RSS: A framework enabling ranked search on the semantic web‖, Elsevier 2007
[4]. Ruiqiang Zhang, Yi Chang and Zhaohui Zheng, Donald Metzler† and Jian-yun Nie, ―Search Result Re-ranking by Feedback Control Adjustment for Time-sensitive Query‖, 2007
[5]. Weimao Ke, Yueyu Fu and Javed Mostafa," Advanced Information Retrieval Web Services for Digital Libraries‖, 2008
[6]. Miriam Fernandez, Vanessa Lopez, Marta Sabou, Victoria Uren, David Vallet, Enrico Motta, ―Semantic Search meets the Web‖, 2008

Researcher can also search IOSR published article contents through

IOSR Xplore