IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. – Dec. 2015 Volume 17 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Novel Malware Clustering System Based on Kernel Data Structure
Country : India
Authors : Bhandare Trupti Vasantrao || Pramod B. Mali

Abstract: An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system's operations. Traditional malware detection approaches have based on the codecentric aspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of malware programs.

[1] Junghwan R, R Riley, Z Lin, X Jiang, and D Xu, "Data-Centric OS Kernel Malware Characterization" IEEE Transactions on
Information Forensics And Security, Vol. 9, No. 1, January 2014.
[2] Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-Free: Defeating Return-oriented Programming
through Gadget-less Binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC'10), 2010.
[3] H. Etoh, "GCC Extension for Protecting Applications From Stack-smashing Attacks". Accessed May 2011.
[4] Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram. Defeating Return-oriented Rootkits with"Return-Less"
Kernels. In Proceedings of the 5th European Conference on Computer Systems (EUROSYS'10), 2010.
[5] Phrack Magazine. Linux On-the-fly Kernel Patching without LKM. http:// Accessed
May 2011.

Paper Type : Research Paper
Title : Privacy Issues In Cloud Computing
Country : Malaysia
Authors : Leela Krishna Ganapavarapu || Sireesha Prathigadapa || Kiranmayi Bodapati

Abstract: Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality services from data and software that reside solely on remote data centres. We can store and retrieve the data as we like using cloud computing. The cloud computing paradigm changes the way in which information is managed, especially where personal data processing is concerned. End-users can access cloud services without
the need for any expert knowledge of the underlying technology. This is a key characteristic of cloud computing, which offers the advantage of reducing cost through the sharing of computing and storage resources, combined with an on-demand provisioning mechanism based on a pay-per-use business model.

[1] Grilo A, Jardim-Goncalves R (2011) Challenging electronic procurement inthe AEC sector: A BIM-based integrated perspective.
Automation in Construction 20: 107–114
[2] Vorakulpipat C, Rezgui Y, Hopfe CJ (2010) Value creating construction virtual teams: A Case study in the construction sector.
Automation in Construction 19: 142–147
[3] International Standard (ISO) 16739:2005 - Industry Foundation Classes
[4] Succar B (2009) Automation in Construction 18: 357–375
[5] Royal Institute of British Architects (RIBA) Plan of Work. Available at: [Last accessed: Jan 17,
[6] Serror M (2007) Shared computer-aided structural design model for construction industry (infrastructure). Comput Aided Des 40:
[7] Singh V (2010) A theoretical framework of a BIM-based multi-disciplinary platform. Automation in Construction 20: 131–144

Paper Type : Research Paper
Title : The Gap of Hospital Service Performance By Using Service Quality Analysis
Country : Indonesia
Authors : Mustafa Hermanto

Abstract: Patient is a customer of the Hospital whose satisfaction must be noticed. The satisfaction of patient is
depended on the service performance which has been performed by the hospital. Service quality analysis is used
to measure the expectations and the perceptions of respondents about service quality which has been provided
by the hospital, so the occurred score gap can be known. The samples are 96 inpatients who have been selected
by using accidental sampling method. The data collection has been carried out by using questionnaires. This
research recommends that the hospital should find strategies in order to improve their service quality and to
maintain consumer (consumer retention).
Keywords: service performance, servqual analysis

1]. Assael, H. 1998. Costumer Behavior And Marketing Action. Keat Publishing Company, Boston
[2]. Dutka, A. 1994. AMA Hand Book for Customer Satisfaction. NTC Business Book, Lincolnwood, Illnois
[3]. Gibson, J.L., Ivancevich, J.M., Donnelly, J.H & Konopaske, R. 2011. Organizational Behavior, Structure, Process. New York, NY:
Mc.Graw Hill
[4]. Gronroos, C. 2007. Service Management and Marketing "Customer Management in Service Competition" 3th edition. John Wiley
& Sons.Ltd, England
[5]. Kotler, P. & Armstrong, G. 2008. Principles of Marketing. 12thed. New Jersey: Prentice Hall

Paper Type : Research Paper
Title : Subacute sclerosing panencephalitis (SSPE) In Iraq
Country : Iraq
Authors : Dr. Akram M. Al-Mahdawi || Dr. Anmar O. Hatem || Dr. Eman Sh. Mahmood

Abstract: Subacute sclerosing panencephalitis (SSPE) is a progressive inflammatory disease of the central nervous system with poor prognosis and high mortality, caused by the persistent infection with measles virus (MV). Despite much research into SSPE, its pathology remains obscure. Only 5% of individuals with SSPE undergo spontaneous remission, with the remaining 95% dying within 5 years of diagnosis. The prevalence of the disease varies depending on the measles vaccine immunization status. The clinical manifestations occur, on an average 6 years after measles virus infection and may initially present with a varied clinical picture ranging
from psychiatric to ophthalmological to neurological symptoms and signs. The diagnosis is based upon characteristic clinical manifestations of myoclonus, the presence of characteristic periodic EEG discharges, and demonstration of raised antibody titer. We are reporting 8 cases of Iraqi patients with SSPE and we describe the test methodology used for detection of MV in those patients

[1]. Tomoda A, Nomura K, Shiraishi S, et al. Trial of intraven-tricular ribavirin therapy for subacute sclerosing panencepha-litis in
Japan.Brain Dev2003;25:514–7.
[2]. Dawson JR. Cellular inclusions in cerebral lesions of epi-demic encephalitis.Arch Neurol Psychiatry1934;31:685–700.
[3]. van Bogaert L. Une leuco-encephalite sclerosante subaigue.J Neurol Neurosurg Psychiatry1945;8:101–20.
[4]. Dyken PR. Subacute sclerosing panencephalitis. Current sta-tus.Neurol Clin1985;3:179–96.
[5]. Tomoda A, Miike T, Miyagawa S, Negi A, Takeshima H.Subacute sclerosing panencephalitis and
[6]. Tuncay R, Akman-Demir G, Gokyigit A, et al. MRI in sub-acute sclerosing panencephalitis. Neuroradiology1996; 38:636–40.
[7]. Singer C, Lang AE, Suchowersky O. Adult-onset subacute sclerosing panencephalitis: case reports and review of the literature.
Mov Disord1997;12:342–53

Paper Type : Research Paper
Title : Hierarchical Dirichlet Process for Dual Sentiment Analysis with Two Sides of One Review
Country : India
Authors : Daniel Nesa Kumar C || Suganya G || Anita Lily J S

Abstract: Sentiment categorization is a fundamental process in sentiment examination, by means of it's intended to categorize the sentiment into either positive or negative for given text. The wide-ranging perform in sentiment categorization follow the procedure in conventional topic-based text categorization, where the Bagof- Words (BOW) is one of the most widely used methods in the recent work for the classification of text data in sentiment analysis. In the BOW method, an examination text is characterized by means of a vector of selfdetermining words. On the other hand, the performance of BOW occasionally leftovers restricted because of handling the polarity shift difficulty.

[1] Whitelaw C., N. Garg, S. Argamon, ―Using appraisal groups for sentiment analysis,‖ in Proc. ACM Conf. Inf. Knowl. Manag.,
2005, pp. 625–631.
[2] Wilson T., J. Wiebe, and P. Hoffmann, ―Recognizing contextual polarity: An exploration of features for phrase-level sentiment
analysis,‖ Comput. Linguistics, vol. 35, no. 3, pp. 399–433, 2009.
[3] Choi Y.and C. Cardie, ―Learning with compositional semantics as structural inference for subsentential sentiment analysis,‖ in Proc.
Conf. EmpiricalMethodsNatural Language Process., 2008, pp. 793–801.
[4] Councill I., R. MaDonald, and L. Velikovich, ―What's great and what's not: Learning to classify the scope of negation for improved
sentiment analysis,‖ in Proc. Workshop Negation Speculation Natural Lang. Process., 2010, pp. 51–59.
[5] Li S. and C. Huang, ―Sentiment classification considering negation and contrast transition,‖ in Proc. Pacific Asia Conf. Lang., Inf.
Comput.,2009, pp. 307–316.

Paper Type : Research Paper
Title : A Hough Transform Implementation for Line Detection for a Mobile
Robot Self-Navigation System
Country : Nigeria
Authors : Gideon Kanji Damaryam

Abstract: This paper presents an implementation of the Hough transform for detecting straight lines within rectilinear environments for further processing towards automatic recognition of a path by a mobile robot for the purpose of self-navigation. The results of the processes described in this paper are linesalong whichnavigationally important features from the original image would lie, but whose end-points and lengths have not been determined yet. The input to the processes in this paper is a pre-processed binary image with
pixels showing the outline of important edges determined by a scheme discussed in [1]. The processes described in this paper that translate the pre-processed image to detected lines include choice or resolution of parameters for the Hough transform, a discussion of the range of values of the parameters leading to discussion of setting up of the accumulator array, the actual transformation and accumulation.

[1]. G. K. Damaryam, Visions systems for a mobile robot based on line detection using the Hough transform and artificial neural
networks, doctoral diss., Robert Gordon University, Aberdeen, United Kingdom, 2008.
[2]. G. K. Damaryam, A method to determine end-points of straight lines detected using the Hough transform, In Press, International
Journal of Engineering Research and Applications, 6(1), 2016
[3]. P. Hough, Method and Means for Recognising Complex Patterns, United State of America Patent 3069654, 1962.
[4]. A. Low,Introductory Computer Vision and Image Processing,(London, United Kingdom: McGraw-Hill Book Company, 1991).
[5]. A. O. Djekouneand K. Achour, Visual Guidance Control based on the Hough Transform,IEEE Intelligent Vehicles Symposium,
[6]. J. F. Boyce, G. A. Jonesand V. F. Leavers, An implementation of the Hough transform for line and circle location. Proc, SPIE
Inverse Problems in Optics,The Hague, Netherlands, 1987.

Paper Type : Research Paper
Title : Filter-Wrapper Approach to Feature Selection Using PSO-GA for Arabic Document Classification with Naive Bayes Multinomial
Country : Indonesia
Authors : Indriyani || Wawan Gunawan || Ardhon Rakhmadi

Abstract: Text categorization and feature selection are two of the many text data mining problems. In text categorization, the document that contains a collection of text will be changed to the dataset format, the dataset that consists of features and class, words become features and categories of documents become class on this dataset. The number of features that too many can cause a decrease in performance of classifier because many of the features that are redundant and not optimal so that feature selection is required to select the optimal features. This paper proposed a feature selection strategy based on Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) methods for Arabic Document Classification with Naive Bayes Multinomial (NBM).

[1]. Chakrabarti, S., 2000. Data mining for hypertext: A tutorial survey. SIGKDD explorations 1(2), ACM SIGKDD.
[2]. Salton, G., 1989. Automatic Text Procession: The Transformation, Analysis, and Retrieval of Information by Computer. Addison
Wesley, Reading, PA.
[3]. Rifkin, R.M., 2002. Everything Old is New Again: A Fresh Look at Historical Approaches in Machine Learning, Ph.D.
Dissertation, Sloan School of Management Science, September, MIT.
[4]. Salton, G., 1989. Automatic Text Procession: The Transformation, Analysis, and Retrieval of Information by Computer. Addison
Wesley, Reading, PA.
[5]. Yang, Y., Pedersen, J., 1997. A comparative study on feature selection in text categorization. In: Proceedings of ICML-97,
Fourteenth International Conference on Machine Learning.

Paper Type : Research Paper
Title : Privacy - Preserving Reputation with Content Protecting Location Based Queries
Country : India
Authors : Dr.S.Sujatha (HOD) || N.Premalatha (M.Phil scholar)

Abstract: Privacy based Context-aware systems based on location open up new possibilities to users and data servers in terms of acquiring custom services by gathering context information, especially in systems where the high mobility of users increases their usability. Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighbouring points of interests. However, location knowledge is often perceived as personal information.

[1] C. Bettini, X. Wang, and S. Jajodia, "Protecting privacy against location-based personal identification," in Proc. 2nd VDLB Int.
Conf. SDM, W. Jonker and M. Petkovic, Eds., Trondheim, Norway, 2005, pp. 185–199, LNCS 3674.
[2]. M. Damiani, E. Bertino, and C. Silvestri, "The PROBE framework for the personalized cloaking of private locations," Trans. Data
Privacy, vol. 3, no. 2, pp. 123–148, 2010
[3]. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "A hybrid technique for private location-based queries with database
protection," in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg,
Denmark, 2009, pp. 98–116, LNCS 5644
[4]. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "Approximate and exact hybrid algorithms for private nearestneighbor
queries with database protection," GeoInformatica, vol. 15, no. 14, pp. 1–28, 2010
[5]. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are
not necessary," in Proc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.

Paper Type : Research Paper
Title : Positional Prediction of Individuals Present In a Crime Scene
Country : India
Authors : Prof.(Dr.)Samir Kumar Bandyopadhyay || NabanitaBasu

Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tried to amalgamate the works that have particularly contributed towards scientific advancement in the documentation, interpretation of bloodstain patterns, thereby putting forth the research initiative that they (i.e. the authors) intend to undertake within the multidisciplinary domain of bloodstain pattern analysis. Authors try to overview the entire crime scene process.
Keywords: Transfer stain, Cast-off pattern, Impact spatter, Saturation stain, Bloodstain patternanalysis, Fluid mechanics.

[1]. National Crime Records Bureau,Ministry of Home Affairs, Government of India. (2014, June 16). Crime in India - 2013. Retrieved
March 12, 2015, from
[2]. U.S. Department of Justice—Federal Bureau of Investigation. (2010, September). Violent Crime - Crime in the United States 2009.
Retrieved March 3, 2015, from
[3]. Ebiary, H. (2008). Crime Scene Investigation [Powerpoint slides]. Retrieved from
[4]. Swindlehurst, J., &Hadzi-Vidanovic, V. (n.d.). Evidence: Types of Evidence Admissible in a Law Court. Retrieved March 30, 2015,
[5]. Oxford University Press. (n.d.). crime - definition of crime in English from the Oxford dictionary. Retrieved February 8, 2015, from

Paper Type : Research Paper
Title : Prevention of Cheating Message based on Block Cipher using Digital Envelope
Country : India
Authors : Sanyasamma || Koduganti Venkata Rao

Abstract: Quick assessment of advanced information trade happens as of late. Because of that security of data is much critical in information stockpiling and transmission process. That implies there is a need to shield the information or some message from an assailant that is miscreant. An advanced envelope (encryption) is what might as well be called putting our message into a fixed envelope to give security and imperviousness to altering. Also, is the most guaranteeing procedure which gives key security highlight like uprightness, validation, non-renouncement, protection.

[1] P.Karthigaikumar, Soumiya Rasheed, ―Simulation of Image Encryption using AES Algorithm‖, IJCA Special Issue on
―Computational Science - New Dimensions & Perspectives‖ NCCSE, 2011, pp 166-172.
[2] Shraddha Soni, Himani Agrawal, Dr. (Mrs.) Monisha Sharma, ― Analysis and Comparison between AES and DES Cryptographic
Algorithm‖, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012, pp 362-
[3] Irfan AbdulGaniLandge, ―Implementation of AES Encryption and Decryption using VHDL‖, International J. of Engg. Research
&Indu. Appls. (IJERIA). ISSN 0974-1518, Vol. 4, No. III (August 2011), pp 395-406.

Researcher can also search IOSR published article contents through

IOSR Xplore