IOSR Journal of Computer Engineering (IOSR-JCE)

Jan. – Feb. 2016 Volume 18 - Issue 1

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : NLP for Automated Conceptual Data Modeling
Country : India
Authors : Suraj A. Jogdand || Mr. Pramod B. Mali

Abstract: One of the procedures for obtaining the better understanding of the system by splitting the large system into smaller parts, this procedure is termed as analysis. Manually creating softwareartifacts and building UML models from natural language is a complex job. We represent diagrammatically structure of data by ER diagram. This paper represents the use of heuristics picked up from the syntactic and semantic learning for the automatic formation of database plan, which leads us to the identification and methodology to generate Entity-Relationship(ER) through NLP.

[1] Pranitha Reddy, R C Balabantaray, "Improvisation of the DocumentSummarization by combining the IR techniques with Code-Quantity andAttention Linguistic Principles."International Journal of Engineering andInnovative Technology. (IJEIT) Issue 2012.

[2] Elena Lioret, Maria Teresa Roma-Ferri, Manuel Palomar, "Compendium: A text summarization system for generating abstracts of research papers", Data & Knowledge Engineering, Science Direct 88 (2013) 164-175.

[3] Brill, E."A Simple Rule-Based Part of Speech Tagger. In: Proceedingsof the Third Conference on Applied Natural Language Processing", ACL,Trento, Italy (1992) 152-155.

[4] Buchholz, E., Cyriaks, H., Dusterhoft, A., Mehlan, H., and B. Thalheim.,"Applying a Natural Language Dialogue Tool for Designing Databases. In:Proceedings of the First Workshop on Applications of Natural Languageto Databases."(NLDB'95), Versailles, France (1995) 119- 133.

[5] Eick, C. F. and Lockemann, P.C."Acquisition of Terminology KnowledgeUsing Database Design Techniques". Proceedings ACM SIGMODConference, Austin, USA (1985) 84-94.


Paper Type : Research Paper
Title : A Preprocessing Scheme for Line Detection with the Hough Transform for Mobile Robot Self-Navigation
Country : Nigeria
Authors : Gideon Kanji Damaryam || Haruna Abdu

Abstract: This paper presents the pre-processing scheme used for a vision system for a self-navigating mobile robot which relies on straight line detection using the Straight Line Hough transform. The straight line Hough transform is an Image Processing technique for detection of straight lines in an image by transforming points in the image to another image in a way that accumulates evidence that the points from the original image are constituents of a straight line type feature from the original image. The pre-processing presented includes image re-sizing, conversion to gray scale, edge detection using the Sobel edge-detection filters, and edge thinning with a newly developed method that is a slight modification of an existing method. The newly developed method has been found to yield thinned images more suitable for later stages of this work than other thinning methods. Output from the pre-processing scheme presented is used as input for the remainder of the vision-based self-navigation system.
Keywords: Edge-detection, Hough transform, Image Processing, Machine vision, Pre-processing

[1]. G. K. Damaryam,A Hough Transform Implementation for Line Detection for a Mobile Robot Self-Navigation System, International Organisation for Scientific Research – Journal of Computer Engineering, 17(6), 2015
[2]. G. K. Damaryam, A Method to Determine End-Points of Straight Lines Detected using the Hough Transform, International Journal of Engineering Research and Applications, 6(1), 2016
[3] G. K. Damaryam, Visions Systems for A Mobile Robot based on Line Detection using the Hough Transform and Artificial Neural Networks, doctoral diss., Robert Gordon University, Aberdeen, United Kingdom, 2008.

[4] P. Hough, Method and Means for Recognising Complex Patterns, United State of America Patent 3069654, 1962.

[5] R. M.Inigoand R. E. Torres, Mobile Robot Navigation with Vision Based Neural Networks, Proc. SPIE 2352, Mobile Robots IX, 2353, 68-79, 1995


Paper Type : Research Paper
Title : Effect of Angle Orientation of Flat Mirror Concentrator on Solar Panel System Output
Country : Iraq
Authors : Assist.prof Dr.Ali H.AL-Hamadany || Assist.prof. Dr.Faten Sh. Zain Al-Abideen || Jinnan H. Ali

Abstract: In this research two flat glass mirrors is used as concentrator of solar panel system. The mirrors increase's the concentration of sun light ray on the solar module. Anew model of solar panel system is designed by mean of software Zemax in order to find best possible inclination angle of the concentrator that improves the performance of the solar panel. So the efficiency is 59.5% for designed system with inclination angle 60° of the concentrator. Then a practical design for the solar panel system with concentrators is established. The outdoor measurements for the practical design indicated that the output power and efficiency is increasing by increasing the inclination angle of the concentrator and reaches its maximum value at 60o at different times of the date 5-2-2014. Also the results showed that the maximum value of efficiency is 0.85 at 11 o'clock at 60o. While the maximum value of the output power is 72.8w at 12 o'clock of the same day.

Keywords: solar panel, concentrators, flat mirror concentrator. .

[1]. Ahmed F. Atwan, Naseer K. Kasim, Ala'a H. Shnieshil, "PV Solar Panel Performance under the Effect of Dust in Baghdad", RONCHI, Italy, N.3, PP.379-388, 2012.
[2]. Karvelas .E, Papadopoulos A., Dousis D., Markopoulos Y. P., Mathioulakis E., Panaras G., Vamvakas V. and Davazoglou D., '' Mirrors Based on Total Reflection for Concentration PV Panels'', 4th International Conference on Solar Concentrators for the Generation of Electricity or Hydrogen, pp 165-168, Attiki, Greece, 2002.
[3]. Maria B., ''Optical Efficiency of Low – Concentrating Solar Energy Systems With Parabolic Reflectors'', 2004.
[4]. David N. W., ''Improved boost mirror for low concentration photovoltaic solar power systems'', Silver Spring, Maryland, e-mail: davidnelsonwells@yahoo.com, 2009.


Paper Type : Research Paper
Title : Competent Tracking of Moving Object Using Affine & Illumination Insensitive Template Matching
Country : India
Authors : Moiz Abdul Hussain || Dr. Govind Ukhandrao

Abstract: Moving object detection & tracking in real world scene is becoming significant problem in today's era. The extensive study in this area is motivated by potential number of applications of object tracking. In this paper, we analyze a method for motion segmentation & tracking of nonstationary objects that uses the complete image information using the affine flow equations. These affine flow parameters are then combined with illumination insensitive template matching tracker to efficiently segment & track the moving objects. Experimental results performed on various database videos shows the method effectively tracks the object without miss detection of the target compared to other methods.

Keywords: Affine Flow, Video Surveillance, Object Tracking, Template matching. .

[1] J. Y. A. Wang and E. H. Adelson, Representing moving images with layers, IEEE Trans. Image Processing, , 1994, 3(5):625 – 638.
[2] I.Haritaoglu, D.Harwood and L.S.Davis, W4: Realtime surveillance of people and their actions, IEEE Trans. on Pattern Anal. and Mach. Intell. , August 2000, 22(8),pp.809-830.
[3] J. Kato, S. Joga, J. Rittscher, and A. Blake, An HMM-based segmentation method for traffic monitoring movies, IEEE Trans. on PAMI, , 2002, vol. 24, no. 9, pp. 1291–1296.
[4] M. Kilger, A shadow handler in a video-based real-time traffic monitoring system, Proc. of IEEE Workshop on Applications of Computer Vision. 1992, pp. 1060-1066.
[5] L.-Q. Chen, X. Xie, X. Fan, W.-Y. Ma, H.-J. Zhang, and H.-Q. Zhou, A visual attention model for adapting images on small displays, Multimedia Syst., Oct. 2003. vol. 9, pp. 353–364.


Paper Type : Research Paper
Title : Enhancement of Network Administration through Software Defined Networks
Country : India
Authors : Dr.V.V.S.S.S.Balaram || Dr.Chinthagunta Mukundha || Sunil Bhutada

Abstract: Now a days organizing the Network is very complex and challenging issue. To control, manage, and to provide a secure communication network, network managers must grapple with low-level vendor-specific configuration to implement complex high-level network policies .Most of the previous proposals to make networks easier to manage, many solutions to network management problems amount to stop-gap solutions because of the complexity of changing the underlying infrastructure. The rigidity of the underlying infrastructure presents few considerations for innovation or improvement, since network devices have generally been closed, proprietary, and vertically integrated. .

[1] Z. Cai, Maestro: Achieving Scalability and Coordination inCentralized Network Control Plane, Ph.D. thesis, 2011.
[2] M. Casado et al., ―Rethinking Packet Forwarding Hardware,‖Proc. 7th ACM SIGCOMM HotNets Wksp., Nov. 2008.
[3] M. Chetty et al., ―You're Capped: Understanding theEffects of Bandwidth Caps on Broadband Use in the Home,‖ Proc. 2012 ACM Annual Conf. Human Factors in Computing Systems, CHI '12, New York, NY, 2012,pp. 3021–30.
[4] A. R. Curtis et al., ―Devoflow: Scaling Flow Management for High-Performance Networks,‖ Proc. ACM SIGCOMM '11, New York, NY, 2011, pp. 254–65.
[5] N. Feamster et al., ―The Case for Separating Routing from Routers,‖ ACM SIGCOMM Wksp. Future Directions in Network Architecture, Portland, OR, Sept. 2004.
[6] A. Greenberg et al., ―A Clean Slate 4D Approach to Network Control and Management,‖ ACM Comp. Commun.Rev., vol. 35, no. 5, 2005, pp. 41–54.


Paper Type : Research Paper
Title : Towards Automated Generation of ER-Diagram using a Web Based Approach
Country : India
Authors : Amol V. Khaire || Pramod B. Mali

Abstract: Diagrams plays an important role in the software development process. Drawing the diagrams manually is the time consuming task, so there are many tools to draw and modify the diagram. From all the diagrams ER (Entity Relationship) Diagram plays an important role in the software development process in Computer Engineering. This paper will describe the existing tools and presents a Web Application to generate the Entity Relationship Diagram automatically. This Web Application will allow us to generate Entity Relationship Diagram automatically by a form filling method which will take the Entity, Attribute and Relationship as an input and gives the Entity Relationship Diagram as output automatically.

Keywords - Automated ER-Diagram, Entity Relationship Diagram, Software Development Process, Web Application

[1] Tabinda Sarwar, Uzma Arif, Wajiha Habib, Samna Zehra, "Automating The Diagram Generation Process", International Journal of Scientific and Engineering Research Volume 2, Issue 7, July-2011
[2] Dr. Muhammad Shahbaz, Dr. Syed Ahsan, ammad Shaheen, Rao Muhammad Adeel Nawab, Syed Athar Masood, University of Engineering & Technology Lahore, Punjab Pakistan, "Automatic Generation of Extended ER Diagram Using Natural Language Processing", Journal of American Science, 2011
[3] Sangwon Lee, Namgyu Kim and Songchun Moon, Department of Management Engineering, Korea Advanced Institute of Science and Technology, Seoul130-722, Korea, "Context Adaptive Approach for Automated Entity Relationship Modeling", journal of information science and engineering 26, 2229-2247 (2010).
[4] Tabinda Sarwar, Uzma Arif, Wajiha Habib Samana Zehra, "An Efficient and Simplest Algorithm for Generating Diagrams", International Journal of Scientific & Engineering Research Volume 2, Issue 7, July-2011,ISSN 2229-5518
[5] P. S. Dhabe, Dr. M. S. Patwardhan, Asavari A. Deshpande, M. L. Dhore, B.V. Barbadekar and H. K. Abhyankar, Department of Computer Engineering, Vishwakarma Institute of Technology, Pune-411037, Maharashtra State, India, "Articulated Entity Relationship Diagram for Complete Automation of Relational Database Normalization", International Journal of Database Management System, Volume 2, Num 2


Paper Type : Research Paper
Title : An Indepth Understanding of eGovernance initiatives: eAuction- A Case Study Approach
Country : India
Authors : Shaikh Imtiyaj || N.R Biswal || T.P Ray || Dr A.K Hota

Abstract: The science market has become open and accessible to all in the international community without any restriction; the rapid explosion in Information Technology has played a vital role in this mission. The rapid growth of competition in the market and the consequent changes in economic conditions impose organizations and firms to implement new technologies to stay competitive. The Central, State Government, Judiciary, Autonomous Bodies, Boards & Corporations, PSUs, Joint Ventures, Statutory Bodies, Commissions and Councils have invested in numerous initiatives throughout the length and breadth of the country aimed at extending the benefits of information revolution to rural and remote area. The Government envisions providing good governance by establishing a Committed, Accountable, Responsive, Inspiring, Nationalist, and Genuine Government - CARING Government.

[1]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , "Digital Signature Certificate: A blessing for e-Governance Application in Human Development", International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp 350-355,January 2015
[2]. William S.," Cryptography and Network Security, Principles and Practice", Prentice Hall of India, 2005.
[3]. Dhiren R. Patel ,"Information Security Theory and Practice" , 2008 Edition ,2008
[4]. Atul Kahate, "Cryptography and Network Security", Second Edition, 2013
[5]. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, 2012
[6]. "e-Auction," available at http:// demoeproc.nic.in\eAuction\app, last visited 30th Dec 2015 [7] "Digital Signature," available at http://nicca.nic.in, last visited 23th June2015
[7]. "e-Governance," available at http:// india.gov.in, last visited 30th Dec 2015


Paper Type : Research Paper
Title : An Enhanced Scheme for Hiding Text in Wave Files
Country : Jordan
Authors : Buthainah F. AL-Dulaimi || Nibras Amer Mohammed || Hamza A. Al-Sewadi

Abstract: Steganography is a term applied to any number of processes that embed an object into another object in order to deceive any observer or adversary. An embedding algorithm for hiding messages into wave files or audio signals is proposed here. It a spatial domain type that implement least significant bit (LSB) process and represents a jumping algorithm technique.

Keywords: Steganography, Information Hiding, LSB, PSNR, Data Security.

[1]. S. Cacciaguerra, and Ferretti, S., Data Hiding: Steganography and Copyright Marking, Paper, Department of computer science, Bologna University, Italy, 2000.
[2]. N. F. Johnson, and Jajodia, S., Stganalysis of Image Created Using Current Steganography Software, Workshop on Information hiding proceeding, center for secure information System, lecture notes in computer science, 1525, George Mason University, USA, 1998. http://isse.gmu.edu/~csis
[3]. S. Katzenbeisscr, Petitcolas, F. A., Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, Boston-London, 2000).
[4]. R. Petrovic, Winograd, J. M., Jemili J., and Metois, E., Data Hiding Within Audio Signal, Journal of Electronics and Energetics,12(2), 1999, 103-122.
[5]. W. Bender, Techniques for Data Hiding, IBM System Journal; 35(3-4), 1996, 1-10. http://www.research.ibm.com/journal/sj/353/section/bendeaut.htm1#bender


Paper Type : Research Paper
Title : A Business Oriented Framework For Enhancing Web Security Service (BOF4EWSS) Network And Features For E-Businesses Classification Techniques.
Country : United Kingdom
Authors : Muhammad Ismail Mohmand || David Young || Cress Bowerman || Irvin Philip

Abstract: In the field of web security service is an extremely complex and very contemporary issue. As soon as the considering this current technology suite to assist the interacting e-businesses challenges for security become even more and more elusive. To attempting the addresses of these current problems. In this research suggests a business-oriented framework for enhancing web security service (BOF4EWSS), is a complementary issue for the network features in the e-business. Importance of the BOF4EWSS, is its prominence on the tool supported in partnership for the e-businesses are comprehensive security related solution for their service of interaction techniques. And the tool businesses in the use of its applications of the BOF4EWSS two essential framework phases respectively.

[1] Muhammad Ismail Mohmand, David Young, Irvin Philip (2015). Some Essential Problems and Future Directions in Business Oriented Framework for Enhancing Web Security Service through Network-Features. Published in an international Journal of the Applied Environmental and Biological Sciences volume 5(12), pages, 5(12) 93-100, 2015. Available online at: www.textroad.com.
[2] Muhammad Ismail Mohmand, David Young (2015). Analysis and Applications of Web Security Services through the Network Features. Published in an international Journal of the Applied Environmental and Biological Sciences volume 1 pages, 5(9), 22-27, 2015. Available online at: www.textroad.com.
[3] M. Tatsubori, T. Imamura, and Y. Nakamura. Best-practice patterns and tool support for configuring secure web services messaging. In IEEE International Conference on Web Services, pages 6-20, Athens, Greece, 2009. IEEE Computer Society. (Cited on pages 7 and 8.)
[4] The Open Group. TOGAFTMVersion9, 2009. The performance and analysis of the secure network http://www.opengroup.org/togaf/.
[5] The SANSTM Institute. Lab anti-virus of the performance degradation of the policy.http://www.sans.org/resources/policies/Lab_Anti-Virus_Policy.pdf, 2006.


Paper Type : Research Paper
Title : Precision Controlled Secrecy Stabilization in Relational Data
Country : India
Authors : Rajkumar Lingamgunta || Jajula Hari Babu

Abstract: Data privacy issues are increasingly becoming important for many applications. Protective individual privacy is a crucial downside. However, sensitive data will still be ill-used by approved users to compromise the privacy of shoppers. Traditionally, research in the database community in the area of data security can be broadly classified into access control research and data privacy research. Access Control Mechanisms (ACM) is used to ensure that only authorized information is available to users. Privacy Protection Mechanism (PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. The privacy preservation can be achieved through anonymization techniques like generalization or suppression. Along with privacy the precision of the authorized data is important.

[1] Zahid Pervaiz, Walid G.Aref, Arif Gafoor, Nagabhushana Prabhu "Accuracy constrained privacy preserving access control mechanism for relational databases" IEEE Transaction on Knowledge Engineering, vol.26, No.4, April 2014, pp.795-807 [2] E. Bertino and R. Sandhu, "Database Security-Concepts, Approaches, and Challenges," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005. [3] P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001. [4] B. Fung, K. Wang, R. Chen, and P. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Surveys, vol. 42, no. 4, article 14, 2010.. [5] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond k-anonymity," ACM Trans. Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007. [6] K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Workload-Aware Anonymization Techniques for Large-Scale Datasets," ACM Trans. Database Systems, vol. 33, no. 3, pp. 1-47, 2008.


Paper Type : Research Paper
Title : Mood Therapy and Software Design
Country : United Arab Emirates
Authors : Tawfik Saeed Zeki || FerasSamarrai

Abstract: In this study the focus was ontheimpactofMood on theSoftware development, especiallytheimpacton the psychologicaltreatmentofthe user fromthenegativeimpactoftheseMoodandgetridofitduring work. Ofthe formulasused to determine therequirementsand functions ofbuilding softwareis to determine theuserrequirementswithout the knowledgeand standon the user'smood. The success ofthe softwaredesignis to takeinto accountthe user mood and how toarise anddiscourse thedisastersto reachprecision work. While this paper presents a number of concrete design and engineering ideas, the larger resolved is to introduce an information software design, and provide motivation and way for advanced designers.
Keywords: Software development interaction mood user's requirements

[1]. http://study.com/academy/lesson/what-is-mood-definition-examples-quiz.html/
[2]. http://designshack.net/articles/inspiration/how-color-type-and-space-can-impact-mood/
[3]. http://www.fastcompany.com/3025405/fast-feed/apple-wants-to-measure-your-mood-then-send-you-targeted-ads/
[4]. http://www.clevelandclinicmeded.com/medicalpubs/diseasemanagement/psychiatry-psychology/bipolar-disorder/
[5]. http://www.psychguides.com/guides/mood-disorder-symptoms-causes-and-effect/


Paper Type : Research Paper
Title : Assorted Strategy for the Finest Malware Defense in Portable Set-Up
Country : India
Authors : Pothuri Ramyamadhuri || Dasari Ravi Kumar

Abstract: The specialized difficulties in mobile devices are that these are heterogeneous as far as working frameworks; the malware taints the focused framework in any shrewd manner through the neighborhood and the worldwide integration, while the to-be-sent barrier framework then again would be normally asset restricted. Through hypothetical investigation and reenactments with both engineered and also reasonable versatility follows, we demonstrate that the circulated calculation accomplishes ideal arrangement, and
performs effectively in all practical situations. As malware assaults turn out to be the more often in portable systems, conveying a productive guard framework to ensure against disease and to help the tainted hubs to recoup is imperative to avert genuine spreading and flare-ups.

[1] P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science,
vol. 324, no. 5930, pp. 1071-1076, 2009.
[2] M. Hypponen, "Mobile Malwar," Proc. 16th USENIX Security Symp., 2007.
[3] M. Khouzani, S. Sarkar, and E. Altman, "Maximum Damage Malware Attack in Mobile Wireless Networks," Proc. IEEE
INFOCOM, 2010.
[4] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular
Networks," Proc. IEEE INFOCOM, 2009.
[5] G. Zyba, G. Voelker, M. Liljenstam, A. Me´hes, and P. Johansson, "Defending Mobile Phones from Proximity Malware," Proc.
IEEE INFOCOM, 2009.
[6] F. Li, Y. Yang, and J. Wu, "CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks,"
Proc. IEEE INFOCOM, 2009.



Researcher can also search IOSR published article contents through

IOSR Xplore