IOSR Journal of Computer Engineering (IOSR-JCE)

Jan. – Feb. 2016 Volume 18 - Issue 1

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : Evaluation of NOC Using Tightly Coupled Router Architecture
Country : India
Authors : Bharati B. Sayankar || Pankaj Agrawal

Abstract: One of the most important role in many core system is played by Network on Chip (NoC). Researchers are recently focusing on the design and optimization of NoC. In this paper we describe the architecture of a tightly coupled NoC router. To improve the network performance the router uses the on-chip storage and to improve the use of on-chip resource and information, several optimizations are introduced. In theory this design can save 9.3% chip area. The experiment shows that the latency can be reduced to 75% by the process of optimization on the ejection process and energy consumption by 31.5% in heavy traffic load network. Under different buffer depth, it can also improve latency by 20% and energy consumption by 25%. The experimentally results also prove that this tightly coupled router architecture can achieve better performance in the large scale network.

Keywords: virtual cut through, wormhole ,latency, deadlock

[1] J. D. Davis, J. Laudon, and K. Olukotun, "Maximizing cmp throughput with mediocre cores," in PACT '05: Proceedings of the 14th International Conference on Parallel Architectures and Compilation Techniques. Washington, DC, USA: IEEEComputer Society, 2005, pp. 51–62.
[2] N. Kirman, M. Kirman, R. K. Dokania, J. F. Martinez, A. B. Apsel, M. A. Watkins, and D. H. Albonesi, "Leveraging optical technology in future bus-based chip multiprocessors," in MICRO 39: Proceedings of the 39th Annual IEEE/ACMInternational Symposium on Microarchitecture. Washington,DC, USA: IEEE Computer Society, 2006, pp. 492–503.
[3] C. A. Nicopoulos, D. Park, J. Kim, N. Vijaykrishnan, M. S. Yousif, and C. R. Das, "Vichar: A dynamic virtual chan-nel regulator for network-on-chip routers," in MICRO 39:Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture. Washington, DC, USA:IEEE Computer Society, 2006, pp. 333–346.
[4] X. Chen and L.-S. Peh, "Leakage power modeling and optimization in interconnection networks," in ISLPED '03:Proceedings of the 2003 international symposium on Low power electronics and design. New York, NY, USA: ACM,2003, pp. 90–95.
[5] T. T. Ye, G. D. Micheli, and L. Benini, "Analysis of power consumption on switch fabrics in network routers," in DAC'02: Proceedings of the 39th conference on Design automa-tion. New York, NY, USA: ACM, 2002, pp. 524–529.

Paper Type : Research Paper
Title : Mining Interesting Medical Knowledge from Big Data
Country : India
Authors : Anand Kot || Nitish Kulkarni || Sushma Kaharat || Pranali Deole || Dr. K. Rajeswari

Abstract: There are many real life applications where uncertain big data is generated. For example: medical data, stock exchange, social media and many more. Big data works on the data which is unstructured. Mining such a huge uncertain data is exhaustive due to the presence of values of items in every transaction in the uncertain data. Meaning there are many items present in big data with a high probability values with respect to its transaction. The value expresses the probability of that item to be present in a particular transaction in the big data. Mining such data is important to generate useful information.

[1]. Carson Kai-Sang Leung Fan Jiang Department of Computer Science, University of Manitoba, Winnipeg, MB, Canada, ―A Data Science Solution for Mining Interesting Patterns from Uncertain Big Data", 2014IEEE.
[2]. Kalavri, V. Brundza, and V. Vlassov, ―Block sampling: efficient accurate online aggregation in MapReduce,‖ in Proc. IEEE CloudCom 2013, Volume 1, pp.250–257.
[3]. A. Cuzzocrea, C. K.-S. Leung, and R. K. MacKinnon, ―Mining constrained frequent itemsets from distributed uncertain data,‖ Future Generation Computer Systems, 37, pp. 117–126, July 2014.
[4]. C. K.-S. Leung, R. K. MacKinnon, and F. Jiang, ―Distributed uncertain data mining for frequent patterns satisfying antimonotonic constraints,‖ in Proc. IEEE AINA Workshops 2014, pp. 1–6.
[5]. M.J. Zaki, ―Parallel and distributed association mining: a survey,‖ IEEE Concurrency, 7(4), pp. 14–25, Oct.–Dec. 1999.
[6]. R. T., Ng, L. V. S. Lakshmanan, J. Han, and A. Pang, ―Exploratory mining and pruning optimizations of constrained associations rules,‖ in Proc. ACM SIGMOD 1998, pp. 13–24.

Paper Type : Research Paper
Title : Automatic Detection of Microaneurysms in digital fundus images using LRE
Country : India
Authors : Raju Sahebrao Maher || Mukta Dhopeshwarkar

Abstract: Diabetic retinopathy is a complication of diabetes and a leading cause of blindness in the world. It occurs when diabetes damages the tiny blood vessels inside the retina. The main two types of diabetic retinopathy the first are non-proliferate diabetes retinopathy (NPDR) and second are proliferate diabetes retinopathy (PDR). Images analysis by trained individuals, which can be a very costly and time consuming task due to the large diabetic population. The increasing number of DR cases world-wide. Therefore, demands to the development of an automated detection system for reduce the work load of ophthalmologists in diagnosis the disease.

[1]. "Visual problems in the US data analysis definition, data sources, detailed data tables, analysis, interpretation. New York," National
society to prevent blindness, 1980, pp.1-46.
[2]. R. Klein, B. Klein, S. Moss, M. Davis, and D. DeMets, "The Wisconsin Epidemiologic Study of Diabetic Retinopathy. Prevalence
and Risk of Diabetic Retinopathy when Age at Diagnosis is Less Than 30 Years" Archives of Ophthalmology, vol. 102, no. 4, 1984,
pp. 520–526.
[3]. R. Klein, B. Klein, S. Moss, M. Davis, and D. DeMets, "The Wisconsin Epidemiologic Study of Diabetic Retinopathy. Prevalence
and Risk of Diabetic Retinopathy when Age at Diagnosis is 30 or more years." Archives of Ophthalmology, vol. 102, no. 4, 1984,
pp. 527–532.

Paper Type : Research Paper
Title : Progressivism, Modernism and Urdu Literature.A Comparative View
Country : Saudi Arabia
Authors : Dr. Syed AfrozAshrafi

Abstract: The paper seeks to explore the holocaust of partition in the subcontinent after the great political divide erupting from 1946 massacre which produced writers like Bedi, Manto and Khwaja Ahmad Abbas. A modest attempt has been made to analyse the long ranging impact on the troubled psyche of the three nations, India, Pakistan and Bangladesh later with reference to three major trends of thoughts in literature. Literary movements produced by the cataclysmic event as deadly as partition of the country India and its impact on the thought process of the suffering nations.

Keywords: Holocaust, massacre, reflections, literary leitmotifs, trends.

[1]. Agha, Wazeer, Dr."BesweenSadikiAdabiTehriken," Pakistani Adab:Tanqid. Ed. Rasheed Amjad and Farooq Ali.Rawalpindi :Fedral Govt. Sir Syed College ,1982. Print
[2]. Akhter, Saleem, Dr. Urdu AdabkiMukhtasirTareekh. (Short History of Urdu literarure) Lahore: Sang-e Mil Publications, 1971. Print
[3]. Narang, Gopi,
[4]. Dr. TarraqiPasandi, Jadidiyat, MabadJadidiyat. Lahore: Sang-e-Mil publications, 2006. Print.
[5]. Majeed, Iqbal. "MashraqiTarraqiPasandi," TarraqiPasndAdab, ed. Prof. QamarRais and Syed AshorKazmi. Lahore: Maktaba-e-Alia , 1994. Print

Paper Type : Research Paper
Title : Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support
Country : Nigeria
Authors : Adamu Umaru || Mohammed Abdul Sarkin-Fada

Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solving rules, facts, and procedure for the basic specific data relevant to the problem domain. The theoretical frame work underpinning this paper is situated on Delone and McLean (1992) causal model for information system, and the conceptual frame work developed by the author's (management support system). The paper also examines the importance of Management Support System, Challenges of Management Support System, i.e. humanistic factors, Organizational factors and Environmental factors, the paper reviewed literature of related studies and made recommendations on how best to tackle the challenges confronting the management support system in our intuitions of higher learning.

Keywords: Management Support System, institutions, ICT, Nigeria.

[1]. DeLone, W.H., & McLean, E.R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3, 1 60–95.
[2]. Carr, N.G. (2003) "IT doesn‟t matter‟, Harvard Business Review, Vol. 81, No. 5.41–49.
[3]. McFarlan, F.W. & Nolan, R.L. (2003) "Why IT does matter‟, Working Knowledge (online). Retrieved, March. 03, 2015 from
[4]. Li, E.Y. (2014) Editorial: Information systems and management in the digital era Int. J. Information Systems and Management, Vol. 1, Nos. 1/2, 2014
[5]. MatebTafere, G. (2014). Information management practice of Bahirdar University. Journal of internet and information system. Vol. 4(1)
[6]. Webber CF (2003).New technologies and educative leadership. J. Edu. Admin. 41(2):119-123.
[7]. Emmanuel O.U, & Etuh B, N. (2014). An Analysis of ICT impact on the Curricular of Major Nigerian Universities in the Last Ten Years 2003-2013. International journal of science and technology. Vol. 3. No.1. 59-66

Paper Type : Research Paper
Title : An Efficient Strategy to Reduce and To Restrict Malicious Attacks on the Web with Web Sense
Country : India
Authors : Dr V.R.Elangovan

Abstract: As the growth of Information Technology and Communication has led to vivid change, people can connect with each other globally at anywhere and in anytime through search engines. These search engines has also tremendously increasing in this modern computerized world. People can use these search engines to gather information and to communicate together. Searching relevant information in the Internet is hard task. Usually, this searching process in the search engines can be done by using list of links available on the site. This link is nothing but a keyword; when choosing the keyword, the search engine can navigate through the web pages that are related with that keyword.

[1]. Anthoniraj Amalanathan, Senthilnathan Muthukumaravel, "Semantic Web Crawler Based on Lexical Database", IOSR Journal of Engineering, Vol. 2(4), Apr. 2012.
[2]. Chetna, Harpal Tanwar, Navdeep Bohra, "An Approach to Reduce Web Crawler Traffic Using ASP.Net", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012.
[3]. Articles about Web Crawlers available at - << Examples_ of_ Web_ Crawlers.
[4]. Yuan, X.M. and J. Harms, "An efficient scheme to remove crawler traffic from the internet", Proceedings of the 11th International Conference on Computer Communications and Networks,14- 16, IEEE CS Press, (pp: 90-95), Oct 2002.
[5]. Ikada, Satoshi, "Bandwidth Control System and method capable of reducing traffic congestion on content servers" Dec 2008.

Paper Type : Research Paper
Title : Influence Of Beliefs Held By Care Givers On Help Seeking Behavior In The Treatment Of Mental Illness Among Mentally Ill Patients In Nakuru Municipality Kenya.
Country : Kenya
Authors : Lydia .N.Ngatia || Mary.W.Kariuki || Teresia Njonge

Abstract: Beliefs, attitudes, gender and counselling play an important role in the health of a people. They influence every aspect of life including government, economy, art, music, education, religion, technology and health. The purpose of the study was to examine how beliefs held by care givers influence help seeking behavior in the treatment of mental illness in Nakuru municipality Kenya. The Descriptive Survey research design was used in this study. The study was carried out in Nakuru Municipality, Kenya amongst caregivers of mentally ill patients and mental health professionals The study population was caregivers of mentally ill patients in Nakuru Municipality who were approximately 793 at the time of the study. Purposive sampling procedure was used to select the population of study.

[1]. Desjarlais, C., (1995). World Mental Health: Problems and Priorities in Low Income Countries. New York: Oxford University Press.
[2]. Barker, (1999). The Social work Dictionary (4th). National Association of Social Work (NASW). Washington, D.C.
[3]. World Health Organization (2006) Mental health care in developing countries: a critical appraisal of research findings. Geneva
[4]. Nguyen A: Cultural and social attitudes towards mental illness in Ho Chi Minh City, Vietnam. Stanford Undergraduate Research
Journal 2003, 2:27-31.
[5]. World Health Organization, (2003). Investing in Mental Health. Magnitude and burden of. mental disorders: Geneva
[6]. Asuni,T., & Schoenberg, F., & Swift, T., (1994). Mental Health and Disease in Africa: Ibadan Nigeria, Polygraphic Ventures Ltd
[7]. Tsala-T., (1997). Beliefs and Disease in Cameroon. In S.N. Madu, P.K. Baguma and Pritz, A.(eds) Psychotherapy in Africa: First
investigation. Vienna. World council for Psychotherapy, pp.44.

Paper Type : Research Paper
Title : A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Country : Bangladesh
Authors : Md. Sahmsujjoha || Touhid Bhuiyan

Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency of occurrence. Then the semantic concept is evaluated throughRGB histogram dissimilarity factor, overall dissimilarity factor and regional dissimilarity factor. These dissimilarities cooperativelydetermine the local concept for theunshaped object. In addition, the semantic concept for shaped objects is measured through the normalized color findings, synchronized edge detection, small unnecessary particleremotion, and shape similarity checking. All these measurements mutually rank the shaped objects according to their probability of occurrences. In addition, several algorithms and theoretical explanations of the proposed semantic models have been presented.

[1]. S. Agarwal, A. Awan andD. Roth, "Learning to detect objects in images via a sparse, part-based representation", Pattern Analysis
and Machine Intelligence, IEEE Transactions on, vol.26, no.11, pp:1475-1490, 2004.
[2]. R. W. White, I. Ruthven and J. M. Jose, "A study of factors affecting the utility of implicit relevance feedback.", in 28th annual
international ACM SIGIR conference on Research and development in information retrieval (SIGIR), 2005.
[3]. S. Feng, R. Manmatha and V. Lavrenko, "Multiple bernoulli relevance models for image and video annotation", in CIVR, Dublin,
Ireland, 2004.
[4]. F. S. Khan, R. M. Anwer, J. V. D. Weijer, A. D. Bagdanov, M. Vanrell and A. M. Lopez, "Color Attributes for Object Detection",
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp: 3306-3313, 2012.
[5]. R. Zhang, Z. Zhang and Z. Qin, "Semantic repository modeling in image database", IEEE International Conference on Multimedia
and Expo (ICME), vol.3, pp:2079-2082, 2004.
[6]. G.Passino,I. Patras and E. Izquierdo, "Pyramidal Model for Image Semantic Segmentation", 20thInternational Conference on
Pattern Recognition (ICPR), pp.1554-1557, 2010.
[7]. Z. Xu and Zhang S., "Artificial Visual Cortical Responding Model in Image Semantic Processing", IEEE/ACS International
Conference on Computer Systems and Applications, pp:722-725, 2007.

Paper Type : Research Paper
Title : Use of Artificial Neural Networks Type MLP for the Prediction of Phosphorus Level from the Physicochemical Parameters of Sediments
Country : Morocco
Authors : Monyr Naoual || Abdallaoui Abdelaziz || El Hmaidi Abdellah

Abstract: The present work is a contribution on the development of mathematical models for predicting the phosphorus contents based on the physicochemical properties of the sediments of the reservoir of the water dam Sidi Chahed (Meknes, Morocco). For that purpose, artificial neural networks (ANN) of type multilayer perceptron (MLP) was used. The data base used corresponds to 118 samples of superficial sediments taken from several stations, and distributed in space and time at the level of the reservoir of the water power plant Sidi Chahed. This data base of the neural network, which was collected between 2010 and 2012, consists of the phosphorus content (variable to explain or to predict) and physical and chemical parameters as explicative or predictive variables.

[1] O. El Fatni, L. Gourari, D. Ouarhache, M. Chaffai, H. El Arabi, K. Boumir, and A. El Khanchou, Problème de salinité de la
retenue du barrage Sidi Chahed: Etat des lieux et perspectives, 3rd International Days of Environmental Geosciences, El Jadida,
Maroc, 2005.
[2] A. Dehbi, Etude des paramètres physico-chimiques et du phosphore total des sédiments superficiels de la retenue du barrage Sidi
Chahed, Région de Meknès, Thése de Troisième siècle, Faculté des Sciences de Meknès, Chemie, 2011.
[3] D. Abrid, A. El Hmaidi, A. Abdallaoui, O. Fassi FihriI, and A. Essahlaoui, Impact de la pollution sur les eaux de l'oued
Boufekrane (Meknès-Maroc): Etude physicochimique et bactériologique Physic. Chemical", Journal Physical and Chemical News,
58, 2011, 98-104.
[4] D. Abrid, A. El Hmaidi, A. Abdallaoui, and A. Essahlaoui, Apport du système d'information géographique à l'évaluation de la
contamination métallique contenue dans les sédiments de la retenue du barrage Sidi Chahed ( Meknès, Maroc), International
Conference of GIS-Users, Taza GIS-days, Fès, Proceeding Book , 2012a, 396-398.
[5] D. Abrid, A. El Hmaidi, A. Abdallaoui, O. Fassi FihriI, and A. Essahlaoui, Etude de la contamination métallique des sédiments de
la retenue du barrage Sidi Chahed (NE de Meknès, Maroc), Journal of Hydrocarbons Mines and Environmental Research, 3(2),
2012b, 55-60.

Paper Type : Research Paper
Title : Classifying Evaluation Secure Patterns under Attacks
Country : India
Authors : Mitnasala Mamatha || Hussain Syed

Abstract: Pattern Classification is one division for machine discovering that spotlights on acknowledgment of examples and regularities in information. In antagonistic applications such as biometric verification, spam sifting, system interruption identification the example grouping frameworks are utilized. Design arrangement frameworks might display vulnerabilities if antagonistic situation is not considered. Multimodal biometric frameworks are heartier to parodying assaults, as they consolidate data originating from various biometric characteristics.

[1]. R.N. Rodrigues, L.L. Ling, and V. Govindaraju, "Robustness ofMultimodal Biometric Fusion Methods against Spoof Attacks,"J.
Visual Languages and Computing, vol. 20, no. 3, pp. 169-179, 2009.
[2]. P. Johnson, B. Tan, and S. Schuckers, "Multimodal Fusion Vulnerabilityto Non-Zero Effort (Spoof) Imposters," Proc. IEEE
Int‟lWorkshop Information Forensics and Security, pp. 1-5, 2010.
[3]. P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee,"Polymorphic Blending Attacks," Proc. 15th Conf. USENIX
SecuritySymp., 2006.
[4]. G.L. Wittel and S.F. Wu, "On Attacking Statistical Spam Filters,"Proc.First Conf. Email and Anti-Spam, 2004.

Researcher can also search IOSR published article contents through

IOSR Xplore