IOSR Journal of Computer Engineering (IOSR-JCE)

Jan. – Feb. 2016 Volume 18 - Issue 1

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology
Country : India
Authors : Vincent O. Omwenga

Abstract: Recent approaches in mobile computing consider context to be central to the design and implementation of mobile applications. Context considerations enables the mobile application to respond to the needs and purpose it is intended for. Qualitative and quantitative research techniques have been applied to investigate and come up with components that are critical in the development of context-centred mobile applications.It is however critical to understand how toseparatecore application logic from adaptive functionality in order toachieve a context-centred mobile applications.

[1]. Benou,P., &Bitos, V. (2008), Developing Mobile Commerce Applications. Journal of Electronic commerce in Organizations, Volume 6, Issue 1.
[2]. Brown, J., Bovey, D., & Chen, X. (1997). Context-Centeredapplications: From the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58-64.
[3]. Buthpitiya, S., Cheng,H., T., Sun,F., T., Griss,M. &Dey,A.,K.(2011). Hermes: a Context-Centeredapplication development framework for the Mobile Environment. Carnegie Mellon University.
[4]. Dehlinger, J., &Dixon,J. (2011). Mobile Application Software Engineering: Challenges and Research Directions. Department of Computer and Information Sciences -Towson University
[5]. Dey, A., &Abowd, G. (1999). Towards a better understanding of context and context-awareness. Technical Report 99-22. Georgia Institute of Technology.

Paper Type : Research Paper
Title : Secure Group Key Management using Ciphertext in MANETs
Country : India
Authors : P Swetha || Dr. P. Premchand || Dr. P. Naveen Kumar

Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted communication from the cluster/group nodes to the sender and unavailability of a trusted public/private key generation center. This paper proposes a technique that uses a combination of broadcast encryption technique and Cluster/Group key agreement to overcome the obstacles. Among the proposed techniques each member maintains one public/secret key pair, seeing that the remote sender broadcasts to the subgroup. Though the non-intended member conspire they will not extractinformation that boosts security of the message. The Cluster /Group size is independent of computation and communication overhead that decreases the delay. The proposed technique provides competent approach to add or delete members of a cluster and a flexible rekeying strategy. In case of conspiracy it provides security to the broadcasted data. Simulation results are given using NS2.

Keywords: MANET, network lifetime, throughput,Network delay.

[1]. Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Fellow, IEEE, and JesúsA. Manjón "Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm"- IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013.
[2]. M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," Adv. Cryptol., vol. 950, EUROCRYPT'94, LNCS, pp. 275–286, 1995.
[3]. M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The versakey framework: Versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614–1631, Sep. 1999.
[4]. M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769–780, Aug. 2000.
[5]. A. Sherman and D. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, May 2003.

Paper Type : Research Paper
Title : Energy Efficient Query Optimization in WSN usingThreeLevel Modelling
Country : India
Authors : C.Komalavalli || VijayBhushanAggarwal

Abstract: With advancement in microprocessor technology, wireless sensor networks is playing vital role in different types of applications such as health care monitoring, fire detection etc. In these applications, large amount of data generated by the sensors are communicated to the base station, which will provide final result for the query. Since the sensor nodes are energy constraint devices, energy efficient query methods and storage of the data is required. Clustering is playing an important role in enhancement of the energy level of the sensor and scalability of the network. Since communication depletes the energy level of the sensor, further selection of
cluster head is important for reducing the communication cost. In this paper, we are introducing the model along with algorithm for the cluster head selection and efficient query processing in WSN.
Keywords:WSN, Clustering, Base Station, Cluster Head, Tiny DB

1]. Ousmane Diallo, Joel J. P. C. Rodrigues, Senior Member, IEEE, Mbaye Sene, and Jaime Lloret, Senior Member –"Distributed
Database Management Techniques for Wireless Sensor Networks",IEEE Transcations on Parallel and Distributed Systems,IEEE
[2]. MeenakshiDiwakar, Sushil Kumar – " An Energy Efficient Level Based Clustering Routing Protocol For Wireless Sensor
Networks", International Journal Of Advanced Sensor Network Systems, Vol 2, No 2, April 2012
[3]. Devesh Pratap Singh, R. H. Goudar , Bhasker Pant , Sreenivasa Rao-" Cluster head selection by randomness with data recovery in
WSN" , Aug 2014, Springer
[4]. C. Komalavalli, Chetna Laroiya Energy Efficient Protocol in Wireless Sensor Network: Reactive On-Demand Routing, IITM
Journal for Management & IT, Vol 2 Issue 1,2010
[5]. SrieVidhya Janani. E, Ganeshkumar.P, Vasantha Suganthi.G, Sultan.M, Kaleeswaran. D," A Survey on Algorithms for Cluster Head
Selection in WSN", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No
5, May 2013

Paper Type : Research Paper
Title : An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
Country : India
Authors : ApurvaK.Vangujar || Kajal Agrawal

Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained.
Keywords: cryptography, decryption, encryption, unimodular matrix, Armstrong numbers

1]. Ajmal, K., et al. Security using Colors, Figures and Images. in International Conference on Emerging Technology Trends on
Advanced Engineering Research (ICETT'12) Proceedings published by International Journal of Computer Applications (IJCA).
[2]. Belose, S., M. Malekar, and G. Dharmawat, Data Security Using Armstrong Numbers. International Journal of Emerging
Technology and Advanced Engineering. ISSN, 2012: p. 2250-2459.
[3]. Stallings, W., Cryptography and Network Security, 4/E. 2006: Pearson Education India.
[4]. Anoop, M., Public key Cryptography-applications Algorithms and Mathematical Explanations. Tata Elxsi Ltd, India, 2007.
[5]. Rescorla, E., Diffie-Hellman key agreement method. 1999.
[6]. Weisstein, E.W., Unimodular matrix. 2003.

Paper Type : Research Paper
Title : A Review: Hadoop Storage and Clustering Algorithms
Country : India
Authors : Latika Kakkar || Gaurav Mehta

Abstract: In the last few years there has been voluminous increase in the storing and processing of data, which require convincing speed and also requirement of storage space. Big data is a defined as large, diverse and complex data sets which has issues of storage, analysis and visualization for processing results. Four characteristics of Big data which are–Volume, Value, Variety and Velocity makes it difficult for traditional systems to process the big data. Apache Hadoop is an auspicious software framework that develops applications
that process huge amounts of data in parallel with large clusters of commodity hardware in a fault-tolerant and veracious manner. Various performance metrics such as reliability, fault tolerance, accuracy, confidentiality and security are improved as with the use of Hadoop.

[1] Mayer-Schönberger V, Cukier K, Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin
Harcourt, 2013.
[2] Chen M, Mao S, Liu Y, Big data: A survey: Mobile Networks and Applications, 19(2), 2014 Apr 1, 171-209.
[3] Labrinidis A, Jagadish HV, Challenges and opportunities with big data, Proceedings of the VLDB Endowment, 5(12), 2012 Aug
[4] Chaudhuri S, Dayal U, Narasayya V, An overview of business intelligence technology, Communications of the ACM,54(8), 2011
Aug 1,88-98.
[5] Agrawal D, Bernstein P, Bertino E, Davidson S, Dayal U, Franklin M, Gehrke J, Haas L, Halevy A, Han J, Jagadish HV,
Challenges and Opportunities with big data, 2011-1.
[6] Apache Hadoop,

Paper Type : Research Paper
Title : A Review on E-Learning in Higher Education
Country : India
Authors : Mohammad Bani Younes || Samer Al-Zoubi

Abstract: E-learning is basically the computer and network-enabled transfer of skills and knowledge to learners. It is considered one of the most successful educational media, especially after realizing that learning is no longer becomes a stage in human life but it has become a continuous and lasting process and it is essential for the individual as well as for the entire community. However, e-learning offers the possibility of continuous learning and its characteristics that makes it a significant element in the learning process. Still, the main goal of
this article is to increase the awareness of the community members towards the importance of e-learning currently, and that the integration of this method with the traditional method in learning usually provides valuable and encouraging results.

[1] Dr. V. Sarpi, The use of ict in higher education, Shramjivi College of Education, Omerga Dist.Osmanabad, An International Peer-
Reviewed Open Access Journal, 1(3), 2015, 778-781.
[2] A. S. Safi, E.T. Liga and C. Sanga, New technologies for teaching and learning: challenges for higher learning institutions in
developing countries, Sokoine University of Agriculture, Tanzania, International Journal of Education and Development using
Information and Communication Technology, 3(2), 2007, 253-275.
[3] D. G. Oblinger and B. L. Hawkins, The myth about e-learning. educause review, 2005.
[4] J. K. Njenga, L. H. Fourie, The myths about e-learning in higher education, British Journal of Educational Technology, 41(2), 2010,
[5] G. Singh, J. O'Donoghue and H. Worton, A study into the effects of elearning on higher education, Journal of University Teaching
and Learning Practice, 2(1), 2005, 13-24.
[6] V. Medarova, V. Bures and T. Otcenaskova, A review of obstacles to successful e-learning deployment in SMEs, IBIMA
Publishing, Journal of Innovation Management in Small & Medium Enterprises, vol. 2012, Article ID 715039, DOI:
10.5171/2012.715039, 2012, 1-9.

Paper Type : Research Paper
Title : A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique
Country : India
Authors : Rituparna Halder || Susmit Sengupta || Sudipta Ghosh || Debashish Kundu

Abstract: Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Therefore from time to time researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this paper we have proposed a new technique of image steganography i.e. Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method.


Paper Type : Research Paper
Title : Utilization of Weight Allocation in Tf-Idf Environment for Noise
Detection Enhancement
Country : Kenya
Authors : Evelyne Chanya Shuma || Prof. Waweru Mwangi || Dr. Michael Kimwele

Abstract: Social media data mining has gained significance in the recent past. This owes to the importance of establishing hidden patterns in the social media data that can be used in digital marketing strategies. It helps the marketers to segment customers according to their demographics and behavioral characteristics such that it becomes easier to target these customer segments with advertisement messages suitable for their cluster. As such, it becomes paramount to discover and eliminate any data that may not influence customer buying trends. This constitutes noise removal. Weight allocation then becomes crucial in identifying keywords from social media data that can help in the clustering process.

[1]. Curran, J, & Lennon, R. (2011). Participating in the Conversation: Exploring adoption of Online Social Media Networks. Academy
of Marketing Studies Journal 15(1), 21-38.
[2]. Reza Zafarani and Huan Liu, Arizona State University (2014). Behavior Analysis in Social Media
[3]. Anderson, T. H.C. (December 6, 2009). College Students say Facebook is the only Social Networking site that really matters.
[4]. Ito, M., Horst, H., Bittanti, M., Boyd, D., Herr-Stephenson, B., Lange, G., Pascoe, D.J., & Robinson, L. (2008). Living and learning
with new media; Summary of the findings from the digital youth project. Chicago.
[5]. Protalinski, E. (2012). Facebook has over 845 million users.
[6]. Perreau F. (2015). The Consumer FactorConsumer Insights, Market Research, Consumer Behavior & Neuromarketing.
[7]. Lennon R., Rentfro W. & Curran J.(2015). Exploring relationships between demographic variables and social networking use.
Journal of Management and Marketing Research.
[8]. John H. Heinrichs1, Jeen-Su Lim And Kee-Sook Lim (2011), Influence of social networking site and user access method on social
media evaluation

Paper Type : Research Paper
Title : Development of Security Based Reserved Agreement Blocker for Smartphone
Country : India
Authors : Ms. Shirin Ayisha Maryam. M || S. Arogya Swarna

Abstract: Smart phones are very effective tools for increasing the productivity of business users. With their increasing computational power and storage capacity, smartphones allow end users to perform several tasks and be always updated while on the move. In Existing system, the location-based policy systems (LPS) are not accurate enough to differentiate between nearby locations without extra hardware or location devices. In most cases, such systems assume the context as given without providing or evaluating context detection methods of mobile devices. In order to overcome this issue, context-based access control (CBAC) mechanismhave been proposed. By means of CBAC, many privileges can be dynamically granted or revoked to applications based on the specific context of the user.

[1]. MOSES: Supporting and Enforcing Security Profiles on Smartphones(2014)Yury Zhauniarovich, Giovanni Russello Mauro Conti, Member, IEEE,Bruno Crisp and Earlence Fernandes. ieee transactions on dependable and secure computing, vol. 11, no. 3, may-june 2014

[2]. M. Oleaga, 2013, "OS vs. Android Market Share 2013: Google Mobile Platform Dominating Apple Worldwide in March Figures", http://www. mobile-platform-dominating.htm, accessed 25 March 2013.

[3]. O.Hou, 2012, "A Look at Google Bouncer", http://blog., accessed 14 April 2013

[4]. FY. Rashid, 2012, "Researchers upload dangerous app to Google Play store",,blackhat-researchers- upload-dangerous-app-to-google-play-store.aspx, accessed 14 April 2013

[5]. Y. Zhou, X. Zhang, X. Jiang & V. Freeh, "Taming information-stealing smartphone applications (on Android)", TRUST 2011, pp. 93-107.
[6]. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev & C. Glezer, "Google Android: A Comprehensive Security Assessment", IEEE Security & Privacy Magazine, Vol. 8, no. 2, 2012, pp. 35-44.

Paper Type : Research Paper
Title : Secure Data Sharing Using Cryptography in Cloud Environment
Country : India
Authors : Anjali Patel || Nimisha Patel || Dr. Hiren Patel

Abstract: Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control over own data because data controlled by the third party called cloud service providers (CSP). Data security is challenging problem when data owner shares own data to another known as data sharer on cloud. Many researchers have addressed this issue by cryptography with different encryption schemes that provides secure data sharing on cloud. Here, we propose system model for secure data sharing on cloud with intension to provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption by users, support dynamically changes of users membership and owner should not be always online when the user wants to access the data.

Keywords: Cloud Computing, Data security, Cloud Service Providers (CSP), Secure Sharing, Cryptography, Access control

[1] Mell P. and Grane T. (September 2011), "The NIST Definition of Cloud Computing," National Institute ofStandards and Technology (NIST) [Online], Available:
[2] Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li and Albert Y. Zomaya,SeDaSC: Secure Data Sharing in Clouds,SYSTEMS JOURNAL PP,no.99,2015,1-10.
[3] Hussain Aljafera, Zaki Malika, Mohammed Alodibb and Abdelmounaam Rezguic,A brief overview and an experimental evaluation of data confidentiality measures on the cloud,JOURNAL OF INNOVATION IN DIGITAL ECOSYSTEMS 1, no.1-2,2014,1–11.
[4] Minu George, Dr. C.Suresh Gnanadhas and Saranya.K,A Survey on Attribute Based Encryption Scheme in Cloud Computing , International Journal of Advanced Research in Computer and Communication Engineering 2, no. 11,2013,4408-4412.
[5] Md Mozammil Alam, Sourav Hati, Debashis De and Samiran Chattopadhyay,Secure Sharing of Mobile Device Data using Public Cloud,Confluence The Next Generation Information Technology Summit,2014,149 – 154.

Paper Type : Research Paper
Title : Design and Implementation of Secured E-Commerce System
Country : India
Authors : Buthainah Fahran Abed || Rafah Shihab Al-Hamadani || Saja Ghassan Mohmmed

Abstract: E-commerce involves the process of buying, selling, and exchanging of products, services, and information via computer networks, primarily the Internet. The objective of this paper is to identify obstacles that facing the implementation of e-commerce system and providing security solutions to protect sensitive information. In the practical part the paper presents the design and implementation of secure site that allow the customers to search and buy products at anytime and anyplace through the Internet. All data are archived and stored in the proposed system, so that the administrator can easily search and retrieve information at any time and can make changes to them.

Keywords: Security, Safety, Encryption, E-commerce, Site, Attacker

[1] ''Introduction to Computers'' ,

[2] Y. A. Nanehkaran ,''An Introduction To Electronic Commerce'' , INTERNATIONAL JOURNA L OF SCIENTIFIC & TECHNOLOGY RESEARC H VOLUME 2ISSUE 4 , APRIL 2013. ISSN 2277-8616

[3] R. Lerdorf, K. Tatroe, B. Kaehms, and R. McGredy, "Programming PHP", Published by O'Reilly & Associates, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.

[5] M. Niranjanamurthy, D. Chahar, ''The study of E-Commerce Security Issues and Solutions'' , International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7,July 2013, ISSN (Online) : 2278-1021

[6] N. Shafiyah, R. Alsaqour, H. Shaker, O. Alsaqour and M. Uddin, ''Review on Electronic Commerce'', Middle-East Journal of Scientific Research 18 (9): 1357-1365, 2013 ISSN 1990-9233, © IDOSI Publications, 2013, DOI: 10.5829/idosi.mejsr. 2013.18.9.12421

[7] D. Pandey, V. Agarwal, " E-commerce Transactions: An Empirical Study", IJARCSSE All Rights Reserved Page | 669 Volume 4, Issue 3,March 2014, ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering, Research Paper Available online at:

Paper Type : Research Paper
Title : An Improved Genetic Algorithm Based On Adaptive Differential Evolution
Country : China
Authors : Feng Jiang || Yi Shen || Panpan Ge || Chen Zhang || Mingxin Yuan

Abstract: In order to solve the premature convergence and improve the optimization ability of simple genetic algorithm (SGA) in the complex function optimization, an improved differential evolution based-genetic algorithm (DGA) is proposed in this paper. On the basis of the selection and crossover operation of SGA, the adaptive differential evolution operator is used as the main optimization method to realize the mutation operation. Furthermore, the optimal reservation and worst elimination strategies are added in the SGA. All of these improvements can significantly improve the optimization performance of SGA. Compared with the SGA, the simulation results of function optimization show that the proposed DGA is characterized by strong global optimization ability, quick convergence speed and good stability, which shows the validity of the improvements to simple genetic algorithm.

Keywords: Self-adaption, Differential evolution, Genetic Algorithm, Function optimization

[1]. L.B. Booker, D.E. Goldberg, J.H. Holland, Classifier systems and genetic algorithms, Artificial Intelligence, 89,1989,235–282.
[2]. G. Gong, G.S. Hao, F. Yang, An improved algorithm for the suppression of premature convergence of genetic algorithms, Computer and Digital Engineering, 5, 2009, 6-9, 16.
[3]. L. Ling, Y.J. Hu, Q.Q. Wang, J.J. Zhang. Optimization of hole group machining path based on improved genetic algorithm, Journal of Huazhong University of Science and Technology (NATURAL SCIENCE EDITION), 8, 2009, 88-91.
[4]. R. Storn, K. Price, Differential evolution-a simple and efficient heuristic for global optimization over continuous space, Journal of Global Optimization, 4, 1997, 341-359.
[5]. Y.L. Zhou, Y.H. Zhu, Discrete differential evolution with fitness uniform selection scheme, Journal of Chinese Computer Systems, 1, 2012, 151-154.
[6]. M.X. Yuan, H.F. Du, S.A. Wang, J. Zhuan, Chaos small-world optimal algorithm based on population entropy,Journal of Xi'an Jiaotong University,9,2008,1137-1141.

Paper Type : Research Paper
Title : Test Cases Prioritization For Event –Driven Software By Using Genetic Algorithm
Country : INDIA
Authors : D. Vivekananda Reddy || Dr. A. Rama Mohan Reddy

Abstract: Event-Driven software (EDS) is being used very frequently in this interconnected world of ubiquitous computing. Two mostly used classes are the GUI stand alone applications and Web applications. Testing of these two applications take significant amount of time because testing is composed of large number of test cases. Due to their user –centric nature, GUI and Web systems routinely undergo changes as part of their maintenance process. New versions of the applications are often created as a result of bug fixes or requirements modification. In such situations, a large number of test cases may be available from testing previous versions of the application which are often reused to test the new version of application. Moreover an event is to be tested in each and every state thus requiring large number of test cases. Substantially there is lack of single generic model and a ranking algorithm that efficiently orders the tests for execution which works for both applications. Now the motivation is to come up with a generic testing model for both applications, a shared prioritization function based on the abstract model that uses a genetic algorithm, and shared prioritization criteria that effectively reduces the testing time and cost. Ultimate goal is to generalize the model and use it to develop a unified theory how all EDS should be tested.

Keywords: Event-Driven software, Test cases, prioritization criteria, Genetic algorithm.

[1]. Renee CBryce, SreedeviSampath, and Atif M. Memon, "Developing a Single Model and Test prioritization Strategies for Event-Driven Software", IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, pp.48-64, Jan 2011.
[2]. Steffen Herbold, Jens Grabowski, Stephan Waack, "A Model for Usage-based Testing of Event-driven Software", 5th International Conference on Secure Software Integration & reliability, pp.172-178, Aug- 2011.
[3]. Mark Utting, Alexander Pretschner and Bruno Legeard, "A Taxonomy Of Model Based Testing", Working paper by Waikato,pp.1-17, April 2006.
[4]. DING Xiao-Ling, DING Chun, Hou Yong hong, "An Approach To Event-Driven Software Testing", Vol .8.No-4, pp.265-268, Dec-2002.
[5]. Renee C.Bryce, AtifM.Memon, "Test suite Prioritization By Interaction Coverage", Workshop on Domain specific Software Test automation in Conjunction with the 6th ESEC/FSE Joint Meeting, pp.1-7, Sep-2007.

Researcher can also search IOSR published article contents through

IOSR Xplore