IOSR Journal of Computer Engineering (IOSR-JCE)

March – April 2016 Volume 18 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Optimized Framework for Online Admission Systems With Reference To Professional Programmes in Maharashtra
Country : India
Authors : Mrs. Madhuri P. Pant || Dr. Sachin A. Kadam

Abstract: As Admission system is a process, researchers are going to concentrate on standardization, evaluation and optimization. This research paper presents optimized framework for Online Admission process. Framework is derived from study of processes followed for Online Admissions by IITs (Indian Institute of Technology) in India, MIT(Massachusetts Institute of Technology, USA) and 46 eminent organizations' conducting various Professional Programmes(8) like Engineering and Technology, Management (MBA and MCA), Health Sciences, Agriculture, Pharmacy, Education, Law Programmes in Maharashtra. Framework is presented in UML which is universally accepted for modeling and design of a system.

Keywords: Online Admission System (OAS), Professional Programmes, framework, optimization.

[1] http://www.studymode.com/essays/Online-Admission-Processing-System
[2] Gifford, Juanita Briceño-Perriott and Frank Mianzo "Pen to Mouse: Web-Based Technology‟s Impact on College Admission Applications" SUMMER 2005 JOURNAL OF COLLEGE ADMISSION
[3] www.dte.org
[4] http://symbiosis.ac.in
[5] www.bvuniversity.edu.in
[6] http://www.dypatil.ac.in
[7] http://www.dpu.edu.in
[8] http://www.nmims.edu


Paper Type : Research Paper
Title : Improved Product Ranking For Recommendation Systems
Country : India
Authors : Tanha Joshi

Abstract: In the new area of information technology, the most important and recognition machine learning technique is Recommender engine. Vast numbers of knowledge discovery techniques are applied by recommender system to the problem of making personalized recommendation for product, information and services during a live interaction [5].............

Keywords: Recommender System, Evaluate, Data Sparsity

[1]. Zhonghuo Wu,Jun Zheng,Su wang Hongfeng Feng "Combined predictor for item based collaborative filtering" 2013 5th International Conference on Intelligent Networking and Collaborative Systems
[2]. Chandima Hewa, Nadungodage, Yuni Xia "GPU Accelerated item based collaborative filtering for big data applications" 2013 IEEE International Conference on Big Data
[3]. Jinbo Zhang, Zhiqing Lin, Bo Xiao, Chuang Zhang "An optimized item based collaborative filtering recommendation algorithm" Proceedings of IC-NIDC2009
[4]. Heung-Nam Kim1, Ae-Ttie Ji1, and Geun-Sik Jo2"Enhanced prediction algorithm for item- based collaborative filtering recommendation" 2006. © Springer-Verlag Berlin Heidelberg 2006
[5]. Badrul Sarwar, George Karypis,Joseph Konstan, and John Riedl "item-based collaborative filtering recommendation algorithms" ACM 1-58113- 348-0/01/0005.


Paper Type : Research Paper
Title : Accurate Localization of Wireless Sensor Node Using Genetic Algorithm And Kalman Filter
Country : India
Authors : Aditi Shrivastava || Dr. Kavita Burse || Saurabh Jain

Abstract: In wireless sensor network finding the node position is known as localization. Wireless sensor networks are widely adopted in many location sensitive applications including disaster management, environmental monitoring, military applications where the precise estimation of each node position is inevitably important when the absolute positions of a relatively small portion as anchor nodes of the underlying network were predetermined. Intrinsically, localization is an unconstrained optimization problem based on various distance/path measures......

Keywords:WSN, Localization, Optimization, Genetic Algorithm

[1]. Guangjie Han, Huihui Xu, Trung Q. Duong, Jinfang Jiangand Takahiro Hara "Localization algorithms of Wireless
[2]. Sensor Networks: a survey", Telecommunication Systems
[3]. Modelling, Analysis, Design and Management ISSN 1018-4864Telecommun System, DOI 10.1007/s11235-011-9564-7.
[4]. Y. Zhang, S. Liu, and Z. Jia, "Localization using joint distance and angle information for 3D wireless sensor networks," IEEE Commun. Lett., vol. 16, no. 6, pp. 809–811, Jun. 2012.
[5]. B.-C. Liu and K.-H. Lin, "Accuracy improvement of SSSD circular positioning in cellular networks," IEEE Trans. Veh. Technol., vol. 60, no. 4,pp. 1766–1774, May 2011


Paper Type : Research Paper
Title : Automatic Ontology Creation for Research Paper Classification
Country : India
Authors : Ankita

Abstract: As a large number of research proposals are received at different journal or research institute, it is common to group them according to their similarities in research disciplines and the grouped proposals are then assigned to the appropriate experts for peer review. Grouping in Current scenario is done by manual matching of similar research discipline areas and/or keyword.......

Keywords: Information Extraction, Text Analysis, Ontology, feature extraction, text categorization, clustering

[1]. E. M. Voorhees. Implementing Agglomerative Hierarchical Clustering for use in Information Retrieval,Technical Report TR86–765, Cornell University, Ithaca, NY, July 1986.
[2]. Young, L., Tu, S.W., Tennakoon, L., Vismer, D., Astakhov, V., Gupta, A., Grethe, J.S.,Martone, M.E., Das, A.K., McAuliffe, M.J.: Ontology Driven Data Integration for Autism Research. 22nd IEEE International Symposium on Computer Based Medical Systems, pp. 1–7, Albuquerque, NM (2009)
[3]. List of English stop words, http://members.unine.ch/jacques.savoy/clef
[4]. Joho, H., Sanderson, M., Retrieving Descriptive Phrases from Large Amounts of Free Text. 9th ACM Conference on Information and Knowledge Management, pp. 180--186, McLean, VA (2000)
[5]. M. W. Berry, Survey of Text Mining: Clustering, Classi_cation, and Retrieval, New York: Springer, 2003, pp. 1-122.


Paper Type : Research Paper
Title : Role of Fuzzy Set in Students' Performance Prediction
Country : India
Authors : Mrs. Jyoti Upadhyay || Dr. Pratima Gautam

Abstract:We can use educational data mining to predict student' performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learning is one of the most famous practical methods for analytical study. We use DT as prediction method in this paper. In this paper we propose a model using fuzzy set to predict more accurate result.Fuzzy logic brings in an improvement of analysis aspects due to the elasticity of fuzzy sets formalism. Therefore, we proposed a decision tree on fuzzy set data, which combines ID3 with fuzzy theory.The results are compared to some other popular classification algorithms.........

Keywords: Decision tree, Fuzzy set, Data mining

[1]. T.Miranda Lakshmi , A.Martin ,others,An Analysis on Performance of Decision Tree Algorithms using Student's Qualitative Data,I.J.Modern Education and Computer Science, 5, 18-27, 2013
[2]. Abeer Badr El Din Ahmed, Ibrahim Sayed Elaraby,Data Mining: A prediction for Student's Performance Using Classification Method,World Journal of Computer Application and Technology,vol2,43-47, 2014
[3]. Y.-l. Chen, T. Wang, B.-s. Wang, and Z.-j. Li, "A survey of fuzzy decision tree classifier," Fuzzy Information and Engineering, vol. 1, pp. 149–159, June 2009.
[4]. FuzzyLogical Toolbox: zmf. Matlab Help. The MathWorks, Inc. 1984-2004.
[5]. TIEN-CHIN WANG,HSIEN-DA LEE,Constructing a Fuzzy Decision Tree by Integrating Fuzzy Sets and Entropy


Paper Type : Research Paper
Title : Online Voting System (Android Application)
Country : India
Authors : Shruti Thakkar || Nisha Pawar || Nikita Sarang || Prof.Vijaylaxmi Kadrolli

Abstract: Voting is the HEART of democracy. Voting provides a way to select a Leader to manage problems and other issues. The basis of this project is to create an Android application based on which voting can be performed. Also it will help to eradicate defrauding of the traditional voting system which involve voting by multiple votes cast by the same user. With an Android Application, one can login into the system using their VOTER ID and password to get authenticated further.......

Keywords: Android, ECLIPSE ADT, voting, encryption, play fair cipher.

[1]. A.S. Belenky and R.C. Larson, "To Queue or not to Queue?" OR/MS 27, October 2013, pp.30-34.
[2]. R. Krimmer (ed.), Electronic Voting, Proceedings of the 2nd International Workshop, Gesellschaft für Informatik, Bonn, Köllen Druck+Verlag GmbH, Bonn, October 2013.
[3]. "An Electronic Polling Service to Support Public Awareness Using Web Technologies", Christos Bouras, Nikolaos Katris, Vassilis Triantafillou.
[4]. "E-voting on Android System" paper (International Journal of Emerging Technology and Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012.
[5]. "Electronic Voting," Encyclopedia of Computers and Computer History, prepared by Lorrie Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001.


Paper Type : Research Paper
Title : Automatic Speech Recognition For Task Oriented IVRS In Marathi
Country : India
Authors : Manasi Ram Baheti || Bharti W. Gawali || S.C. Mehrotra

Abstract:Speech recognition has become a foundation of self-service interactive voice response (IVR) user interfaces. The speech recognition and IVR applications found to be cost-effective and the user friendly, speediest self-service alternative to speaking with a contact centre agent. The concept of making advanced systems reach up to rural level and solve the problem of communication gap is the main problem addressed in this paper.....

Keywords: ASR, DTW,HCI, IVRS, MFCC.

[1]. Rabiner, L. R., and Schafer R.W. "Introduction to digital speech processing." Foundations and trends in signal processing 1, no. 1
(2007): 1-194.
[2]. Meng, Y. (2004). Speech recognition on DSP: Algorithm optimization and performance analysis (Doctoral dissertation, The
Chinese University of Hong Kong).
[3]. Carroll, J. M. (1997). Human-computer interaction: psychology as a science of design. Annual review of psychology, 48(1), 61-83.
[4]. Rabiner, L. R., & Schafer, R. W. (2007). Introduction to digital speech processing. Foundations and trends in signal processing,
1(1), 1-194.
[5]. https://www.hcii.cmu.edu/courses/speech-recognition-and-understanding


Paper Type : Research Paper
Title : Design of a Parliamentary Electronic Voting Response System
Country : Nigeria
Authors : Falohun A.S || Amoo S.O || Rasheed O.S. || Omitoyinbo J.T

Abstract: Voting is an important process usually employed to reveal the opinion of a group on an issue that is under consideration such as the house of assemblies where crucial issues are deliberated upon. But in Nigeria and so many other countries, voice response is usually used to determine the group of people with popular opinion, moderated by the speaker or the senate president which at times is subject to bias particularly when the minority has the louder voice as against those with the majority.....

Keywords: Display, Frequency, Microcontroller, Parliament, Voting.

[1]. Balzarotti D., Banks G., Cova M., Felmetsger V., Kemmerer R. A., Robertson W., Valeur F., and Vigna G., ―An Experience in Testing the Security of Real-World Electronic Voting Systems,‖ IEEE Transactions on Software Engineering, vol. 36, no. 4, 2010.
[2]. Villafiorita, A., K. Weldemariam, et al. (2009). "Development, formal verification, and evaluation of an E-voting system with VVPAT." Information Forensics and Security, IEEE Transactions on 4(4): 651-661.
[3]. Lucas R. Boling (2013). ―The Latest Techniques in Audience Response/Polling Systems: Texting, Tweeting and the World-Wide Web‖ The Missouri Bar Jefferson City, Missouri pp.4-6

[4]. Diponkar Paul and Sobuj Kumar Ray (2013): ―A Preview on Microcontroller Based Electronic Voting Machine‖ International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013
[5]. Haenni R., Dubuis E., and Ultes-Nitsche U., ―Research on e-voting technologies." Bern University of Applied Sciences, Technical Report 5, 2008.


Paper Type : Research Paper
Title : Numerical Analogy of q-Function
Country : India
Authors : Prashant Singh || Prof.P.K.Mishra

Abstract: This paper is a collection of q analogue of various classical methods for finding solutions of algebraic and transcendental equations. It also deals with comparing classical methods with q methods proposed by us. We have discussed few problems where these methods are equivalent and also cases where q method is better. We also provide a short explanation about the need of iterative methods in scientific and engineering problems.........

Keywords: Q analogue , basic analogue , q method ,classical method

[1]. Exton, H. (1983)., q-Hypergeometric functions and applications Ellis Harwood Ltd., Halsted, John Wiley & Sons, New York
[2]. Al-Salam W.A. (1966) Proc. Amer. Math. Soc., 17, 616-621.
[3]. Al-Salam W.A. and Verma A. (1975) Pacific J. Math., 60, 1-9.
[4]. Annaby M.H. and Mansour Z.S. (2008) J. Math.Anal. Appl., 344, 472-483.
[5]. Atkinson K.E. (1989) An Introduction to Numerical Analysis, John Wiley & Sons, New York, USA.
[6]. Bouzeffour F. (2006) J. Nonlinear Math. Phys., 13(2), 293-301.


Paper Type : Research Paper
Title : A Reference Framework For A Classification Of Software Quality Models
Country : Morocco
Authors : Adil Khammal || Youness Boukouchi || Abdelaziz Marzak || Hicham Moutachaouik || Mustapha Hain

Abstract: Computersystems moreparticularly thesoftware ,have gained great importance in humanlife both in the prof essional and personal activities.This growing importance made cross the notion of the software quality from a need for comfort towards a critical need. Accordingly, many studies have been conducted.......

Keywords:Reference Framework, Software Quality, Quality model

[1]. Legardeur, L. Livre-blanc-qualité-logicielle.
[2]. Garvin, D. A. (1984). What does product quality really mean. Sloan management review, 26(1).
[3]. R. Prieto-Diaz, Implementing Faceted Classification for Software Reuse, Communications of the ACM. Special issue on software engineering, 34(5):88 – 97, 1991.
[4]. M. Jarke, J. Mylopoulos, J.M. Schmidt, Y. Vassiliou, DAIDA - An Environment for Evolving Information Systems, ACM Trans., in Information Systems, vol. 10, n° 1, 1992.
[5]. M. Jarke, K. Pohl, Requirements Engineering: An Integrated View of Representation, Process and Domain, Proceedings of the 4th European Software Conference, Springer Verlag, 1993.


Paper Type : Research Paper
Title : Virtual Mouse: Computer Vision Aided Pointing Device
Country : India
Authors : Anupama.H.S || Vishwas S || N.K.Cauvery || Lingaraju.G.M

Abstract: This paper puts forth the idea for an easy to use device to replace the conventional mouse. One such approach is a virtual pointing device. A web-camera based solution takes advantage of computer vision technologies to design a software based solution to this problem. Virtual Mouse uses image processing techniques to perform color tracking which is used as the basis for the pointing action. This method reduces cost of hardware and also is very useful for controlling various applications which require a freer motion of the pointer compared to a mouse or a touchpad. This is done through tracking of user-defined, specific colored objects.

Keywords: Virtual Mouse, Computer Vision, web camera, color tracking, OpenCV

[1]. Gary Bradski, Adrian Kaehler, Learning OpenCV, O'Reilly Media, 2008.
[2]. K S Chidanand Kumar, A Vision based Application for Virtual Mouse Interface Using Finger-Tip, NIT-K, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012, 4460 - 4464
[3]. Hojoon Park, A Method for Controlling Mouse Movement using a Real-Time Camera, Brown University, Providence, RI, USA, Department of computer science, 2008
[4]. Abhik Banerjee, Abhirup Ghosh, Koustuvmoni Bharadwaj, Hemanta Saikia, Mouse Control using a Web Camera based on Colour Detection, International Journal of Computer Trends and Technology (IJCTT) –volume 9 number 1 – Mar 2014
[5]. A. Erdem, E. Yardimci, Y. Atalay, V. Cetin, Computer vision based mouse, A. E. Acoustics, Speech, and Signal Processing, 2002. Proceedings. (ICASS). IEEE International Conference


Paper Type : Research Paper
Title : Development of Virtual Computing Lab Using Private Cloud
Country : India
Authors : Devendra Panda || Abhishek Sharma || Akshay Patil || Mahesh Tripathi || Neeraj Khairwal

Abstract: Virtual Computing Lab (VCL) is a very effective answer for the educational institution to meet the increasing demand of physical machines, different computational laboratories and large number of users in a limited budget and time. Cloud computing ('on demand computing') is a revolutionary technology that has taken the world by storm. A small private cloud built in our college intranet can help us to harness the advantages of cloud in educational field....

Keywords: Cloud computing, Eucalyptus, Virtual machine, IaaS

[1]. http://www.american.edu/vcl/
[2]. https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/
[3]. https://commons.wikimedia.org/wiki/File:Cloud_computing_layers.svg
[4]. https://vcl.apache.org/
[5]. http://technology.gsu.edu/technology-services/it- services/labs-and-classrooms/virtual-computing/
[6]. How Can Cloud Computing Bridge the Digital Divide in Srilankan Education? K.P.N jayasena Sabaragamuwa University of Sri Lanka.


Paper Type : Research Paper
Title : An Approach for Resource Management by Volunteering Community Cloud for an Educational Use
Country : India
Authors : Shital Raju Akulwar || Bhushan A. Ugale

Abstract: In today's (Information Technology) IT world, the service providers and the service users playing an important role. So the satisfactions at both the ends are also very important. This is a very common problem where the service user is always cost conscious about the product and in rural area there is no chance for affording these services. Also the service providers are not interested in doing so.....

Keywords: Hypervisor, Virtualization, Gale Shapley Algorithm or SMP, DPS, Thin Client, TCO

[1]. Sijin He, Li Guo, Yike Guo Real Time Elastic Cloud Management for Limited Resources, IEEE 4th International Conference on Cloud Computing, 2011.
[2]. Durairaj. M, Kannan.P, A Study On Virtualization Techniques And Challenges In Cloud Computing, International Journal Of Scientific & Technology Research Volume 3, Issue 11, November 2014 Issn 2277-8616.
[3]. Tuncay Ercana*, Effective use of cloud computing in educational institutions, Procedia Social and Behavioral Sciences 2 (2010) 938–942, ScienceDirect.
[4]. http://www.cloudwards.net/beyond-business-collaboration-how-educational-institutions-use-the-cloud/
[5]. http://www.intel.co.uk/content/dam/doc/case-study/cloud-computing-education-21st-century-e-learning-study.pdf


Paper Type : Research Paper
Title : Two Phase Multi Party Secured Multiplication (2PMSM) In Vertically Distributed Databases
Country : India
Authors : Selva Rathna S || Karthikeyan T

Abstract: Secured multi party computation which is also known as secured computation or multi party computation (SMC) plays a vital role in achieving secured computation in Privacy preserving data mining. Various SMC algorithms are existing for achieving the secured computation. In this paper, Two phase Multi party secured computation for secured multiplication of data in distributed database is presented. The algorithms for vertically distributed database is presented which enables to develop new data mining algorithms in Privacy preserving data mining field.

Keywords: Horizontally Distributed Database, multiparty computation, Secured multiparty computation (SMC), Secured multiparty multiplication (SMM), Trusted Third Party (TTP), Vertically Distributed Database

[1]. Teo, S.G., Lee, V., Shuguo Han, "A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining", 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp: 85-90, 2012 (journal style)

[2]. Yanguang Shen ,. Hui Shao, Jianzhong Huang, "Research on Privacy Preserving Distributed C4. 5 Algorithm", Third International Symposium on Intelligent Information Technology Application Workshops, IITAW '09. pp:216-218, 2009.

[3]. Pathak, F.A.N., Pandey, S.B.S., "Distributed changing neighbors k-secure sum protocol for secure multiparty computation", Nirma University International Conference on Engineering (NUiCONE), pp: 1-3, 2013.
[4]. Sheikh.R, Kumar B., Mishra D.K., Changing Neighbors k-Secure Sum Protocol for Secure Multi-Party Computation, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
[5]. Selva Rathna S, Karthikeyan T., Two Phase Secured Multiparty Sum Computation Protocol (2PSMC) for Privacy Preserving Data Mining, International Journal of Engineering and Computer Science, ISSN : 2319-7242., Vol.4, Issue 4., April 2015


Researcher can also search IOSR published article contents through

IOSR Xplore