IOSR Journal of Computer Engineering (IOSR-JCE)

March – April 2016 Volume 18 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Challenges to Data Base Security – A Futuristic View
Country : India
Authors : Rekha Ahirwar || Rashi Saxena || Pankaj Yadav

Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of data from data base by various users. if all these retrievals are authentic then there is no problem unautenticity imposed creating threat & security is necessary issue for organization as well as if new internal user would be added then it also create serious threat which might be lead to security problem, this paper highlights main criteria of data base threat & how it can be mitigate or control to a permissible limit thereby we can safe our database. Key word: database security, data retrieval, miscofugered data, and sensitive data

[1]. Burtescu, E. Problems of Inference in Databases in "Education, Research & Business Technologies―. The Proceeding of the 9th International Conference on Economic Informatics, INFOREC Printing House, Bucharest, 2009
[2]. Burtescu, E. Databse security, in "Knowledge Management. Projects, Systems and Technologies―, International Conference "Knowledge Management. Projects, Systems and Technologies―, Bucharest, November 9-10, 2006, INFOREC Printing House, Bucharest, 2006
[3]. Hsiao, S.B. and Stemp, R. Computer Security, course, CS 4601, Monterey, California, 1995
[4]. McCarthy, L. IT Security: Risking the Corporation, Prentice Hall PTR, 2003
[5]. Proctor, P.E. and Byrnes, F.C. The Secured Enterprise, Prentice Hall PTR, 2002


Paper Type : Research Paper
Title : Simulation of Parallel and Distributed Computing: A Review
Country : Oman
Authors : Mohd Ahsan Kabir Rizvi

Abstract: Parallel and Distributed Computing has made it possible to simulate large infrastructures like Tel-ecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliable but also provides geographical distribution among the systems. Due to its great capabilities, it has led to many types of research in this field. This led to many types of computing like, grid computing, cluster computing, utili-ty computing and cloud computing.....

Keywords -Parallel and Distributed Systems (PADS), Parallel and Distributed Computing, Parallel Discrete Event Simulation (PES), Modelling & Simulation.

[1]. Elkies, Noam D. 2007. The ABC's of number theory. The Harvard College Mathematics Review 1(1): 57-76.
[2]. http://www.abcathome.com/ by Mathematical Institute of Leiden University. On 06/05/2015
[3]. Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", www.bitcoin.org
[4]. Karoly Bosa, Wolfgang Schreiner, Friedrich Priewasser, Report on the First Feature-Complete Prototype of a Distributed Supercomputing API for the Grid. Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Aus-tria. Technical report no. AG-D4-1-2010_1, March 2010. Austrian Grid Deliverable.


Paper Type : Research Paper
Title : A Review on Face Recognition and Video Databases
Country : India
Authors : Sandeep Saxena || B Mohd Jabarullah || Dr. Mansaf Alam

Abstract: Each And Every Face Databases Have Its Own Limitations And Description To Test The Performance Of Face Recognition Technique. Even Though, Current Machine Recognition Systems Have Approached To Certain Level Of Recognition Rate. Their Success Is Limited By The Conditions Imposed By Many Real Applications And Constraint Imposed On Databases Such As Recognition Of Faces Acquired In An.....

Keywords: Video Database, Face Recognition

[1]. W. Zaho,R.Challappa,P.J.Phillips And A.Rosenfield"Face Recognition :Literature Survey", ACM Computing Surveys, Vol.35,No. 4, Dec 2003, Pp 399-458.
[2]. Shailaja A Patil And Dr. P.J.Deore "Face Recognition :A Survey", Informatics Engineering, An International Journal(IEIJ), Vol. 1, December 2013 Pp 31-41.
[3]. B. Mohd. Jabarullah, Sandeep Saxena, Dr. C Nelson Kennedy Babu," Survey On Noise Removal In Digital Images", IOSR Journal Of Computer Engineering (IOSRJCE), Vol 6, Isssue 4, Sept-Oct 2012, Pp 45-51
[4]. D.Gorodnichy," Associative Neural Networks As Means For Low Resolution Video-Based Recognition" IEEE International Joint Conference On, Volume: 5,2005, Pp 01-06.


Paper Type : Research Paper
Title : Opportunistic Networks: A Review
Country : India
Authors : Navneet Kaur And Gauri Mathur

Abstract: Opportunistic network is a wireless ad hoc network. It is a type of delay tolerant network and an extension of mobile ad hoc networks. This network has a special characteristic which is intermittent connectivity. From intermittent we mean that connections are not stable and connections occur at irregular intervals. Connection may or may not occur which depends on the suitability of selecting a node which can carry the message closer to the destination or to the destination itself......

Keywords: Opportunistic network; Routing protocols; Security; Privacy; Applications

[1]. C. Hunag, K. Lan, and C. Tsai, A Survey of Opportunistic Networks, IEEE, Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference, Okinawa, 25-28 March 2008, pp. 1672- 1677. [2]. L. Lilien, Z. H. Kamal, and A. Gupta, Opportunistic Networks:The concept and research challenges in Privacy and Security, WSPWN, 2006.
[3]. A. Lindgren, A. Doria, and O. Schelen, Probabilistic Routing in Intermittently Connected Networks, ACM SIGMOBILE Mobile Computing and Communications Review, 2003, pp. 19-20.
[4]. L. Peluci, A. Passarella, and M. Conti, Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks, Communications Magazine, IEEE (Volume:44, Issue:11 ), November 2006, pp. 134-141,
[5]. Ritu, and M. Sidhu, Routing Protocols in Infrastructure-less Opportunistic Networks, IJARCSSE (Volume:4, Issue:6), June 2014.


Paper Type : Research Paper
Title : Personal Financial Assistant
Country : India
Authors : Kuntal Biswas

Abstract: Managing our finances has always been an important part of our life. While it is easy to let situation define our expenses, it becomes exceedingly difficult to keep track of all the spending, and is not very appealing to dedicate any certain amount of time to remember, calculate, or define a limit to it. It would be much easier if someone could do the same for us, efficiently. Our project proposes an idea of a wallet, that stores and analyzes a user's usage pattern, provides a system for loan and savings......

Keywords: .............

..........................


Paper Type : Research Paper
Title : Face Recognition Revisited On Pose, Alignment, Color, Illumination And Expression- Pyten
Country : India
Authors : Mugdha Tripathi

Abstract: Growing interest in intelligent human computer interactions has motivated a recent surge in research on problems such as pose estimation, illumination variation, color differences, alignment distinction and expression variation. Human faces are highly non-rigid objects with high degree of variability in pose, color, expression, alignment angles and illumination conditions and most face recognition algorithms (not all), are designed to work best with well aligned, well illuminated, and frontal pose face images......

Keywords -Face recognition, Pyramid CNN, Deep network, Pose, Alignment, Color, Illumination, Expression

[1]. D. Yi, Z. Lei, and S. Z. Li. Towards pose robust face recognition. In CVPR, 2013
[2]. Y. Bengio, Learning deep architectures for AI. Foundations and Trends in Machine Learning, 2009
[3]. Yi Sun, Xiaogang Wang, Xiaoou Tang, Deep Learning Face Representation by Joint Identification- Verification, June 2014
[4]. J. van de Weijer and Th. Gevers, Tensor Based Feature Detection for Color Images, 2014
[5]. Ahmadreza Baghaie and Zeyun Yu, Structure Tensor Based Image Interpolation Method, 2014
[6]. H. Li, G. Hua, Z. Lin, J. Brandt, and J. Yang, Probabilistic elastic matching for pose variant face verification. In CVPR, 2013


Paper Type : Research Paper
Title : Photo Polymerization of Host-Guest Complexes of Β-Cyclodextrin / Butyl Acrylate in Aqueous Solution, Kinetics And Mechanism
Country : India
Authors : Indu Bhusan Mohanty || Snehalata. Mishra

Abstract: The Photo polymerization of β-cyclodextrin host–guest complexes of Butyl acrylate sensitized by Fluoroscein sodium in homogeneous aqueous medium has been studied. The polymerization was carried out in presence of citrate – phosphate buffer and ascorbic acid medium, leading to the formation of poly (Butyl acrylate). The effect of change of monomer concentration, dye concentration, time and temperature, on the rate of polymerization was studied. The system was irradiated with UV-light of 365 nm wavelength......

Keywords -Ascorbic acid, Fluoroscein sodium, citrate-phosphate buffer, cyclodextrin, host-guest complexes.

[1]. G. Moad and D. H. Solomon, The Chemistry of Free Radical Polymerization, Pergamon, Oxford, 1995.
[2]. A.H. Zewail, Angew. Chem.Int.Ed. 39, 2586, 2000.
[3]. R. G. Gilbert and S. C. Smith, Theory of unimolecular and Recombination Reactions, Blackwell Scientific, Oxford, 1990.
[4]. K. J. Laidler and M. C. King, J. Phys. Chem. 87, 2657 ,1983.
[5]. J.P. Fouassier, D. Ruhlmann, B. Graff, Y. Takimoto, M. Kawabata,M. Harada, J. Imaging Sci. Technol. 37 (2) 208,1993.


Paper Type : Research Paper
Title : Review of The Image Compression And Enhancement Techniques
Country : India
Authors : Prabhdeep Kaur || Rupinderpal Singh

Abstract: The image processing is used in order to enhance the image. The image processing will reduce the noise from within the image. The noise will reduce the clarity of the image. There could be many reasons by which image are distorted. One of the reasons will be temperature. Image distortion will also occur when image is transferred from source to the destination. The bandwidth which is utilized during the transfer process could be high. The size of the image will be reduced using compression. One of the mechanisms which can be used for image compression is run length encoding. The run length encoding will replace the repeated string with the number and hence efficiently compress the image. Less bandwidth will be used in this case.

[1]. K. Sharmila and K. Kuppusamy, "A New Color Image Compression Based on Fractal and Discrete Cosine Transform," vol. 03, no. 07, pp. 7054–7057, 2014.
[2]. A. Halder, S. Dey, S. Mukherjee, and A. Banerjee, "An Efficient Image Compression Algorithm Based on Block Optimization and Byte Compression," no. February, pp. 1–5, 2010.
[3]. S. R. Kodituwakku and U. S. Amarasinghe, "Comparison of Lossless Data Compression Algorithms," Indian J. Comput. Sci. Eng., vol. 1, no. 4, pp. 416–425, 2010.
[4]. D. Chakraborty and S. Banerjee, "Efficient Lossless Colour Image Compression Using Run Length Encoding and Special Character Replacement," vol. 3, no. 7, pp. 1–7, 2011.
[5]. S. Porwal, Y. Chaudhary, J. Joshi, and M. Jain, "Data Compression Methodologies for Lossless Data and Comparison between Algorithms," vol. 2, no. 2, pp. 142–147, 2013.


Paper Type : Research Paper
Title : Identifiying the Authorised User by Typing Speed Comparison
Country : India
Authors : S.Margarat Sheeba || G.Sahana || M.Sneka || M.Sowmiya || T.Sathish Kumar

Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users. Since we depend so much on computers to store and process sensitive information, it has become all the more necessary to secure them from intruders. For user authentication and identification in computer based applications, there is a need for simple, low-cost and unobtrusive device.....

Keywords -Behavioral biometrics, Keystrokes, Typing patterns, Classification, Neural network, Monograph, Digraph

[1]. F. Bergadano, D. Gunetti, and C. Picardi, "User authentication through keystroke dynamics," ACM Trans. Inform. Syst. Security, vol. 5, no. 4, pp. 367–397, Nov. 2002.

[2]. M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999–1014, Dec. 1993.

[3]. P.Dowland, S.Furnell, and M.Papadaki, "Keystroke analysis as a method of advanced user authentication and response," in Proc. IFIP TC11 17th Int. Conf. Inform. Security: Visions Persp., May 7–9, 2002, pp. 215–226.

[4]. D. Gunetti and C. Picardi, "Keystroke analysis of free text," ACM Trans. Inform. Syst. Security, vol. 8, no. 3, pp. 312–347, Aug. 2005.

[5]. F. Monrose and A. Rubin, "Authentication via keystroke dynamics," in Proc. Fourth ACM Conf. Comput. Commun. Security, pp. 48–56, Apr. 1997.


Paper Type : Research Paper
Title : A Brief Study on Wireless Communication Network Architectureand Sensor Networks
Country : Bangladesh
Authors : M. A. Nakib || Md. Iftekharul Mobin

Abstract: In today's focused the operational and business requests of electric utilities require an elite information correspondence arrange that backings both existing functionalities and future operational necessities. In this appreciation, since such a wireless communication network constitutes the core of the electric system automation applications, the design of cost-effective and reliable system engineering is urgent. In this paper, the open doors and difficulties of half breed system engineering are talked about for electric framework automation applications of wireless networks......

Keywords -System Automation, Internet based Virtual Private Network, Power Line Communication, Satellite Communication, Wireless Sensor Networks, Wireless Mesh Networks, WiMAX.

[1]. Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2005): 445-487.
[2]. Hedetniemi, Sandra M., Stephen T. Hedetniemi, and Arthur L. Liestman. "A survey of gossiping and broadcasting in communication networks." Networks 18.4 (1988): 319-349.
[3]. Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks: a survey." Wireless communications, IEEE 11.6 (2004): 6-28.
[4]. Abbasi, Ameer Ahmed, and Mohamed Younis. "A survey on clustering algorithms for wireless sensor networks." Computer communications 30.14 (2007): 2826-2841.
[5]. Potdar, Vidyasagar, Atif Sharif, and Elizabeth Chang. "Wireless sensor networks: A survey." Advanced Information Networking and Applications Workshops, 2009. WAINA'09. International Conference on. IEEE, 2009.


Paper Type : Research Paper
Title : Image Restoration Algorithm for Reliable Block Quantum Cellular Automata Gate
Country : United States
Authors : Patrick Harrington

Abstract: The fault-tolerance properties of the classical Quantum Cellular Automata (QCA) Majority gate, as well as the AND-gate, suffer from precision errors in inherent in manufacturing on a nanometer scale. Due to these implementation problems, a new approach for QCA was developed. A solution using multiple QCA cells in block configuration is an improvement but will may not work depending on the number and pattern of cells that are out of alignment.......

Keywords -Neural networks, machine learning, Markov Random Fields, Competitive Learning

[1] P. D. Tougaw and C. S. Lent, Logical device implementation using quantum cellular automata, Journal of Applied Physics, (75),
Feb. 1994, 1818-1825.
[2] C.S. Lent and P.D. Tougaw, A device architecture for computing with quantum dots, Proceedings of the IEEE, 85(4), 1997.
[3] M.T. Niemier, M.J. Kontz, P.M. Kogge, A design of and design tools for a novel quantum dot based microprocessor, Design
Automation Conference, June 2000, 227-232.
[4] W. Porod, Quantum-dot devices and quantum-dot cellular automata," International Journal of Bifurcation and Chaos, 7(10), 1997,
2199-2218.
[5] G. L. Snider, A. O. Orlov, et. al. , Quantum-dot cellular automata, Journal of Vacuum Science Technology A, 17(4), 1999.


Paper Type : Research Paper
Title : An Efficient Resource Allocation with Adaptive Rate Scheduling For WCDMA Networks
Country : India
Authors : Vandana Khare || Dr. Y. Madhavee Latha || Dr. D. Sreenivasa Rao

Abstract: WCDMA is a spread spectrum technique that uses a unique spreading code to spread the data before transmission based on its orthogonal property. WCDMA is mainly used for 3rd generation cellular and mobile networks. In Centralized Call Admission Control (CCAC) technique, when a new call arrives into the system, it checks whether the call should be admitted or not on the basis of signal to interference ratio (SIR) and transmission power in the network. If the call is accepted, it will create some interference to the new arrivals during data transmission and reception......

Keywords -ARS, CCAC, QoS, RA-CAC, SIR, WCDMA

[1]. Juan Liu, Wei Chen,Member, Ieee, Yingjun Zhang, Seniormember, Ieee, And Zhigang Cao, Senior Member, Ieee, A Utility Maximization Framework For Fair And Efficient Multicasting In Multicarrier Wireless Cellular Network, Ieee/Acm Transactions On Networking, Vol. 21, No. 1, February 2013.
[2]. Bijan Golkar,Student Member, Ieee And Elvino S.Sousa,Fello,Ieee ,Resource Allocation In Autonomous Cellular Networks, Ieee Transactions On Wireless Communication,Accepted For Publication In 2013.
[3]. Mohamed Kadhem Karray,Yasir Khan(2012) "Evaluation And Comparison Of Resource Allocation Strategies For New Streaming Services In Wireless Cellular Networks", Ieee Transaction On Communications Vol12,No.3 January 2012.
[4]. N. Mohan And T. Ravichandran, "An Efficient Multiclass Call Admission Control And Adaptive Scheduling For Wcdma Wireless Network", European Journal Of Scientific Research 33.4 (2009).


Paper Type : Research Paper
Title : A Practical Approach Forparallel Image Processing
Country : India
Authors : Neha Mangla || Shanthi Mahesh || Suhash.A.Bhyratae

Abstract: This review paper tries to solve the problem of processing big data of images on Apache Hadoop using Hadoop Image Processing Interface (HIPI) for storing and efficient distributed processing, combined with OpenCV, an open source library of rich image processing algorithms. This paper demonstrates how HIPI and OpenCV can be used together to count total number of faces in big image dataset.

Keywords: Hadoop, MapReduce, HIPI, OpenCV.

[1]. https://www.google.co.in/?gfe_rd=cr&ei=ruemVpvHEJLI8Aedk5HwDg#q=image+%2Bmapreduce+ieee+paper

[2]. http://www.cs.princeton.edu/courses/archive/spr11/cos448/web/docs/week10_reading2.pdf

[3]. http://dinesh-malav.blogspot.in/2015/05/image-processing-using-opencv-on-hadoop.html

[4]. http://www.iosrjen.org/Papers/vol2_issue8%20(part-1)/K0287882.pdf

[5]. http://ce.sysu.edu.cn/hope/UploadFiles/Education/2011/10/201110221516245419.pdf


Paper Type : Research Paper
Title : Detection of Sub-Lines of Various Orientations Using Back Propagation Networks
Country : Nigeria
Authors : Gideon Kanji Damaryam

Abstract: Various approaches can be taken to achieve vision for robot navigation using back-propagation artificial neural networks. An approach is presented in this paper which attempts to detect straight sub-lines from 8x8 pixel sized sub-images of pre-processed images, with the goal of further combining them at a later stage to detect longer lines from across the image (mimicking the hierarchical Hough transform which would find shorter line segments (analytically), and combine them into longer lines), or otherwise advance the result towards generating navigation information for a mobile robot.......

Keywords -Artificial neural networks, back-propagation networks, image processing, line detection, robot navigation

[1]. G. L. Dempsey and E. S. McVey, "A Hough Transform System based on Neural Networks", IEEE Transaction on Industrial Electronics, 39(6), pp. 522-528, 1992
[2]. G. K. Damaryam, "A Hough Transform Implementation for Line Detection for a Mobile Robot Self-Navigation System", International Organisation for Scientific Research – Journal of Computer Engineering, 17(6), 2015
[3]. G. K. Damaryam, "A Method to Determine End-Points of Straight Lines Detected using the Hough Transform", International Journal of Engineering Research and Applications, 6(1), 2016
[4]. G. K. Damaryam and H. A. Mani, "A Pre-processing Scheme for Line Detection with the Hough Transform for Mobile Robot Self-Navigation", In Press, International Organisation for Scientific Research – Journal of Computer Engineering, 18(1), 2016
[5]. G. K. Damaryam, A Back-Propagation Neural Network Detection of Vertical Sub-Lines, International Journal of Engineering and Science, 5(1), pp 22-29, 2016


Paper Type : Research Paper
Title : Comparison Of Performance In Image Restoration By Time And Frequency Domain Techniques
Country : India
Authors : Abha Agrawal || Pawan Kumar Mishra

Abstract: Image Processing is a practice of signal processing aimed at which the input is an image, for instance a photograph or video frame. Also the output of image processing might be either an image or some set of characteristics or restrictions related to the image. An image is defined as an array or a matrix, square pixel decided in rows and columns. Greatest image-processing methods involve giving the image as a two-dimensional 2-D signal and applying normal signal processing methods to it. Image processing characteristically refers to digital image processing.......

Keywords -Restoration, histogram, PSNR, MSE, DWT

[1]. Gonzalez,R.C., and Woods, R.E. "Digital Image processing ", Prentice Hall of India cliffs,2002.
[2]. Chen G.Y,Bui T.D,Krzyzak A. "Image denoising with neighbour dependency and customized wavelet and threshold" Pattern Recognition , 2005, pp. 115 – 124
[3]. Raman Maini and Himanshu Aggarwal, "A Comprehensive Review of Image Enhancement Techniques," Vol.2 Issue 3, March 2010 in Journal of computing.
[4]. Jeba Akewak, " Digital image processing and image restoration" May 2011
[5]. MATLAB 7.8.0 (R2009b), Help Documentation.


Paper Type : Research Paper
Title : Bank Locker Securty System Using Iot
Country : India
Authors : Aravinth .J || Gokilaprabha .P || Haribhuvaneshwaran .T || Yogeshwaran .R || Mrs.Aiswarya .S M.E

Abstract: Personal Security is one of the main concern when it comes to office, personal workplace in home,banketc.Soto over come this problem, this project suggest the use of Internet of Things(IoT) to provide secure access only to authorized person via SMS and also sending image to the user's Whatsappaccount.The Raspberry Pi captures the image when a person tries to access the bank locker and then process it and sends it to the user's whatsapp account as picture message.The user can then provide authorization to the Raspberry Pi from his/her whatsapp account whether to open or remain it shut.so in order to have highly secured locker we are using this proposed method.

Keywords: Raspberry pi-2 model B,Signal conditioning unit,Ethernet,SDcard,GSM,Smart phone

[1]. GyanendraKVerma,PawanTripathi,"A Digital Security System Using RFID Technology"International Journal of Computer Applications(IJCA)(0975-8887),Volume5-NO.11,August 2010.
[2]. Motion Based Security Alarming System for Video Surveillance.


Paper Type : Research Paper
Title : Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing
Country : India
Authors : S.Dhivya || P.Senthil

Abstract: Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party service providers, the major challenge that might arise is the security. To ensure the security, data's are stored in the encrypted formats.....

[1]. Allison Lewko1, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters(2010), "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption", Advances in cryptology, Lecture Notes in Computer Science, Volume 6110, pp 62-91.
[2]. Brent Waters(2011), "Ciphertext-Policy Attribute-Based Encryption:An Expressive, E_cient, and Provably Secure Realization", Public key cryptography, Lecture Notes in Computer Science Volume 6571, pp 53-70.
[3]. Deepak Mishra, Manish Shrivastava(2012), "Optimal service pricing for cloud based services", International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2.
[4]. HUANG Qinlong, MA Zhaofeng, YANG Yixian, NIU Xinxin, FU Jingyi(2014), "Attribute Based DRM Scheme with Dynamic UsageControl in Cloud Computing", China Communications, V olume:11 , Issue: 4, PP: 50 – 63.
[5]. Kai Hwang, Deyi Li(2010), "Trusted Cloud Computing with Secure Resources and Data Coloring", Internet Computing,Volume:14 Issue: 5, PP:14 – 22.


Paper Type : Research Paper
Title : Postgraduate Historical Research Format With Reference To Sudan and Nigerian Methods: A Comparative Perspective
Country : Nigeria
Authors : Kabir Mohammed

Abstract: This study titled "Postgraduate Historical Research format with reference to Sudan and Nigerian Methods" A comparative perspective has been established to justify historical research procedures, examine the concept of research, assess the role of essential ingredients i.e tools of research, purpose of academic research and characteristics. The overriding concern of the study is the examination of the similarities and dissimilarities associated with Sudan and Nigerian postgraduate techniques of historical research.......

Keywords: Postgraduate, Historical, Research, Format, Sudan, Nigeria, comparative.

[1]. Adamu, A. Introduction to Historical Research "A Lecture Delivered on January, 2nd 2014, Venue: Lecture Hall B, Federal Univesity Dutsin-Ma, Katsina State.
[2]. Maikaba, B. "Introduction to Research Methods in Mass-Communication, 3rd June, 1998,Venue: A 25 Bayero University, Kano.
[3]. Mohammed, K. (2012) " A Critical Assessment of the Impact of British Colonial Policies
[4]. On Women Education A Ph.D Postgraduate Seminar Presented at University of Khartoum, Sudan, on 14th July,2012, Venue: Department of History.
[5]. Bayero University Kano (November, 2008) General/Guidelines and Time-Table for Project Writing on Master's in Development Studies (MDS)..


Paper Type : Research Paper
Title : A Method of View Materialization Using Genetic Algorithm
Country : India
Authors : Debabrata Datta || Kashi Nath Dey || Payel Saha || Sayan Mukhopadhyay || Sourav Kumar Mitra

Abstract: A data warehouse is a very large database system that collects, summarizes and stores data from multiple remote and heterogeneous information sources. Data warehouses are used for supporting decision making operation on an intelligent system. The decision making queries are complex in nature and take a large amount of time when they are run against a large data warehouse.......

Keywords: Data Warehouse; Genetic Algorithms; Fitness Function; Materialized View; Multidimensional Lattice

[1]. Vijay Kumar, T.V., Kumar, S.: Materialized View Selection using Genetic Algorithm, Communications in Computer and Information Science (CCIS), Volume 306, Springer Verlag, pp. 225-237, 2012.

[2]. Chirkova, R., Halevy, A. Y., Suciu, D.: A formal perspective on the view selection problem, 27 VLDB Conference, Italy; 2001

[3]. Goldberg, D. E.: Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley, 1989.

[4]. Harinarayan, V., Rajaraman, A., Ullman, J. D.: Implementing data cubes efficiently, ACM SIGMOD International Conference on Management of Data, pages 205-227, 1996.

[5]. Horng, J.T., Chang, Y.J., Liu, B.J., Kao, C.Y.: Materialized view selection using genetic algorithms in a data warehouse system, in Proceedings of the World Congress on Evolutionary Computation, Washington, pp. 2221–2227, 1999.


Paper Type : Research Paper
Title : Review on Comment Volume Prediction
Country : India
Authors : Mandeep Kaur || Prince Verma

Abstract: In this paper we present the concept of social media and its various functional building blocks. Social media has become an ubiquitous part of social networking and content sharing. Social media make use of mobile and web to create the platforms with which individuals and communities share, discuss, and modify user-generated content. This is examined that social media user's comments are also very much influential in order to make or change people's perception and to bring some topic in trending. Different techniques have been proposed for comment volume prediction which are discussed in the literature survey.

Keywords: Social media, Conversations, Sharing, Reputation, Comment volume.

[1]. Singh Kamaljot, Kaur Ranjeet and Kumar Dinesh, "Comment Volume Prediction using Neural Networks and Decision Trees", 2015 17th UKSIM-AMSS International Conference on Modelling and Simulation, IEEE, pp. 15-20, 2015.
[2]. Buza Krisztian, "Feedback Prediction for Blogs", Springer International Publishing on Data Analysis, Machine Learning and Knowledge Discovery,2014, pp. 145-152. doi:10.1007/978-3-319-01595-8 16.
[3]. M.Tsagkias, W. Weerkamp, M. de Rijke, "Predicting the Volume of Comments on Online News Stories",CIKM‟09 Proceedings of the 18th ACM conference on Information and knowledge management , pp.1765-1768, 2009.
[4]. Jamali, S. and Rangwala, H., "Digging Digg: Comment Mining, Popularity Prediction, and Social Network Analysis", Web Information Systems and Mining, IEEE International Conference,2009, pp. 32-38. doi: 10.1109/WISM.2009.15.
[5]. M. Tsagkias, W. Weerkamp, M. de Rijke, "News Comments: Exploring, Modeling, and Online Prediction", ECIR'2010 Proceedings of the 32nd European conference on Advances in Information Retrieval, Springer, pp.191-203,2010.


Researcher can also search IOSR published article contents through

IOSR Xplore