IOSR Journal of Computer Engineering (IOSR-JCE)

March – April 2016 Volume 18 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Comparison of Various Data-Driven Modelling Techniques for Inflow Analysis
Country : India
Authors : Manali Pawar || Samveda Mohite || Rushikesh Deshmukh || Prof. Nivedita Bhirud

Abstract: Inflow Analysis of a reservoir is an important factor as water is becoming a scarce resource and hence management of water was essential. There are many traditional methods of analysing the reservoir inflow but which were very tedious and time consuming and hence we approach the soft computing data-driven techniques......

Keyword: Inflow analysis, artificial neural networks, M5 model trees, rainfall runoff

[1]. Comparison of data-driven modelling techniques for river flow forecasting, Shreenivas Londhe; Shrikant Charhate, Department of
Civil Engineering, Vishwakarma Institute of Information Technology, Survey no.2/3/4, Kondhwa (Bk), Pune, MH, India b
Department of Civil Engineering, Datta Meghe College of Engineering, Airoli, Navi Mumbai, MH, India.
[2]. Neural networks and M5 model trees in modelling water level–discharge relationship Bhattacharya, D.P. Solomatine, Department
of Hydro informatics and Knowledge Management, UNESCO-IHE Institute for Water Education, P.O. Box 3015, 2601 DA Delft,
The Netherlands.
[3]. Model trees as an alternative to neural networks in rainfall–runoff modelling, DIMITRI P. SOLOMATINE, International Institute
for Infrastructural, Hydraulic and Environmental Engineering (IHE), PO Box 3015, NL-2601 DA Delft, The Netherlands, KHADA
N. DULAL, Department of Hydrology and Meteorology, PO Box 406, Kathmandu, Nepal.


Paper Type : Research Paper
Title : Wireless E-Notice Board
Country : India
Authors : Mitesh Santhakumar || Prasadbhagat || Ujjwalrajjpurohit || Niteshmhatre || Prof Varshabodade

Abstract: Notice boards are one of the major communication mediums for mass media. Many Universities and educational institutions still use wooden notice board to display announcements. However, reliance on such boards is still not enough to convey relevant information around the organization. This paper gives a basic idea about Wireless E-Notice Board. Primary aim of the proposed system is to ensure that information sent from a remote place is displayed on display unit......

Keyword: E-Notice Board, Wireless, SMS, SIM300GSM modem, Raspberry Pi B+, Large Display.

[1]. N. Villar, K. Van Laerhoven, H.-W. Gellersen. "A Physical Notice Board with Digital Logic And Display", (Demo). In Adjunct Proceedings of the European Symposium on Ambient, 2007
[2]. Wireless electronic display board using gsm technology 1n. jaganmohanreddy, 2g.venkareshwarlu. cbit, Hyderabad
[3]. Electronic Notice Board for Professional CollegeAnushree S P, Divyashree V Bhat, Moonisha G A Venkatesh U C.
[4]. "GSM based campus display system"(using microcontroller a at89s52) bachelor of engineering in electronics & communication L.D.R.P Institute Technology & Research, G GandhinagarGujaarat Technological University, Ahmedabad December, 2012
[5]. HaitaoJia, Li Cao Department of Automation, Tsinghua, and Beijing, China "A Remote data acquisition system based on SMS". Systems, Man and Cybernetics, 2004 IEEE International Conference on(Volume: 7)


Paper Type : Research Paper
Title : Fast Compressed Sensing Based High Resolution Image Reconstruction
Country : India
Authors : Dr G Vijay Kumar || ANMV Srivalli

Abstract: As a powerful high resolution image modeling technique, compressive sensing (CS) has been successfully applied in digital image processing and various image applications. This paper proposes a new method of efficient image reconstruction based on the Modified Frame Reconstruction Iterative Thresholding Algorithm (MFR ITA) developed under the compressed sensing (CS) domain by using total variation algorithm.......

Keyword: Compressed Sensing, Image Reconstruction, Multilook, MFRITA, Thresholding

[1]. D. L. Donoho, Compressed sensing, IEEE Transactions on Information Theory, Vol.52, No.4, 2006, pp. 1289-1306.

[2]. E. J. Candes, M. B. Wakin, An introduction to compressive sampling, IEEE Signal Processing Magazine, Vol.25, No.2, 2008, pp. 21-30.

[3]. V. S. Petrovic, C. S. Xydeas, Gradient-based multi resolution image fusion, IEEE Transactions on Image Processing, Vol.13, No.2, 2004, pp. 228-237.

[4]. X. Li, S.Y. Qin, Efficient fusion for infrared and visible images based on compressive sensing principle, IET Image Processing, Vol. 5, No.2, 2011, pp. 141-147.

[5]. Z. Z. Yang, and Z. Yang, Novel multifocus image fusion and reconstruction framework based on compressed sensing, IET Image Processing, Vol.7, No.9, 2013, pp. 837-847.


Paper Type : Research Paper
Title : An Accident Prevention Technique For Speed Bumper Detection Through IR Sensor And Motor Speed Control Using Timer
Country : India
Authors : Bidyutmala Saha || Rafiqul Islam

Abstract: A method of preventing an accident using a technology is called ultrasonic. This project is about making cars more intelligent and interactive which may notify or resist user under unacceptable conditions. This project focuses on building a user-friendly vehicle that specializes in detecting intrusions besides doing close range obstacle detection especially bumper in road.......

Keyword: Ultrasonic, Obstacle detection, Edge detection, infrared sensors, proximity sensor.

[1]. Toshiba to Launch Innovative Rechargeable Battery Business" (Press release). Toshiba. 11 December 2007.Retrieved 25 June 2009
[2]. Alfred Smee (1849). Elements of electro biology,: or the voltaic mechanism of man; of electro -pathology, especially of the nervous system; and of electrotherapeutics. London: Longman, Brown, Green, and Longmans. p. 15.
[3]. Peter Gevorkian (1 August 2007). Sustainable energy systems engineering: the complete green building design resource. McGraw Hill Professional. pp. 498-ISBN 978-0-0147359-0. Retrieved 29 February 2012
[4]. Application -Specific Integrated Circuits (ASIC's). 2013. Application-Specific Integrated Circuits (ASIC's). [ONLINE] Available at: http://www.siliconfareast.com/asic.htm.[Accessed 19 July 2013]
[5]. Embedded Systems Design –Heath Steve-Google-kirjat. 2013. Embedded Systems Design-Steve Heath -Google-kirjat.[ONLINE]Available at: http://books.google.fi/books?id= BjNZXwH7HlkC&pg=PA2&redir_esc =y#v=onepage&q&f=true.[Accessed 18 July 2013]


Paper Type : Research Paper
Title : Adaptive Personalized Web Search with Safety Seclusion
Country : India
Authors : K Manasa || R Lakshmi Tulasi

Abstract: The Comprehensive research demonstrations the competence of our framework. We additionally give an online expectation component to choosing whether customizing a query is beneficial. Personalized web search (PWS) has shown its adequacy in enhancing the nature of different inquiry benefits on the Internet. The exploratory results likewise uncover that GreedyIL altogether beats GreedyDP as far as productivity......

Keyword: Information, Personalization, PWS Personalized Web Search, Search Engine, User Profile.

[1]. Bertino E. and Sandhu.(2005),"Database Security-Concepts Approaches, and allenges,"IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19.
[2]. Chaudhuri S. et al (2011), "Database Access Control & Privacy: Is There a Common Ground?" Proc. Fifth Bien- nial Conf. Innovative Data Systems Research (CIDR), pp. 96-103.
[3]. Fung B. et al (2010), "Privacy-Preserving Data Publishing: A Survey of Recent evelopments," ACM Computing Surveys, vol. 42, no. 4, article 14, 2010.
[4]. Ghinita G. et al (2009),"A Framework for Efficient Data Anonymization Under Privacy and Accuracy Constraints, "ACM Trans. Database Systems, vol. 34, no. 2, article 9.
[5]. Li N. et al (2011), "Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy," Arxiv preprint arXiv:1101.2604.


Paper Type : Research Paper
Title : Prediction of Epileptic Seizure: A Review
Country : India
Authors : Shubhashree Savant || Mukta Dhopeshwarkar

Abstract: Epilepsy is a neurological disorder affecting about 50 million people worldwide. Many techniques have been developed for predicting the basic features of epileptic seizures. Techniques used to forecast seizures include frequency-based methods, statistical analysis of EEG signals, devices to warn seizures etc.. Effective treatments require reliable prediction of seizures to increase their effectiveness and quality-of-life. One of the most dangerous aspects of seizures is its unpredictability. Seizure prediction is an important aim of clinical management and treatment in completely controlling a patient's epilepsy. This paper reviews the prediction of epileptic seizure used during last decade.

Keyword: Epilepsy, Partial Seizure, Generalized seizure, Seizure Prediction

[1]. Viglione S, Ordon V, Martin W, Kesler C, inventors; US government, assignee. Epileptic seizure warning system. US patent 3 863 625. November 2, 1973.

[2]. Lehnertz K, Litt B. The First International Collaborative Workshop on Seizure Prediction: summary and data description. 2005;116(3):493-505.

[3]. World Health Organization, 2011.Available: http://www.who.int/mediacentre/factsheets/fs999/en/

[4]. A. Dalton, S. Patel, A.R. Chowdhury, M. Welsh, T. Pang, S. Schachter, G. ´ Olaighin, P. Bonato, "Detecting epileptic seizures using wearable sensor technologies," In Proc. of the First AMA-IEEE Medical Technology Conference on Individualized Healtcare, 2010.

[5]. Fisher, R., Boas, W., Blume, W., Elger, C., Genton, P., Lee, P., and Engel, J. Epileptic seizures and epilepsy: Definitions proposed by the International League Against Epilepsy (ILAE) and the International Bureau for Epilepsy (IBE). Epilepsia 46, 4 (2005), 470-472.


Paper Type : Research Paper
Title : A Survey on Single Scalar Point Multiplication Algorithms forElliptic Curves overPrime Fields
Country : United Arab Emirates
Authors : Mohammad Rasmi || Ahmad Abu Sokhon || Mohammad Sh. Daoud || Hani Al-Mimi

Abstract: Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter key length compared to other public-key cryptosystems such as RSA. A shorter key reduces the required computations, power consumption, and storage. The major time-consuming operation in ECC is the point multiplication, 𝑘𝑃. Therefore, a lot of research has been carried out to improve the efficiency of ECC implementations. Composite Elliptic Curve (EC) operations and recoding methods are two factors that affect the efficiency of EC scalar multiplication.......

Keyword: Elliptic Curve Cryptography, recoding methods, EC multiplication

[1]. ALMIMI, H., SAMSUDIN, A. & JAHANI, S. 2015. Elliptic-curve scalar multiplication algorithm using ZOT structure. Security and Communication Networks, 8, 1141-1154.
[2]. AVANZI, R. 2005. A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. Selected Areas in Cryptography, vol. 3357, pp. 130-143.
[3]. BALASUBRAMANIAM, P. & KARTHIKEYAN, E. 2007. Elliptic curve scalar multiplication algorithm using complementary recoding. Applied Mathematics and Computation, vol. 190, pp. 51-56.
[4]. BLAKE, I. F., SEROUSSI, G. & SMART, N. P. 1999. Elliptic Curves in Cryptography, Cambridge University Press.
[5]. BOOTH, A. D. 1951. A Signed Binary Multiplication Technique. Quarterly J. Mechanics and Applied Mathematics, vol. 4, pp. 236-240.


Paper Type : Research Paper
Title : A Review Paper on Thinning of Image Using Zhang and Suen Algorithm and Neural Network
Country : India
Authors : Sonam Soni || Dr. Raman Chadha || Sukhmeet Kaur

Abstract: This review paper provides a concise survey on different techniques for thinning and their comparison in image processing. Thinning is one of the fundamental requirements is to represent the structural shape of digital images. This can be done by reducing it to a graph. This process may be completed by obtaining the skeleton of the particular region of the image or the full image using skeletonization of the image also known as thinning. Skeletonization is the process of extracting skeletons from an object in a digital image........

Keyword: Thinning, Skeletonization, Image Processing, Zhang and Suen, Neural Networks, Thinning rate, Thinning speed.

[1]. Abu-Ain W, et al. "Skeletonization Algorithm for Binary Images" The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) pp.704-709.
[2]. Padole G.V, Pokle S. B. "New Iterative Algorithms For Thinning Binary Images" Third International Conference on Emerging Trends in Engineering and Technology IEEE 2010 pp. 166-171
[3]. Chatbri et al. "Using scale space filtering to make thinning algorithms robust against noise in sketch images" Pattern Recognition letters 42(2014) pp. 1-10

[4]. Prakash, R. P., Keerthana S. Prakash, and V. P. Binu. "Thinning algorithm using hypergraph based morphological operators." Advance Computing Conference (IACC), 2015 IEEE International. IEEE, 2015.

[5]. Abu-Ain, W., Abdullah, S.N.H.S., Bataineh, B., Abu-Ain, T. and Omar, K., 2013. Skeletonization Algorithm for Binary Images. Procedia Technology, 11, pp.704-709.


Paper Type : Research Paper
Title : Mining Frequent Patterns on Object-Relational Data
Country : China
Authors : Juliana Lucas Mbuke || Lu Songfeng

Abstract: Data mining is viewed as an essential part of the process towards knowledge discovery. Through data mining process different kinds of patterns that is frequent pattern and others, are discovered, evaluated and presented as knowledge. Mining data from large database repositories which contains vast amount of data is not only interesting but also essential since it yields useful and novel information which aid organizations and other individuals in decision making.........

Keyword: Data mining, frequent pattern mining, object-relational data (ORD)

[1]. Francisco Guil, A.B., and Roque Mar´ın, TSET: An Algorithm For Mining Frequent Temporal Patterns.
[2]. Li, L., B. Yang, and F. Zhou, A framework for object-oriented data mining, in Fuzzy Systems and Knowledge Discovery, 2008. FSKD'08. Fifth International Conference on. 2008, IEEE. p. 60-64.
[3]. Gole, S. and B. Tidke, Frequent itemset mining for Big Data in social media using ClustBigFIM algorithm, in Pervasive Computing (ICPC), 2015 International Conference on. 2015, IEEE. p. 1-6.
[4]. LEI XU, C.J., (Member, IEEE), JIAN WANG, (Member, IEEE), and M. JIAN YUAN, IEEE), AND YONG REN, (Member, IEEE), Information Security on Big Data: Privacy and Data Mining. IEEE Access, 2014.
[5]. Jiawei Han, M.K., Data Mining: Concepts and Techniques. 2nd ed. Data Management Systems, ed. M.R. Jim Gray. 2006, San Francisco,CA,USA: Diane Cerra. 772.


Paper Type : Research Paper
Title : Evaluation of Intrusion Detection Schemes in Wireless Sensor Network
Country : India
Authors : Ishu Gupta || Kishu Gupta

Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environment and the sensors nodes are fully distributed in nature. In order to communicate with each other a multi hop communication should be used........

Keyword: Anomaly-based IDS, Cluster-based IDS, Intrusion Detection System, sensor node, Signature-based IDS, Wireless Sensor Network

[1]. https://www.google.co.in/search?hl=en&site=imghp&tbm=isch&source=hp&biw=&bih=&q=wireless+sensor+network&btnG=Search+by+i mage#btnG=Search+by+image&imgrc=ok-Eklg0v_LAGM%3A.
[2]. Zapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing."ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (2002): 106-107.
[3]. Hu, Yih-Chun, David B. Johnson, and Adrian Perrig. "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks." Ad Hoc Networks1, no. 1 (2003): 175-192.
[4]. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Ariadne: A secure on-demand routing protocol for ad hoc networks." Wireless Networks 11, no. 1-2 (2005): 21-38.


Paper Type : Research Paper
Title : An Approach to Sentiment Analysis using Artificial Neural Network with Comparative Analysis of Different Techniques
Country : India
Authors : Pranali Borele || Dilipkumar A. Borikar

Abstract: Sentiment Analysis is the process of identifying whether the opinion or reviews expressed in a piece of work is positive, negative or neutral. Sentiment analysis is useful in social media monitoring to automatically characterize the overall feeling or mood of consumers as replicated in social media toward a specific brand or company and determine whether they are viewed positively or negatively on the web Sentiment Analysis has been widely used in classification of review of products and movie review ratings.........

Keyword: Machine Learning, Maximum Entropy, Naïve Bayes, Neural Network, Sentiment analysis, Support Vector Machine.

[1] B. Pang, L. Lee, and S. Vaithyanathan, "Thumbs up?: sentiment classification using machine learning techniques," in Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics, 2002, pp.79–86.
[2] K. Dave, S. Lawrence, and D. M. Pennock, "Mining the peanut gallery: Opinion extraction and semantic classification of product reviews,"in Proceedings of the 12th international conference on World Wide Web. ACM, 2003, pp. 519–528.
[3] Neethu M S and Rajasree R," Sentiment Analysis in Twitter using Machine Learning Techniques", 4th ICCCNT 2013 July 4 - 6, 2013, Tiruchengode, India
[4] S.B.Kotsianta, I.D. Zaharakis and P.E. Pintelas." Machine Learning: a review of classification and combining technique",Springer,(pp.159-190).-2006


Researcher can also search IOSR published article contents through

IOSR Xplore