IOSR Journal of Computer Engineering (IOSR-JCE)

May – Jun 2016 Volume 18 - Issue 3

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Investigating DHCP and DNS Protocols Using Wireshark
Country : India
Authors : Sameena Naaz || Firdoos Ahmad Badroo

Abstract: For different computers to communicate on the same network or on different networks they need to know one another's IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a network analyst to secure the communication. There are various ways to mitigate the attacks in application, transport and network layers of a network. Mitigating the attacks in data link layer is a challenging task for a network analyst as adequate security is not assigned to a data link layer. DHCP and DNS are the most widely......

Keyword: DNS, DNS Packets, DHCP, DHCP Packets, Rogue DHCP server

[1] A. Razaque and K. Elleithy, "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to improve Pedagogical Activities in Mobile Collaborative learning (MCL)", Journal of Communication. & Computer Engineering, Volume 3, Issue 1, 2013, Pages 15-29, ISSN 2090-6234.
[2] B.A Forouzan, Network Models, in Data Communication and Networking (New Delhi, Tata McGraw Hill, 2006)27-60.
[3] [online]:Available:
[4] [online]:Available:

Paper Type : Research Paper
Title : User Profile Completion with Online Social Circles
Country : China
Authors : Hailong Qin || Jing Liu || Chin-Yew Lin || Ting Liu

Abstract: User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It makes profile completionbecomeapopularresearch topic. Users have manystrongrelationships online, and theserelationshipsformmany social circles, such as classmate, family and colleague. A user'sdifferent online social circlescanrepresentthisuser'svarious social attributes. We focus the task of user profile completion in thispaper.......

Keyword: User Profile Completion, Social Circle, Non-negative Matrix Factorization

[1] C. Peersman, W. Daelemans, L. Van Vaerenbergh, Predicting age and gender in online social networks, Proceedings of the 3rd international workshop on Search and mining user-generated contents, ACM, 2011, 37–44.
[2] D. Nguyen, N. A. Smith, C. P. Ros´e, Author age prediction from text using linear regression, Proceedings of the 5th ACL-HLT Workshop on Language Technology for Cultural Heritage, Social Sciences, and Humanities,Association for Computational Linguistics, 2011, 115–123.
[3] S. Rosenthal, K. McKeown, Age prediction in blogs: A study of style,content, and online behavior in pre-and post-social media generations, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, Associationfor Computational Linguistics, 2011, 763–772.
[4] J. D. Burger, J. Henderson, G. Kim, G. Zarrella, Discriminating gender on twitter, Proceedings of the Conference on Empirical Methods inNatural Language Processing, Association for Computational Linguistics, 2011, 1301–1309.
[5] I. Ajzen, M. Fishbein, Understanding attitudes and predicting social behavior.(Prentice-Hall, 1980).

Paper Type : Research Paper
Title : Can Wikipedia Be A Reliable Source For Translation?Testing Wikipedia Cross Lingual Coverage of Medical Domain
Country : India
Authors : Eslam Amer || Mohamed Abd-Elfattah

Abstract: This paper introduces Wiki-Transpose, a query translation system for cross-lingual information retrieval (CLIR). Wiki-Transpose rely only on Wikipedia as information source for translations. The main goal of this paper is to check the coverage ratio of Wikipedia against specializedqueries that are related to medical domain.......

Keyword: CLIR, query translation, Wiki-Transpose

[1] D. Nguyen, A. Overwijk, C. Hau , R.B. Trieschnigg, D. Hiemstra, and F.M.G. Jong de. WikiTranslate: Query Translation for Cross-lingual Information Retrieval using only Wikipedia. In Proceedings of CLEF , pages 58-65, 2009.
[2] Monika Sharma1, SudhaMorwal. "A Survey on Cross Language Information Retrieval", International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 2, February 2015.
[3] Le, Quoc V., and Tomas Mikolov. "Distributed representations of sentences and documents." Proceedings of the 31st International Conference on Machine Learning , Beijing, China, 2014. JMLR: W&CP volume 32
[4] Benoît Gaillard, MalekBoualem, Olivier Collin." Query Translation using Wikipedia-based resources for analysis and disambiguation" Proc EAMT 2010 , 14th Annual Conference of the European Association for Machine Translation, 2010.
[5] Zesch, T., Gurevych, I., Mühlhäuser, M.: Analyzing and Accessing Wikipedia as a Lexical Semantic Resource. In: Data Structures for Linguistic Resources and Applications, pp. 197–205 (2007).

Paper Type : Research Paper
Title : Fmfc: Fuzzy Based Improved Mutual Friend Crawling
Country : India
Authors : Varnica

Abstract: Online Social networks are becoming an important part of research in every field. Crawling such networks and extracting data from them is a very difficult task. Till date, many crawling techniques have been designed for this purpose. The properties of complex networks have been reviewed in this paper. This paper has focused on mutual friend crawling and applied it on a dataset.....

Keyword: ACC, ADD, APL, BFS, Clustering Coefficient, Complex Networks, DFS, MFC, Overheads.

[1] Yadav A. and Singh P., "Web Crawl Detection and Analysis of Semantic Data", International Journal of Computer Trends and Technology, Volume 21, Number 1, ISSN: 2231-2803 (2015).
[2] Ahuja M., Singh J. and Varnica, "Web Crawler: Extracting the Web Data", International Journal of Computer Trends and Technology, Volume 13, number 3, ISSN: 2231-2803(2014).
[3] Mini Singh Ahuja and Jatinder Singh, "Future Prospects in Community Detection", International Journal of Computer Science Engineering and Information Technology Research, Vol. 4, Issue 5, ISSN: 2249-6831 (2014).
[4] Mcphail M., "The Statistical Properties of Complex Networks", Australian Mathematical Sciences Institute (2014).
[5] Janbandhu R., Dahiwale P. and Raghuwanshi M., "Analysis of Web Crawling Algorithms", International Journal on Recent and Innovation Trends in Computing and Communication, Volume 2, Issue 3, ISSN: 488-492 (2014).

Paper Type : Research Paper
Title : Factory Pattern in Model of Object Oriented Application Development
Country : India
Authors : Gaurav Pradip Pande || Umesh Kulkarni

Abstract: Design pattern is a salient milestone in the development of coding techniques. Code reusability is the prime motive of design patterns and it promotes code development by finding the existing solution which could be as close as it could be to the new design problem. Generally small scale applications ignore the design patterns and coding is done in traditional way, patterns are considered to develop large scale applications like IDEs. Proposed work suggests use of Factory pattern in small scale application development in object oriented languages. Factory pattern creates hierarchical abstraction of objects......

Keyword: Design pattern, factory pattern, code reusability

[1]. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design Patterns: Elements of reusable object oriented software Addison-Wesley, Second ISE reprint edition, 1999.
[2]. Rachel Cardell-Oliver, Evaluating the Application and Understanding of Elementary programming patterns 22nd Australian Conference on Software Engineering, pg 61-66, 2013.
[3]. Design Patterns,, (Accessed: 28 Dec 2015)
[4]. Gaurav Pradip Pande ,Akshay Janardan Mendki, Design Patterns' Model for Application Development in Object Oriented Languages

Paper Type : Research Paper
Title : A Technique To Hide Information Within Image File For Secure Transmission
Country : India
Authors : Anita Khanal || Anup Pradhan || Mingur Namgyal Gurung || Rinchen Doma Bhutia || Rajeev Sharma

Abstract: In today's world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points......

Keyword: Steganography, Cryptography, plain text, encryption, decryption, transposition cipher.

[1]. N.F. Johnson and S.C. Katzenbeisser, "A survey of steganographic techniques", in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[2]. N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Workshop on Information Hiding, 1998.
[3]. N. Johnson and S. Jajodia. Exploring Steganography: Seeing the Unseen. Computer, vol. 31, no. 2, pp. 2634, 1998.
[4]. K. Lee, A. Westfeld, and S. Lee. Generalised category attack: improving histogram-based attack on jpeg lsb embedding.In Proceedings of the 9th international conference on Information hiding, IH'07, pages 378–391, Berlin, Heidelberg, 2007.Springer-Verlag.

Paper Type : Research Paper
Title : Human Being Character Analysis from Their Social Networking Profiles
Country : India
Authors : Biswaranjan Samal || Mrutyunjaya Panda

Abstract: In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays a vital role in classifying the human characteristics. The user profile status is collected from LinkedIn, a popular professional social networking application. Oauth2.0 protocol is used for login into the LinkedIn and web scrapping using JavaScript is used for information extraction of the registered users.....

Keyword: Accuracy ,Clustur, Corpus, K-NN, Oauth, Social media, Unigrams, WebScrapping ,Word Net

[1]. Bing Liu, "Synthetic structure of industrial plastics (Handbook of Natural Language Processing, Second Edition, editors: N. Indurkhya and F. J. Damerau)," 2010.
[2]. Bing Liu, Xiaoli Li, Wee Sun Lee and Philip S. Yu, "Text Classification by Labeling Words", American Association for Artificial Intelligence. 2004.

[3]. George A. Miller, "WordNet: (A Lexical Database for English. Communications of the ACM Vol. 38, No. 11: 39-41)", 1995 .

[4]. Christiane Fellbaum, "( WordNet: An Electronic Lexical Database. Cambridge, MA: MIT Press)", 1998.

[5]. Dekang Lin, "Automatic Retrieval and Clustering of Similar Words" ., COLING '98 Proceedings of the 17th international conference on Computational linguistics - Volume 2 , 768-774, 1998

Paper Type : Research Paper
Title : Threat Modeling Based on Randomized Seeding Attacks In Cloud Virtual Machines
Country : India
Authors : Alexander Ngenzi || Dr. Selvarani R || Dr. Suchithra R

Abstract: Threats in virtual machines have been a major challenge in most cloud data centers. The attack/ threat begins from physical machines (hosts) and spreads to all virtual machines(guests). As a result, the virtual machines get infected rapidly by recursive growth of the seeds/ nodes generated in a random manner. This paper proposes threat modeling based on randomized growth of these seeds or nodes. The simulated attacks are free from a deterministic pattern and hence all threats can be detected and prevented.....

Keyword: Cloud computing, STRIDE, VMs, APIs, ASF, DREAD, Randomized seeding attack.

[1]. Yu Zhang,Bharat Bhargava (2008) Fibonacci Modeling of Malware Propagation
[2]. Yashaswi Singh, Farah Kandah, Weiyi Zhang (2011); A Secured Cost-effective Multi-Cloud Storage in Cloud Computing. Com-puter Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conence DOI: 10.1109/INFCOMW.2011.5928887 ,Page(s): 619 - 624
[3]. Wesam Dawoud , Ibrahim Takouna , Christoph Meinel , Infrastructure as a Service Security: Challenges and Solu- tions @2010 in 7th International Conference on Informatics and System, 2010 page 1-8
[4]. Joel Weis and Jim Alves-Foss: Securing Database-as-a-Service: Issues and Compromises, IEEE Security & Privacy,@2011 Volume 9 No-6 page 49-55

Paper Type : Research Paper
Title : A Study on Partition Based Clustering Image Segmentation
Country : India
Authors : Pradeep Sharma || Gayatri Duwarah || Barnali Kalita || Sanjeev Shekhar Gogoi

Abstract: This paper presents a study on partition based clustering image segmentation algorithms such as K-means, K-medoids. Before describing image segmentation let us define what an image is – An image is a 2-dimensional function (x, y), where x and y are spatial co-ordinate and the amplitude of f at any pair of co-ordinates (x, y) is called the intensity of the image at that point. Image segmentation plays a major role in computer vision. It aims at extracting meaningful objects lying in the image......

Keyword: Image Segmentation, Clustering, Partition Based Methods, K-means, K- medoids, Euclidean distance, Mahalanobis distance.

[1]. Krishna Kant Singh, Akansha Singh, A Study of Image Segmentation Algorithms for Different Types of Images, International Journal of Computer Science Issues, 7(5), 2010, 1694-0784.
[2]. M.N. Murty, A.K. Jain, P.J. Flynn, Data clustering: a review, ACM Computing Surveys. 31(3), 1999, 0360-0300.
[3]. T. Velmurugan, T. Santhanam, A Survey of Partition based Clustering Algorithms in Data Mining: An Experimental Approach, Information Technology Journal, 10(3), 2011, 1812-5638.
[4]. A.K. Jain, R.C. Dubes, Algorithms for Clustering Data (Englewood Cliffs, NJ: Prentice Hall, 1988).
[5]. J.Han and M.Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann Publishers, 2000).

Paper Type : Research Paper
Title : Hospital Inpatient Caring By Markov Decision Process
Country : India
Authors : Pooja S. Choudhari || Ashwini B. Atole || Shubhada S. Mali || Pradnya V. More || dinesh B. Hanchate

Abstract: Many challenges have been faced by the health care system involving high rates of drug-resistant and hospital-acquired disease, failures of care delivery leading to preventable adverse health events and skyrocketing costs. Over treatment, substandard implementation of health care and lack of success to get the premium practice for prophylactic supervision and safety of patient has enormous and has straight impact or measures on one and other outcome and costs of health care. Contradictorily, both the increase in electronic health data of patient's availability and the development.....

Keyword: Electronic Health Record, Clinical Decision Support System, Transaction Success Probability, Markov Decision Process (MDP), Health Inpatient Care (HIC) .

[1]. Neill, D.B.: Using articial intelligence to improve hospital inpatient care. IEEE Intelligent Systems (2013)
[2]. Ronald Parr, G.T.C.P.-W. Lihong Li, Littman, M.L.: An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning. Proceedings of the 25 th International Conference on Machine Learning, Helsinki, Finland (2008)

Paper Type : Research Paper
Title : Automatic Semantic Video Content Retrieval Based on Fuzzy Ontology
Country : India
Authors : M. V. Khasne || Prof. Ketan Singh

Abstract: Recent advances in digital video analysis and retrieval have made video more accessible than ever. The representation and recognition of events in a video is important for a number of tasks such as video surveillance, video browsing and content based video indexing. Raw data and low-level features alone are not sufficient to fulfill the user's needs; that is, a deeper understanding of the content at the semantic level is required .Currently, manual techniques, which are inefficient, subjective and costly in time and limit the querying capabilities.....

Keyword: Semantic content extraction, video semantic content model, fuzziness, ontology.

[1]. M. Petkovic and W. Jonker, "An Overview of Data Models and Query Languages for Content-Based Video Retrieval", In Proc. Intl Conf. Advances in Infrastructure for E-Business, Science, and Education on the Internet, Aug. 2000.
[2]. M. Petkovic and W. Jonker, "Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events", In Proc. IEEE Intl Workshop Detection and Recognition of Events in Video, pp. 75-82, 2001.
[3]. L.S. Davis, S. Fejes, D. Harwood, Y. Yacoob, I. Haratoglu, and M.J. Black, "Visual Surveillance of Human Activity", In Proc. Third Asian Conf. Computer Vision (ACCV), vol. 2, pp. 267-274, 1998.
[4]. G.G. Medioni, I. Cohen, F. Bremond, S. Hongeng, and R. Nevatia, Event Detection and Analysis from Video Streams, IEEE Trans. Pattern Analysis Machine Intelligence, vol. 23, no. 8, pp. 873-889,Aug. 2001.

Paper Type : Research Paper
Title : Snmp Implementaton on Hp Routers with Ovpi (Openview Performance Insight) and Network Management
Country : Albania
Authors : Enis Çerri

Abstract: This study is a practical application of the informatics laboratory applied and gives us the score about how the SNMP protocol is brought together with OVPI (OpenView Performance Insight) in traffic protocol packets within a virtual network. This application was made on the basis of the study made before the Base Station and I have brought a practical applicable version. SNMP is an application-layer protocol of the OSI model that realizes information exchange network management between the NMS (Network Management System), managed agents and equipment. SNMP managed network consists of three main components that are provided: Managed devices, Agents, NMS.

Keyword: SNMP, OVPI, network management, NMS.

[1] M Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, Application of fuzzy theory to writer recognition of Chinese characters, International Journal of Modelling and Simulation, 18(2), 1998, 112-116.
[2] R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966).
[3] P.O. Bishop, Neurophysiology of binocular vision, in J.Houseman (Ed.), Handbook of physiology, 4 (New York: Springer-Verlag, 1970) 342-366.
[4] D.S. Chan, Theory and implementation of multidimensional discrete systems for signal processing, doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978.
[5] W.J. Book, Modelling design and control of flexible manipulator arms: A tutorial review, Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, 500-506

Paper Type : Research Paper
Title : Design and Implementation of Location-Based Application of Secure Coding Providing Local Information
Country : Korea
Authors : Yangwon Lim || Jinyoung Jung || Hankyu Lim(corresponding author)

Abstract: The development of information technologies (IT) has made it easier to produce and process information. In particular, the development of smartphones has enabled anyone to easily access and use processed information. These technologies are used not only online, but also by connecting with offline services. In recent years, services that provide real-time travel information, which are connected with offline services, have become popular. In addition, security should be maintained not only for information provided by the server, but also for the protection of user information.....

Keyword: Location Based Service, Local Information, Smartphone App , Secure Coding.

[1] O'REILLY, T., "What Is Web2.0 : Design Patterns and Business Models for the Next Generation of Software", COMMUNICATIONS and STRATEGIES vol.65, 1st quarter 2007.
[2] MITSUTERU NAKAMURA, YASUHIRO OMIYA, KAZUKI KATAGISHI , "A Secure Coding for Function-Approximated Images", 12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, pp.416-420, 2008
[5] Yangwon Lim, JunYeong Kim, Daejun Lim, SeungJae Lee, Hankyu Lim, "A Study of Social Network Content for Effective Content Displays-Centering on Travel Information Content-", ICFICE 2014,

Paper Type : Research Paper
Title : Techniques for Reduction of HandoverInterruption in Mobile Networks
Country : India
Authors : Shivi Saxena || S.Qamar

Abstract: Handoff is the procedure providing the connection to the backbone network while a mobileterminal is moving across the boundaries of coverage of two wireless points of connection.The handover management procedure is defined by a sequence of management messages exchanged between the mobile stations and serving base station. An individual set of messages is utilized for each of the handover stages. As the messages are exchanged consequently, a short interval during which the mobile station cannot receive and/or transmit data occurs inthe case of the hard handover......

Keyword: Cellular Networks, Hard Handoff, Handover Interruption and Mobile Station.

[1]. D. Cox and D. Reudink, "Increasing channel occupancy in large-scale mobile radio sysyems: dynamic channel reassignment," IEEE Trans.Communciation., vol. 21, pp. 1302–1306,Nov.1973.
[2]. M. Gudmundson, "Analysis of Handover Algorithms," In the Proc. IEEE Vehicular Technology Conference (VTC-91), St. Louis, MO, USA, May1991, pp. 537-542,1991.
[3]. Y.B. Lin, S. Mohan, and A. Noerpel, "Queueing priority channel assignment strategies for PCS handoff and initial access," IEEE Trans.Veh. Technol., vol. 43, no. 3, 1994, pp. 704–712,1994.
[4]. Perkins C.E., Johnson D.B. Mobility Support in IPv6 (Annual,1996, New York, USA) Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. Rye, New York, USA.Nov. 10th 12th,27-37 pp. 1996.
[5]. M.-L.Cheng and J.-I. Chuang, "Performance evaluation of distributed measurement-based dynamic channel assignment in local wireless communications," IEEE J. Select. Areas Commun., vol. 14, pp. 698–710, May 1996.

Researcher can also search IOSR published article contents through

IOSR Xplore