IOSR Journal of Computer Engineering (IOSR-JCE)

Jul. - Aug. 2016 Volume 18 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Speech Recognition System – A Review
Country : India
Authors : Shaikh Naziya S. || R.R. Deshmukh

Abstract: Language is the most important means of communication and speech is its main medium. In human to machine interface, speech signal is transformed into analog and digital wave form which can be understood by machine. Speech technologies are vastly used and has unlimited uses. These technologies enable machines to respond correctly and reliably to human voices, and provide useful and valuable services.The paper gives an overview of the speech recognition process, its basic model, and its application, approaches and also discuss comparative study of different approaches which are used for speech recognition system............

Keyword: Speech Recognition, Speech processing, Feature Extraction Techniques, Modeling Techniques, Applications of SRS.

[1]. Abdulla, W. H., Chow, D., & Sin, G. (2003, October). Cross-words reference template for DTW-based speech recognition systems. In TENCON 2003. Conference on Convergent Technologies for the Asia-Pacific Region (Vol. 4, pp. 1576-1579). IEEE.

[2]. Al-Qatab, B. A., & Ainon, R. N. (2010, June). Arabic speech recognition using hidden Markov model toolkit (HTK). In Information Technology (ITSim), 2010 International Symposium in (Vol. 2, pp. 557-562). IEEE.

[3]. Bahl, L. R., Brown, P. F., De Souza, P. V., & Mercer, R. L. (1993). Estimating hidden Markov model parameters so as to maximize speech recognition accuracy. Speech and Audio Processing, IEEE Transactions on,1(1), 77-83.

[4]. Bahl, L. R., Brown, P. F., de Souza, P. V., Mercer, R. L., & Picheny, M. A. (1993). A method for the construction of acoustic Markov models for words. Speech and Audio Processing, IEEE Transactions on, 1(4), 443-452.

[5]. Butzberger, J., Murveit, H., Shriberg, E., & Price, P. (1992, February). Spontaneous speech effects in large vocabulary speech recognition applications. In Proceedings of the workshop on Speech and Natural Language (pp. 339-343). Association for Computational Linguistics.


Paper Type : Research Paper
Title : Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review
Country : India
Authors : Nisha Sharma || Dr.Sugandha Singh

Abstract: MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults. Countless critical management schemes for MANETs are given to fix assorted protection problems. The producing requests of mobile ad hoc webs (MANETs) have made connected protection subjects method extra important. Individuality (ID)-based cryptography alongside threshold key allocating and Bilinear Pairing calculation is a favorite way for the key association design, though these ways have setbacks bestowing competent protection and speed. In this paper, we have surveyed cluster key association strategies that have been counseled so far. The Key Association scope includes key creation, key allocation, and key maintenance.

Keyword: Network Security, MANETS, Public key Cryptography, Key Management

[1]. Merwe, Johann Van Der, Dawoud Dawoud, and Stephen McDonald. "A survey on peer-to-peer key management for mobile ad hoc networks." ACM computing surveys (CSUR) 39, no. 1 (2007).
[2]. Francis, Merin, M. Sangeetha, and A. Sabari. "A survey of key Management Technique for Secure and Reliable Data Transmission in MANET." International Journal of Advanced Research in Computer Science and Software Engineering (IJAARCSSE) 3, no. 1 (2013): 22-27.
[3]. Bing Wu Department of Mathematics and Computer Science Fayetteville State University Email: bwu@uncfsu.edu Jie Wu and Mihaela Cardei Department of Computer Science & Engineering Florida Atlantic University Email: {jie, mihaela}@cse.fau.edu.
[4]. Hegland, A.M. et al, in "A survey of key association in ad hoc networks" 2006


Paper Type : Research Paper
Title : Comprehensive Study of Software Clone Detection Techniques
Country : India
Authors : Sunayna || Kamna Solanki || Sandeep Dalal || Sudhir

Abstract: Software cloning means duplication of source code. It is most basic means of software reuse. A software clone is a code fragment which is identical to another in the source code. Clones are harmful for software maintenance because it increases the complexity of system and maintenance cost. If we detect software clones it can decrease software maintenance cost....../

Keyword:Software cloning, Types of software clone, Software clone detection techniques, Comparison of different clone detection techniques.

[1]. L.Jiang, G. Misherghi, S. Glondu , " DECKARD Scalable and Accurate Treebased Detection of Code Clones", 29th
International Conference on Software Engineering (ICSE'07), July 2007.
[2]. I. Baxter, A. Yahin, L. Moura, M. Anna ,"Clone Detectio Using Abstract Syntax Trees," in Proceedings of 14th International
Conference on Software Maintenance (ICSM'98) Bethesda , Maryland, November 1998.
[3]. J. Krinke,"Identifying Similar Code with Program Dependence Graphs,"in Proceedings of 8th Working Conference on Reverse
Engineering, Stuttgart, Germany, October 2001.
[4]. S. Ducasse, M. Rieger , S. Demeyer, " A Language Independent Approach for Detecting Duplicated Code,"In Proceedings of
15th International Conference on Software Maintenance ( ICSM'99), Oxford, England, September 1999.
[5]. R. Komondoor and S. Horwitz. " Using Slicing to Identify Duplication in Source Code".In Proceedings of the 8th
International Symposium on Static Anslysis (SAS'01), Paris, France, July 2001.


Paper Type : Research Paper
Title : An Enhanced Round Robin CPU Scheduling Algorithm
Country : India
Authors : Jayanti Khatri

Abstract: CPU scheduling is a process which allows one process to use the CPU while the another process is in waiting state due to unavailability of any resource like I/O etc, thereby making full use of CPU. The aim of CPU scheduling is to make the system efficient, fast and fair. Most CPU scheduling algorithms focus on maximizing CPU utilization, maximum throughput and minimizing waiting time, turnaround time, response time and number of context switches for a set of processes. There are many algorithms available for CPU scheduling and all algorithms have their own advantages and limitations. Round Robin algorithm is designed specifically for time sharing systems........

Keyword: Burst Time, Gantt Chart, Round Robin Scheduling, Time Quantum, Turnaround Time, Waiting Time

[1]. A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts (7th Edn., John Wiley and Sons Inc, 2005, ISBN 0-471-69466-5).
[2]. A. R. Dash. S. K. Sahu and S. K. Samantra, An Optimized Round Robin CPU Scheduling Algorithm with Dynamic Time Quantum, International Journal of Computer Science, Engineering and Information Technology (lJCSEIT), Vol. 5, No.I, February 2015.
[3]. Ahmed Alsheikhy, Reda Amma and Raafat Elfouly, "An Improved Dynamic Round Robin Scheduling Algorithm Based on a Variant Quantum Time", 978-1-5090-0275-7/15/$31.00 ©2015 IEEE
[4]. Arfa Yasin, Ahmed Faraz, Saad Rehman, " Prioritized Fair Round Robin Algorithm with Variable Time Quantum", 13th International Conference on Frontiers of Information Technology 2015 IEEE.
[5]. Imran Qureshi, "CPU Scheduling Algorithms: A Survey", Int. J. Advanced Networking and Applications, Vol. 05, Issue 04, Pages 1968-1973 (2014) ISSN 0975-0290.


Paper Type : Research Paper
Title : Phernome Based Node Tracking and Routing For Adhoc Networks
Country : Telangana
Authors : Ugendhar Addagatla || Dr. V. Janaki

Abstract: Wireless networking grows rapidly because of the human desires for mobility and for freedom from limitation, i.e., from physical connections to communication networks. Recent advances in wireless technology have equipped portable computers, such as notebook computers and personal digital assistants with wireless interfaces that allow networked communication even while a user is mobile. The main objective of this paper is to cope with weight. The proposed Route Tracking Protocol helps an existing system to cope with weight. As a concrete instantiation of such an existing system, we chose mobile ad-hoc networks (MANETs) running Dynamic Source Routing (DSR) and applied ANT to it...........

Keyword: Dynamic Source Routing, MANETs, Mobility, Route Tracking Protocol, Wireless Interfaces

[1] A review of routing protocols for mobile ad hoc networks: by Mehran Abolhasan, Tadeusz wysocki,Eryk Dutkiewicz 2003.
[2] Dave B. Johnson and David A. Maltz, The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET)Working Group, IETF, October 1999.
[3] Levente Butty_an and Jean-Pierre Hubaux. Enforcing service availability in mobile ad-hoc wans. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.
[4] Levente Butty_an and Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. MONET Journal of Mobile Networks, to appear 2002.
[5] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing weight in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255–265, 2000.


Paper Type : Research Paper
Title : Efficient Network Design Parameters for Packet Switching Using Poisson distribution Methode
Country : India
Authors : L.Sudha || Dr.P.Thangaraj

Abstract: Wireless sensor network is a group of sensor nodes with inadequate processor and partial memory unit embedded with other equipment for communication through the networking banding system. Sensor networks is one of the component of computer network which are used widely in many range of applications, they are Environment monitoring, healthcare, industrial control units of monitoring and system, military applications for security information transformation and many more. This paper defines the basic of security requirements and specification and various attacks on OSI layer network and type of routing algorithm............

Keyword: Computer Network, Type of attacks, Routing, Packet Switching, Poisson Distribution

[1]. Ali Dorri, Seyed Reza Kamel and Esmail kheyrkhah, Security challenges in mobile ad hoc Networks: A survey, International Journal of Computer Science & Engineering Survey (IJCSES),6(1), 2015,15-29.
[2]. Emerole Kelechi C and Achumba I, A Critical Review of Techniques for Security and Measurement in a Switched Network, International Journal of Science, Engineering and Technology Research (IJSETR), 4(1), 2015,24-29.
[3]. Fatemeh Soleimani Roozbahan and Reihaneh Azad, Security Solutions against Computer Networks Threats, International Journal of Advanced Networking and Applications,7(1),2015, 2576-2581.
[4]. Lovepreet kaur and Jyoteesh Malhotra , Review on Security Issues and Attacks in Wireless Sensor Networks, International Journal of Future Generation Communication and Networking,8(4),2015,81-88.
[5]. Lovepreet,Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey, International Journal of Computer Applications,100(1),2014, 0975 –0987.


Paper Type : Research Paper
Title : Iris Pattern Recognition
Country : India
Authors : Dr. S. T. Deepa || Praneetha V

Abstract: The earlier experimental which were conducted has resulted in the biometric templates, which include the iris of human eye and the attributes of the individual, that are produced using different methods of recognition, which can be matched with the help of central rays in the convex polyhedral cones and that these templates are protected by a method which is extended from Iris-templates and it can be broken into. The results of these experiments clearly show that, the convex polyhedral cone template cannot be presumed secure without a thorough security analysis............

Keyword: Biometrics, iris recognition, Edge detection, Gradient, Median filter

[1]. A. W. K. Kong, "A Statistical Analysis of IrisCode and Its Security Implications," IEEE Trans. Pattern Anal. Mach. Intell.,vol. 37, no. 3, pp. 513–528, Mar. 2015.
[2]. J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell.,vol. 15, no. 11, pp. 1148–1161, Nov. 1993.
[3]. J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst.Video Technol., vol. 14, no. 1, pp. 21–30, Jan. 2004.
[4]. J. Daugman, "New methods in iris recognition," IEEE Trans. Syst. Man, Cybern. B, Cybern., vol. 37, no. 5, pp. 1167–1175, Oct. 2007.
[5]. A. W. K. Kong, D. Zhang, and M. Kamel, "An analysis of IrisCode,"IEEE Trans. Image Process., vol. 19, no. 2, pp. 522–532, Feb. 2010.


Paper Type : Research Paper
Title : Analysis of Various Recommendation Systems
Country : India
Authors : Sunidhi Sachdeva || Namita Tiwari

Abstract: In today's world the only way to catch and keep user's attention to one's website is to provide them with the recommendation list to match the needs of user. In this paper the most popular and widely used recommendation algorithms to build a recommender system has been surveyed. A recommender system is an intermediate program (or an agent) with a user interface that automatically and shrewdly generates a list of information which fits an individual's needs.............

Keyword: Recommendation System, Filtering

[1] Jiawei Han and Micheline Kamber, Data Mining:Concepts and Techniques (Elsevier Inc., 2006).
[2] Deshpande M. and Karypis G., Item-based top-n recommendation algorithms, ACM Transactions on Information Systems, Vol. 22, No. 1, January 2004, Pages 143–177.
[3] Greg Linden, Brent Smith, and Jeremy York, Amazon.com Recommendations, IEEE Internet computing, 7.1, 2003, 76-80.
[4] David W. Cheungt, Jiawei Hans, Vincent T. Ngtt Ada, W. Fuss Yongjian FuI, A Fast Distributed Algorithm for Mining Association Rules, Parallel and Distributed Information Systems, 1996, Fourth International Conference on IEEE, 1996, 31-42.
[5] Weiyang Lin, Association Rule Mining for Collaborative Recommender Systems., Diss. Worcester Polytechnic Institute, 2000.


Paper Type : Research Paper
Title : Lossless and Lossy Polynomial Image Compression
Country : India
Authors : Ghadah Al-Khafaji || Maha A. Rajab

Abstract: This paper introduced a new hybrid image compression system of the lossless non-linear polynomial coding base and lossy linear polynomial base. The results are promising, since it would achieve high compression ratio with excellent medical image quality.

Keyword: lossless and lossy, linear and non-linear polynomial coding.

[1]. Alka sharma, Gagangeet Singh Aujla and Jagbir Singh Gill. 2013. A Comprehensive lossless modified compression in medical application on DICOM CT images. IOSR Journal of Computer Engineering (IOSR-JCE). Issue 3, Vol. 15, December, pp: 01-07.
[2]. Fuangfar Pensiri and Surapong Auwatanamongkol.2012. A lossless image compression algorithm using predictive coding based on quantized colors. Wseas Transactions on Signal Processing, Fuangfar Pensiri, Surapong Auwatanamongkol. E-ISSN: 2224-3488, Issue 2, Vol. 8, April, pp: 43-53.
[3]. Pralhadrao V Shantagiri and Saravanan K N.2013. Pixel Size Reduction Loss-Less Image Compression Algorithm. International Journal of Computer Science & Information Technology (IJCSIT) Vol. 5, No. 2, April, pp: 87-95.
[4]. Gaurav Vijayvargiya, Dr. Sanjay Silakari and Dr.Rajeev Pandey. 2013. A Survey: Various Techniques of Image Compression. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 10, October.
[5]. Rasha Al-Tamimi1 and Ghadah Al-Khafaji. 2015. Image Compression Using Hirarchical Linear Polynomial Coding. International Journal of Computer Science and Mobile Computing, Vol.4 Issue.1, January, pp: 112 – 119


Paper Type : Research Paper
Title : A Structured and Layered Approach for a Modular Electronic Voting System: Defining the Security Service and the Network Access Layers
Country : Nigeria
Authors : Emeka Reginald Nwogu || Chinedum E.Ihedigbo

Abstract: This is the second part of the series of works that attempt to solve the problem of non-modularity in electronic voting systems. The work analyzed the second layer (Security Service layer) of our proposed structured and layered model. The Security Service layer was split into two sub-layers, namely; the Security control &application and the Security infrastructure sub-layers............

Keyword: E voting, Electronic voting, Layer, Modular, Security Service

[1]. Adida, B. (2006), Advances in Cryptographic Voting Systems. Electrical Engineering, Massachusetts Institute of Technology. Retrieved March 10, 2016 from https://dspace.mit.edu/handle/1721.1/38302
[2]. Anil K. Jain, Arun Ross and Salil Prabhakar (2004), An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.
[3]. Ayushi (2010), A Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications (0975-8887) Volume 1 – No. 15


Paper Type : Research Paper
Title : Fast Face Detection Assisted with Skin Color Detection
Country : Taiwan
Authors : Shu-Lin Hwang

Abstract: The key to e-commerce is confirming the identity of trading parties to ensure the non-repudiation of the communicating parties. The typical technologies include the digital signature-based identification technology and the biometric identification technology to identify individuals on the basis of different biological features (e.g., face, retina). Face recognition has been a popular technology, and the recognition efficiency is subject to the pre-stage face detection. Hence, it is important to achieve rapid detection of faces in images. This study proposed a fast face detection system targeting at dynamic images............

Keyword: A Skin color detection, face detection, dynamic images, adaboost

[1] C. Duan-Sheng and L. Zheng-Kai, "A survey of skin color detection", Chinese Journal of Computers, vol.29, no.2, pp. 194-207 2006.
[2] Huang Y. T., Chiang C. C., "Real-time detection of multiple faces using rule-based methods", in Information science Engineering, pp. 65, Dong-Hwa University Taiwan, 2002.
[3] Y. Freund and R. Schapire, "A desicion-theoretic generalization of on-line learning and an application to boosting", pp. 23-37, Springer, 1995.
[4] P. Viola and M. Jones, "Rapid object detection using a boosted cascade of simple features", in Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on, pp. I-511-I-518 vol.511, 2001.


Paper Type : Research Paper
Title : Cuckoo Search based Optimal Elliptic Curve Cryptography (OECC) for Text Encryption
Country : India
Authors : Gnanaprakasam Thangavel || Rajivkannan Athiyappan

Abstract: The Cryptography converts our original text information into non understandable form of text that is cipher text which is more powerful because which is not understandable. . In this work we are implemented the text encryption using the Optimal Elliptic Curve Cryptography (OECC) method using Cloud Simulator. Practical results and comparisons of Elliptic Curve Cryptography (ECC) and OECC are presented............

Keyword: Cuckoo Search, Decryption, Efficiency, Elliptic Curve Cryptography, Encryption

[1] Thuan Thanh Nguyen, Anh Viet Truong, Tuan Anh Phung, A novel method based on adaptive cuckoo search for optimal network
reconfiguration and distributed generation allocation in distribution network, International Journal of Electrical Power & Energy
Systems, Volume 78, June 2016, Pages 801-815
[2] Ping Jiang, Feng Liu, Jianzhou Wang, Yiliao Song, Cuckoo search-designated fractal interpolation functions with winner
combination for estimating missing values in time series, Applied Mathematical Modelling, In Press, Corrected Proof, Available
online 28 July 2016
[3] Ehsan Teymourian, Vahid Kayvanfar, GH.M. Komaki, M. Zandieh, Enhanced intelligent water drops and cuckoo search algorithms
for solving the capacitated vehicle routing problem, Information Sciences, Volumes 334–335, 20 March 2016, Pages 354-378


Paper Type : Research Paper
Title : Support Vector Machine Based Sentiment Analysis Process for Twitter Streams
Country : India
Authors : Rekha Malik || Sugandha Hooda || Jyoti Bharadwaj

Abstract: Sentiment Research in twitter is quite tough due to its short length. Attendance of emoticons, slang words and misspellings in tweets compelled to have a preprocessing pace beforehand feature extraction. There are disparate feature extraction methods for accumulating relevant features from text that can be requested to tweets also. But the feature extraction is to be completed in two periods to remove relevant features. In the early period, twitter specific features are extracted.............

Keyword: Opinion Mining, Opinion Summarization, Sentiment Analysis, Support Vector machines

[1]. WojciechGryc, and KaroMoilanen. "Leveraging textual sentiment analysis with social network modelling." From Text to Political Positions: Text Analysis Across Disciplines 55 (2014): 47.

[2]. Hassan Saif ,Yulan He, Miriam Fernandez, and Harith Alani. "Semantic patterns for sentiment analysis of Twitter." In The Semantic Web–ISWC 2014, pp. 324-340. Springer International Publishing, 2014.

[3]. Li Dong, Furu Wei, Ming Zhou, and Ke Xu. "Adaptive multi-compositionality for recursive neural models with applications to sentiment analysis." InTwenty-Eighth AAAI Conference on Artificial Intelligence. 2014.

[4]. Grégoire, Mesnil, Tomas Mikolov, Marc'AurelioRanzato, and YoshuaBengio. "Ensemble of generative and discriminative techniques for sentiment analysis of movie reviews." arXiv preprint arXiv:1412.5335 (2014).

[5]. Robert,West, Hristo S. Paskov, Jure Leskovec, and Christopher Potts. "Exploiting social network structure for person-to-person sentiment analysis."arXiv preprint arXiv:1409.2450 (2014).


Paper Type : Research Paper
Title : Intent based Image Ranking for Web Search Reranking
Country : India
Authors : Kshitija H. Ghadge || Sunil M. Sangve

Abstract: New approach is presented for reranking of the images. While searching images on the web to increase the accuracy of the image search result Image search reranking is used. Image search reranking is an effective approach to refine the initial text-based image search result. In the reranking process,image visual contents are used to refine the initial text based result. The image re-ranking restricts users' attempt to just one-click feedback is a useful way to improve search results and its interaction is simple enough. One click event of the user is considered as user intention...........

Keyword: Image search reranking, feature extraction, hypersphere based relevance preserving projection(HRPP),H-rank, Support Vector Machine (SVM), K nearest neighbour (KNN)algorithm, Visual Content.

[1] ZhongJi, Yanwei Pang and Xuelong Li, "Relevance Preserving Projection and Ranking for Web Image Search Reranking," IEEE Trans on Image Processing 2015.
[2] M. Fritz and B. Schiele, "Decomposition, discovery and detection of visual categories using topic models," in Proc. CVPR, 2008.
[3] W. H. Hsu, L. S. Kennedy, and S.-F. Chang, "Video search reranking through random walk over document-level context graph," in Proc. ACM Multimedia, 2007.
[4] L.-J. Li and L. Fei-Fei, "OPTIMOL: Automatic online picture collec-Tion via incremental MOdel learning," Int. J. Comput. Vision, 2009.
[5] L. Yang and A. Hanjalic, "Supervised reranking for web image search," in Proc. ACM Multimedia, 2010.


Paper Type : Research Paper
Title : Modeling and Processing of Cloud Computing and It's Performance Measurement
Country : India
Authors : Mangesh K. Nichat || Dr. Prashant V. Ingole

Abstract: Cloud computing is the growing technology of large scale distributed computing. It provides on-demand access to distributed resources, which are available in open environment on paid basis. Because all most all the industries now a days want to use these services to reduce infrastructure and maintenance cost, therefore the load on cloud is increasing day by day. Balancing load is one of the biggest issue that cloud computing is facing today [1]...........

Keyword: Ant Colony optimization, Cloud Computing, Load balancing, , Round Robin Algorithm

[1]. Garima Rastogi, Dr Rama Sushil, "Analytical Literature Survey on Existing Load Balancing Schemes in Cloud Computing",
International Conference on Green Computing and Internet of Things (ICGCloT), 2015.
[2]. Reena Panwar, Prof. Dr. Bhawna Mallick, "Load Balancing in Cloud Computing using Dynamic Load Management Algorithm",
International Conference on Green Computing and Internet of Things (ICGCloT), 2015.
[3]. Gulshan Soni, Mala Kalra, "A Novel Approach for Load Balancing in Cloud Data Center", IEEE International Advance Computing
Conference (IACC), 2014.
[4]. Rajwinder Kaur and Pawan Luthra, "Load Balancing in Cloud Computing", Association of Computer Electronics and Electrical
Engineers, 2014.
[5]. Marco Dorigo, Thomas Stutzle, "Ant colony optimization.", Cambridge, Massachusetts London, England, The MIT Press, 2004.


Paper Type : Research Paper
Title : Big data
Country : Saudi Arabia
Authors : Abdulaziz Alshabani

Abstract: Big data refers to huge chunks of data that are very large and complex for it to be processed or analyzed by traditional methods. Initially, this enormous amounts of data brought about major challenges concerning analysis, curation, searching, dissemination, storing, visualizing, running queries and updating. It because of these challenges that big data was born and it answered effectively all these concerns. Big data analytics refers to using advanced data analysis methods that can extract valuable data from the huge chunks of information. Big data is often said to be accurate and has been used to make more informed decisions that have led to increased efficiency, low risk and reduction in costs.............

Keyword:Amazon big data, big data, big data analytics, EBay big data, healthcare

[1] Gunelius, Susan. "The Data Explosion In 2014 Minute By Minute – Infographic". ACI. N.p., 2014. Web. 2 July 2016.

[2] Manyika, James, et al. "Big data: The next frontier for innovation, competition, and productivity." (2011).

[3] Rijmenam, Mark. "How Amazon Is Leveraging Big Data". Datafloq.com. N.p., 2016. Web. 2 July 2016.

[4] Groves, Peter, et al. "The ‘big data’revolution in healthcare." McKinsey Quarterly 2 (2013).

[5] Chawla, Nitesh V., and Darcy A. Davis. "Bringing big data to personalized healthcare: a patient-centered framework." Journal of general internal medicine 28.3 (2013): 660-665.


Paper Type : Research Paper
Title : Ict As A Change Agent For Socialization And Social Engineering
Country : Nigeria.
Authors : Engr.Wali Samuel || Samuel Godwin Ajumo || Else Chindinma Anderson || Steve Worgu

Abstract: The future communication has been predicted to depend to a great degree on electronic modes; academics businessmen and professionals in various fields, purpose, various uses of ICT facilities and new media generally these and many decisions will be made based only on available data concerning these media. It is recorded that at least four million seven hundred and fourteen Nigerians are on face –book and other social media with a good number of them being young (face book statistics 2012). However, there is no comprehensive knowledge of these activities as well as how its form of media and its usage by Nigerian youths............

Keyword: ICT, Change, Socialization and Social Engineering.

[1]. Carsten, S. (2013) Digital innovation challenges, Struggling with Paradoxes of change and control: Department of IT Management, London School of Economics.
[2]. Fana, E. (2014) Social engineering or formal relocation in Ethiopians' low lands: A blog of African program at the Wilson Centre.

[3]. Izak, B. (2013) Improving customers technology. Department of IT Management University of Columbia.
[4]. Jonathan, W. (2012) Paradox in technology ecosystem Governance. Department of IT Management ESADE.
[5]. Jan, M.L (2012) Trust Engineering in ubiquitous compacting system. Department of IT Management Kassel University.


Paper Type : Research Paper
Title : Designing the low noise 2 GHz amplifier for the RF receivers
Country : Iran
Authors : Mahdi Soufi || Morteza Amini || Muhammad Ali Zomorodian || Ali Valehi || Muhammad Reza Kazemi Varnamkhasti

Abstract: This article studies the design of a low noise amplifier in the frequency of 2GHz. The circuit designed has the maximum gain suitable for the lowest noise value. The source and load matching circuit of this low noise amplifier is designed using microstrip lines. Considering the importance of stability in amplifiers design, firstly, the transistor stability factors are surveyed in this article. After that, the design of the source and load matching circuits will be studied. At the end, the method used for biasing the surveying piece would be analyzed.

Keyword: S parameter, stability, low noise amplifier, microstrip lines, noise figure

[1]. R. Ludwig and P. Bretchko, RF Circuit Design Theory and Applications. New Jersey, U.S.A: Prentice-Hall, Inc., 2000.
[2]. W. S. El-Deeb, A. M. Moselhy, and H. S. El-Hennawy, "The design of 2 GHz LNA for ISM RF Receivers," IEEE Design and Test
Workshop (IDT) International, pp. 1-4, 15-17 Nov. 2009.
[3]. J. C. Joseph, The Complete Handbook of Radio Receivers, First Edition ed. Riyadh: Tab Books Inc, 1980.
[4]. D. M. Pozar, Microwave and RF Design of Wireless System. New York, U.S.A: John Wiley & Sons, Inc, 2001.
[5]. G. Gonzalez, Microwave Transistor Amplifiers Analysis and Design. Englewood Cliffs, New Jersey, U.S.A: Prentice-Hall, Inc.,
1984.


Paper Type : Research Paper
Title : Energy using optimization in wireless sensor networks using the hybrid algorithm
Country : Iran
Authors : SeyedMarouf Hosseini Abbass Ali Rezaei

Abstract: Energy limitation is one the most important issues in wireless sensor networks design. Data integration and their multi-step and hierarchical transition is an effective method for reducing energy consumption as well as improving energy saving in wireless sensor networks. Network clustering algorithms are significantly more common than the other clustering algorithms due to their reliability and high flexibility. However, in this method, it is needed to appropriately determine the clusters' size and number.............

Keyword: Sensor networks, hybrid algorithm, genetic optimization, and cluster head

[1]. yue J, Zhang W, (2012), Energy Efficient and balanced cluster-based data aggregation algorithm for wireless sensor networks, procedia engineering.
[2]. Hong W.C, Dong, Y, Chen Y, (2012), SVR with hybrid chaotic genetic algorithm for tourism demand forecasting, Journal of applied Soft Computing, page1881-1890.
[3]. Jirong G, Mingcang J, (2010), Housing price forecasting based on genetic algorithm and support vector machine, Journal of Expert Systems.
[4]. Anker T, Bickson D, Dolev D, Hod B, (2008), Efficient clustering for improving network performance in wireless sensor networks, in: Proceedings of the 5th European Conference on Wireless Sensor Networks, March.
[5]. Huang S.C, (2008), Online option price forecasting by using unscented kalman filters and support vector machine, Jornal of Expert Systems.


Researcher can also search IOSR published article contents through

IOSR Xplore