IOSR Journal of Computer Engineering (IOSR-JCE)

Jul. - Aug. 2016 Volume 18 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Variance-Index Based Feature Selection Algorithm for Network Intrusion Detection
Country : India
Authors : B. Basaveswara Rao || K.Swathi

Abstract: This paper presents a feature selection methodology in the domain of Network Intrusion Detection System (NIDS). An Unsupervised Variance Indexed Feature Selection Algorithm (VIFS) is proposed and demonstrated by considering a benchmark dataset, NSL KDD. A Fast KNN classification algorithm Indexed Partial Distance Search k Nearest Neighbor(IKPDS) is applied for finding the classification accuracy. The algorithm selects a subset of features based on fitness threshold value with tolerable loss in classification accuracy but gain in computational time. In a trade of NIDS classification accuracy and computational time are two factors to decide the performance of NIDS...............

Keyword: Feature Selection, Intrusion Detection, NSL-KDD data set.

[1]. B. BasaveswaraRao, K. Swathi, Fast kNN Classifiers for Network Intrusion Detection System, 2015, working paper
[2]. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun, Improved Partial Distance Search for K Nearest-neighbor Classification, 2004 IEEE.
[3]. S. Chebrolu, A. Abraham, and J.P. Thomas, "Feature Deduction and Ensemble Design of Intrusion Detection Systems." International Journal of Computers and Security, Vol 24, Issue 4,(June 2005), 295-307.
[4]. C. H. Tsang and S. Kwong.Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction.In IEEE International Conference on Industrial Technology (ICIT '05), pages 51– 56. IEEE Press, 14-17 Dec. 2005.

Paper Type : Research Paper
Title : An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure
Country : India
Authors : Manisha Padole || Prof. Sonali Bodkhe

Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional partitioning methods which are found unreliable to handle uncertain data as uncertain objects are geometrically indistinguishable. Data uncertainty can be occurred in various data collecting systems like sensors, weather information collecting systems, etc.... Clustering gained much interest in clustering of uncertain data because the clustering algorithms works on the certain data so there is a need to do work on the algorithms to be as useful for uncertain data..............

Keyword:Clustering, FCM, KL-Divergence, Skew Divergence, Uncertain Data

[1] Samir N. Ajani, Prof. Mangesh Wanjari, "Clustering of Uncertain Data Objects using Improved K-means Algorithm", Volume 3, Issue 5, May 2013, ISSN: 2277 128X.
[2] S.D. Lee Ben Kao, Department of Computer Science, The University of Hong Kong, Reynold Cheng, Department of Computing, Hong Kong Polytechnic University, "Reducing UK-means to K-means".
[3] Priyadarshini J., Akila Devi.S, Askerunisa.A, "Kullback-Leibler Divergence Measurement for Clustering Based On Probability Distribution Similarity", International Journal of Innovative Research in Science, Engineering and Technology, volume 3, Special Issue 3, March 2014.
[4] Geetha and Mary Shyla, "An Efficient Divergence and Distribution Based Similarity Measure for Clustering Of Uncertain Data", International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064.
[5] Aliya Edathadathil, Syed Farook, Balachandran KP, "A Modified K-Medoid Method to Cluster Uncertain Data Based on Probability Distribution Similarity", International Journal Of Engineering And Computer Science Issn:2319-7242, Volume 3, Issue 7, July 2014, Page No. 6871-6875.

Paper Type : Research Paper
Title : A Survey and Research Proposal of Plant Leaf Disease Diagnosis and Classification on Mobile Devices
Country : India
Authors : T.Nagarathinam || Dr. K. Rameshkumar

Abstract: A plant disease is defined as anything that prevents a plant from performing to its maximal potential. A plant disease has impacted society and world olden times. Plant diseases have caused enormous economic losses in each one the countries. Diagnosis of diseases in plant is the fortitude of the grounds of a disease in plant, and detection refers to the identification of microorganisms. Failures in disease diagnosis show the way openly too little disease control and restrain in crop production and quality, and as a result trade. In this survey we bring into play some effectual papers to obtain detailed investigation and propose our research work of plant disease detection and classification on mobile devices.

Keyword: Brown spot, Classification, Cluster analysis, Disease, Leaf Blight,

[1]. Amy D. Timmerman and Kevin Korus - "Introduction to Plant diseases", the board of Regents of the University of Nebraska.
[2]. Tasneem Tazeen Rashid Thuza Md. Sazzad Hossain – "Mobile Application for Determining Input Level Of Fertilizer And Detecting Diseases In Crops" – Thesis.
[3]. B. Klatt , B. Kleinhenz, C. Kuhn, C. Bauckhage, M. Neumann, K. Kersting, E.-C. Oerke, L. Hallau, A.-K. Mahlein, U. Steiner-Stenzel, M. Röhrig-"SmartDDS-Plant Disease Detection via Smartphone", EFITA-WCCA-CIGR Conference "Sustainable Agriculture through ICT Innovation", Turin, Italy, 24-27 June 2013.
[4]. Shovon Paulinus Rozario- " Krishokbondhu - An automated system for diagnosis of paddy disease, Thesis, SCHOOL OF ENGINEERING AND COMPUTER SCIENCE, Department of Computer Science and Engineering, BRAC University, Submitted on September 1, 2014
[5]. Shitala Prasad, Sateesh K. Peddoju and Debashis Ghosh – " AgroMobile: A Cloud-Based Framework for Agriculturists on Mobile Platform", International Journal of Advanced Science and Technology Vol.59, (2013), pp.41-52 /10.14257/ijast.2013.59.04 ISSN: 2005-4238 IJAST Copyright ⓒ 2013 SERSC.

Paper Type : Research Paper
Title : A Critical Appraisal of e-Governance Service with special reference to Rajasthan Land Records
Country : India
Authors : K L Jawaria || Vijay Singh Rathore || K S Sharma

Abstract: Over the years, with influx of e-Governance movement in India, numerous ingenious initiatives have been conceptualized to strengthen ICT services in the country and to channelize the changes enabling technology to the last level. However, the gaps were always present and there is a dire need to have a case study on overall approach to identify and analyze the root-causes, and recommend steps for delivering seamless e-governance services in all parts of the country.........

Keyword: ICT, E-Governance, GIGW, NLRMP, CLR, RoR, CSC.

[1]. Gupta, Vivek (2003) "e-Government: The New Revolution", The ICFAI University Press, Hyderabad, India
[2]. Kaur, J. and Rathor, V. S. (2012) " Importance of ICT and E-Governance Security in Punjab", Global Jouranl of Computer Science and Technology, Vol. 12, issue 2
[3]. Malik, P., Priyanka, D., &Verma, P. ( 2014). "Challenges and Future Prospects for E-Governace in India", International Journal of Science, Engineering and Technology Research, volume 3, issue 7 , 1964-1972
[4]. Mittal, P. and Kaur, A. (2013), "E-Governance: A Challenge for India", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), March 2013, 2 (3): 1196-1199.

[5]. Kalsi, N.S., Kiran, R., & Vaidya, S.C.,(2009), " Effective e-Governance for Good Governance in India", International Review of Business Research Papers, 5(1), pp. 212-229.

Paper Type : Research Paper
Title : An electronic algorithm to find the optimal solution for the travelling salesman problem
Country : France
Authors : M.Sghiar

Abstract: I give here an electronic algorithm of the order 𝑂 𝑛3 which is a generalization of the atomic algorithm found in [6] and allows us to find the optimal hamiltonian cycles. If the atomic algorithm (see [6] and [5] ) was inspired by the movement of the particles in the atom, the electronic algorithm is inspired by the resistor in the electrical circuit.

Keyword: Graph, Hamilton cycles, P=NP, the travelling salesman problem, TSP.

[1]. Lizhi Du. A polynomial time algorithm for hamilton cycle. IMECS, I:17–19, March 2010. Hong Kong.
[2]. L.Lovasz. Combinatorial problems and exercises. Noth-Holland, Amsterdam, 1979.
[3]. D.S.Johnson M.R.Garey. Computers and intractability:a guid to the theory of np-completeness. Freeman,San Francisco, 1979.
[4]. R.Diestel. Graph theory. Springer, New York, 2000.
[5]. M. Sghiar. Algorithmes quantiques, cycles hamiltoniens et la k-coloration des graphes. Pioneer Journal of Mathematics and Mathematical Sciences, 17-Issue 1:51–69, May 2016.

Paper Type : Research Paper
Title : Structural Analysis of RF Architecture using Crossbar Type Topology for Cryptographic Application
Country : India
Authors : Manisha Khorgade || Pravin Dakhole

Abstract: The strongly emerging class, Coarse-Grained Re-configurable Architecture (CGRA) is currently receiving attention and also having excellent performance with flexibility in fabrication. An entire range of components are now being offered as choices for system building blocks. The Reconfigurable fabric (RF) will be offered as an important building block for complex system design, CGRA processor. This paper gives an innovative design of reconfigurable fabric (RF) to achieve parallel processing techniques....

Keyword: CGRA, Processing Element, Reconfigurable Fabric, crossbar type Modelling, FPGA, crypto graphical application

[1]. "High-level Modelling and Exploration of Coarse-grained Re-configurable Architectures ", Amupam Chattopadhyay, Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008,
[2]. Hyunchul Park, Kevin Fan ,"Modulo Graph Embedding: Mapping Applications onto CoarseGrained Reconfigurable Architectures", Proceedings of the 2006 -
[3]. "Low Power Reconfiguration Technique for Coarse-Grained Reconfigurable Architecture", Yoonjin Kim, , Rabi N. Mahapatra, Ilhyun Park, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 17, NO. 5, MAY 2009
[4]. "Design Space Exploration for Efficient Resource Utilization in Coarse-Grained Reconfigurable Architecture", Yoonjin Kim, , Rabi N. Mahapatra, Ilhyun Park, IEEE, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 18, NO. 10, OCTOBER 2010
[5]. "A Design Flow for Architecture Exploration and Implementation of Partially Reconfigurable Processors" Kingshuk Karuri, Anupam Chattopadhyay, Xiaolin Chen, David Kammler, Ling Hao, Rainer Leupers, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 16, NO. 10, OCTOBER 2008

Paper Type : Research Paper
Title : Auto Mutating Cryptosystem- An approach towards better security
Country : India
Authors : Harsha S || N Bhaskar || M N Sheshaprakash || G Raghavendra Rao

Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to suit a host of requirements and environments. However the idea of AI with a cryptosystem is relatively novel and is less explored. This paper discusses the implementation and analysis of multiple cryptosystems with an AI engine to provide better security for information. Here the attempt is made to combine number of cryptosystems with an AI engine to understand a situation where a hacker is trying to cryptanalyse data and prevent it from happening....

Keyword: Artificial Intelligence, Data Security, Mutating Algorithms, Learning Systems

[1]. Holland, John H. (1975). Adaptation in Natural and Artificial Systems. University of Michigan Press. ISBN 0-262-58111-6
[2]. Haugeland, John (1985). Artificial Intelligence: The Very Idea. Cambridge, Mass.: MIT Press. ISBN 0-262-08153-9
[3]. Kahneman, Daniel; Slovic, D.; Tversky, Amos (1982). Judgment under uncertainty: Heuristics and biases. New York: Cambridge University Press. ISBN 0-521-28414-7.
[4]. Asada, M.; Hosoda, K.; Kuniyoshi, Y.; Ishiguro, H.; Inui, T.; Yoshikawa, Y.; Ogino, M.; Yoshida, C. (2009). "Cognitive developmental robotics: a survey". IEEE Transactions on Autonomous Mental Development 1 (1): 12–34
[5]. Andrew S Tenenbaum, (2006) "Computer Communication Networks", McGraw Hill, Revised 4th edition

Paper Type : Research Paper
Title : A Brief Survey on Privacy Preserving Techniques in Data Mining
Country : India
Authors : Vinoth kumar J || Santhi V

Abstract: Data mining is a process of extracting the required information from large datasets. Privacy preserving data mining deals with hiding a person's sensitive identity without losing the usability of data. Sensitive identities include some private information about persons, companies, and governments that have to be suppressed before it is shared or published. Thus, privacy preserving data mining has become a vital field of research. The capability of privacy preserving data mining techniques is measured by using metrics such as performance in terms of time efficiency, data utility and level of uncertainty or resistance to data mining algorithms. In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented......

Keyword: Anonymization, Cryptography, Perturbation, Privacy Preserving, Privacy Preserving Data Mining.

[1]. Han J, Kamber M. Data Mining: Concepts and Techniques. 2nd edn. Morgan Kaufmann Publishers, 2006.
[2]. Benjamin CM, Fung, Wang K, Chen, Philip Yu S. Privacy-Preserving Data Publishing: A Survey of Recent Developments. ACM Computing Surveys. 2010, June; 42(4), 523-553.
[3]. Majid BM, Asger GM, Rashid Ali. Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects. Proceedings of 3rd ICCCT, India, 2012, 26-32.
[4]. Kamakshi P, Vinaya BA. Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic on Perturbed data. Journal of Computing. 2010, April; 2(4), 115-119.

[5]. Benny P. Cryptographic Techniques for Privacy-preserving data mining. ACM SIGKDD Explorations. 2008, December; 4(2), 12-19.

Paper Type : Research Paper
Title : Hand Gesture Recognition System for Creating & Controlling Media Player using Mat Lab Tool
Country : India
Authors : Prof. Suganthi S || Prof. Reddappa B C

Abstract: In this paper we have discussed a dynamic hand gesture recognition system for creating and controlling the media player. The system is made possible by using the concepts of threshold and color detection. The media player is created by ActiveX Control. Being independent of restricted background and noise, this system doesn't use a database for performing an operation. This obviously reduces the space and time complexity, resulting in an efficient system which is capable of accepting dynamic gestures to control the media player.....

Keyword: Gesture Recognition; Human Computer Interface; Media Player; ActiveX Control; Threshold

[1]. Manuj Paliwal, Gaurav Sharma, Dina Nath, Astitwa Rathore, Himanshu Mishra, Soumik Mondal, A Dynamic Hand Gesture Recognition System for Controlling VLC Media Player, IEEE Conference, January 2013.
[2]. Ginu Thomas, A Review of Various Hand Gesture Recognition Techniques, VSRD International Journal of Electrical, Electronics and Communication Engineering, Vol.1 (7), 2011, 374-383.
[3]. Rajesh Mapari, Dr. Govind Kharat, Hand Gesture Recognition using Neural Network, International Journal of Computer Science and Network (IJCSN) , Volume 1, Issue 6, December 2012.
[4]. Noor Adnan Ibraheem, RafiqulZaman Khan, Survey on Various Gesture Recognition Technologies and Techniques, International Journal of Computer Applications, (0975-8887), Volume 50-No.7, July 2012.
[5]. Ashis Pradhan, M.K Ghose, Mohan Pradhan, Hand Gesture Recognition using Feature Extraction, International Journal of Current Engineering and Technology,Vol.2 No. 4, December 2012.

Paper Type : Research Paper
Title : A Review of Information Security Preparedness Evaluation Mechanisms in Law Enforcement Agencies
Country : Kenya
Authors : Samuel W. Ndichu || Prof. Patrick J. Ogao

Abstract: Law enforcement agencies being the primary security organs in a country are highly prone to information and network attacks due to the sensitivity nature of the information they deal with in their day to day operations. Information security preparedness requires a consideration of both technical and nontechnical solutions to information security. This paper presents a review of information security preparedness evaluation frameworks, approaches, methods and models available today which the law enforcement agencies and other organizations can use to quickly and reliably evaluate the current security state of their information and or network. The paper also highlights the weakness in each of these mechanisms and points towards a more comprehensive framework for information security preparedness evaluation in law enforcement agencies.

Keyword: Information security, preparedness, framework

[1] Colin Armstrong 2003, Developing a framework for evaluating computer forensic tools, Presented at Evaluation in Crime Trends and justice: Trends and Methods Conference in Conjunction with the Australian Bureau of Statistics, Canberra Australia 24-25
[2] The National Police Service Bill 2011, Kenya
[3] Salahuddin Alfawaz, Lauren May and Kavoos Mohanak 2008, E-government Security in Developing Countries: A Managerial Conceptual Framework. In: International Research Society for Public Management Conference, 26-28, Queensland University of Technology, Brisbane
[4] Christian J. Eibl, Basie S.H. von Solms and Sigrid Schubert 2006, A Framework for Evaluating the Information Security of E-Learning Systems, IDEA Publications
[5] Voydock and Kent 1983, Security Mechanisms in High-Level Network Protocols, ACM Computing Surveys, Vol. 15, No. 2, pp. 135-171

Paper Type : Research Paper
Title : A Systematic Review of Software Security Issues Associated With Agile Software Development
Country : India
Authors : Prof. Manisha Tijare || Prof. Suman Tanwar || Prof. Seema Patil

Abstract: TMain aim of this research is to review various software security issues associated with agile software development. Software security issues which are considered are types of design and code changes, lack of documentation, schedule delay and change of requirements through prior literature review. All software security issues associated with agile software development cannot be solved completely but can safeguard and avoid to certain extent. It can be stated that documentation issue can be rectified through giving more attention by highly experienced professional. It can be suggested that scheduled delay and change of requirements can be rectified through proper planning and implementation of the project........

Keyword: Agile software development, change of requirements, code changes, lack of documentation, schedule delay, software security issues, and types of design

[1]. Anderson, P., "Measuring the Value of Static-Analysis Tool Deployments", Security & Privacy, Vol. 10, No. 3, pp. 40-47, 2012.
[2]. Baca, D., Carlsson, B., Petersen, K., and Lundberg, L., "Improving Software Security with Static Automated Code Analysis in an Industry Setting", Software: Practice and Experience, Vol. 43, Issue 3, pp. 259- 279, 2013.
[3]. Baca, D., and Carlsson, B., "Agile Development with Security Engineering Activities", Proc. of Int. Conf. on Software and Systems Process, 2011.
[4]. Rubin E and Rubin H (2010), Supporting Agile Software Development through Active Documentation, Requirements Eng.
[5]. Sharma S, Sarkar D and Gupta D (2012), Agile Processes and Methodologies: A Conceptual Study, International Journal on Computer Science and Engineering, 4 (5).

Paper Type : Research Paper
Title : Microcontroller-Based Remote Temperature Monitoring System
Country : Osun State
Authors : Onawola Hazzan Jimmoh || Sobowale Adedayo || Obaje Samuel Enemakwu || Iromini Nurudeen Ajibola

Abstract: There is increase in death rate in hospitals due to inadequate attention to the patients, insufficient number of doctors as well as poor state of equipment make it difficult for the patients to receive proper and good medical treatment. This paper presents an efficient monitoring system, using microcontroller, which will monitor patient temperature remotely and send result to phones through Short Message Service (SMS) and Personal Computer (PC).The controller circuit was designed and interfaced to a sensor and thermistor and also interfaced inside with configured Single Inline Module (SIM) cards of phones to be connected.......

Keyword: Single Inline Module (SIM) ,Short Message Service (SMS), Temperature, Remote Patient Monitoring, Internet, Personal Computer (PC), Thermistor, Server/Clients.

[1]. Alheraish, A. (October, 2004): "Embedded based remote monitoring of temperature", department of Mechanical and Industrial Engineering, University of Massachusetts.
[2]. Atallah L, Zhang J, Lo BPL, Shrikrishna D, Kelly JL, Jackson A, Polkey MI, Yang G- Z, Hopkinson NS (2010 ): "Validation of an ear worn sensor for activity monitoring in COPD",Am J Respir Crit Care Med 181,A1211.
[3]. Belza B, Steele BG, Hunziker J, Lakshminaryan S, Holt L, Buchner DM (2001): "Correlates of physical activity in chronic obstructive pulmonary disease", Nurs Res, Vol. 50, Pp. 195-202.
[4]. Dalton A, Patel S, Roy AC, Welsh M, Pang T, Schachter S, Olaighin G, Bonato P (2010) : "Detecting epileptic seizures using wearable sensor technologies", Book of Detecting epileptic seizures using wearable sensor technologies , Pp. 73-74
[5]. Furlanetto KC, Bisca GW, Oldemberg N, Sant'anna TJ, Morakami FK, Camillo CA, Cavalheri V, Hernandes NA, Probst VS, Ramos EM (2010): "Step counting and energy expenditure estimation in patients with chronic obstructive pulmonary disease and healthy elderly": accuracy of 2 motion sensors, Arch Phys Med Rehabil, Vol. 91,Pp. 261-267.

Paper Type : Research Paper
Title : Comparing the performance of various filters on stoned kidney images
Country : Bangladessh
Authors : Pronab Kumar Mondal || Mst. Maklina Khatun || Umme Hadia Akter

Abstract: Noise removing is the most important task for biomedical image analysis. Noise is always presents in ultrasound digital images during image acquisition. Filtering is a tool for noise removing. In this paper we compare the performance of four filters- Median Filter, Averaging/Mean Filter, Gaussian Filter, Wiener filter. This paper presents which filter is best for removing noise like Gaussian, Salt & Pepper, Poisson, and Speckle noise from stoned kidney image. Which filter is best, is measured by calculating the MSE and PSNR of filtered image.

Keyword: Median Filter, Averaging/Mean Filter, Gaussian Filter, Wiener filter, Gaussian noise, Speckle noise, Ultrasound Image

[1]. Rafael C. Gonzalez and Richard E. Woods, "Digital Image Processing", Pearson Education, Second Edition, 2005.
[2]. Priyanka Rastogi and Neelesh Gupta " Review of Noise Removal Techniques for Fixed Valued Impulse Noise" , International Journal of Computer Applications (0975 – 8887) Volume 123 – No.5, August 2015
[3]. P.S. Hiremath, Prema T. Akkasaligar and Sharan Badiger, "Speckle Noise Reduction in Medical Ultrasound Images".
[4]. Pitas I, Venetsanopoulos A," Nonlinear mean filters in image processing", IEEE Transactions on Acoustics, Speech and Signal Processing, Volume:34 , Issue: 3 , 573 – 584, Jun 1986.
[5]. Sarita D, "De-noising Techniques - A Comparison", B.E., Andhra University College of Engineering, Visakhapatnam, India, 2000.

Paper Type : Research Paper
Title : FEQRP: a Fuzzy based Energy-efficient and QoS Routing Protocol over WSNs
Country : Egypt
Authors : Ahmed Hamood M. Al-Quh || Prof. Imane Aly Saroit Ismail || Dr. Amira Mohammed Kotb

Abstract: In this paper, an energy efficient and QoS routing protocol; named Fuzzy based Energy-efficient and QoS Routing protocol (FEQRP) for wireless sensor networks; is proposed to extend the life time of the network. Most of the existing protocols don't take care about energy balancing. The energy manager protocols balance the energy consumption in the network to avoid network partitioning. The proposed protocol tries to find the best route with smallest distance between source and destination, reduce the energy consumption and balance it by fuzzy set approach. In FEQRP, both the node position and the energy level are used to route the packets from sources to destination. Each node knows the location and energy level of its neighbors........

Keyword: QoS, Routing protocol, Wireless Sensor Networks, Energy consumption

[1] Kazi C. R., A Survey on Sensor Network, Journal of Convergence Information Technology (JCIT) Journal, vol. 1, no. 1, 2010.
[2] M. Castillo-Effen, D.H. Quintela, R. Jordan, W. Westhoff, and W. Moreno, Wireless sensor networks for flash-flood alerting, Proceedings of the fifth IEEE International Caracas Conference on Devices, Circuits, and systems, Dominican Republic, 2004.
[3] G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, G. Pap, J. Sallai, and K. Frampton, Sensor network-based counter sniper system, Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD, 2004.
[4] E. Ahvar, A. Pourmoslemi, M. Piran, FEAR: a Fuzzy-based Energy-Aware Routing Protocol for Wireless Sensor Networks, International Journal of Grid Computing & Applications (IJGCA). vol.2, no.2, June 2011.
[5] L.A.Zadeh, Fuzzy sets, Inform. Control 8, pp. 338–353, 1965

Paper Type : Research Paper
Title : Effect of Prioritization on Regression Testing
Country : India
Authors : Aman Hooda || Dr Anil Kumar

Abstract: Software systems are developed to serve particular requirements of both a business and a technical nature. Faults make software systems to fail, causes user and stakeholders aggravation and cost business organization business money. Regression testing is used to validate new features added as well as regression faults which occur during software development life cycle as well as during maintenance. To test everything is not possible, the time required and resource commitment makes it impractical. Regression testing comprises of various techniques, each having its own merits and demerits. In this paper we are concerned with finding how the prioritization technique help in revealing the defects earlier in the test execution phase.......

Keyword: Prioritization, regression testing, software maintenance, test cases.

[1]. Sommerville Ian, "Software Engineering," 6th Ed., Pearson Education, 2004 [2]. Roger S Pressman, "Software Engineering," 5th Ed, McGraw Hill, 2001.
[3]. P. Jalote ,"An Integrated Approach to Software Engineering," 2nd Ed., Narosa publication, 2002.
[4]. R. Mall, "Fundamentals of Software Engineering," 3rd Ed., PHI Learning Private Ltd., 2009.
[5]. Pezze, M., Young, M. "Software Testing and Analysis: Process, Principles and Techniques, Wiley, New York,(2007.

Paper Type : Research Paper
Title : An Efficient Test Data Generation Approach for Unit Testing
Country : India
Authors : Anil Kumar Gupta || Fayaz Ahmad Khan

Abstract: To ensure the delivery of high-quality software, software testing plays the vital role. One of the major time-consuming and expensive activities in software testing is the generation of test data. Test data generation activity has a strong impact on the effectiveness and efficiency of the whole testing process. In order to reduce the cost and time involved in the process of test data generation, researchers and practitioners have tried to automate it. In literature, many such techniques have been developed and the most commonly used ones are; Random testing, Symbolic execution and evolutionary testing.......

Keyword: Software Testing, Test Data Generation, Random Testing, Symbolic Execution, and Genetic Algorithm

[1]. Bertolino, A., 2007. Software testing research: achievements, challenges, dreams. In: Proceedings of the 1st Workshop on Future of Software Engineering (FOSE'07) at ICSE 2007, pp. 85–103.

[2]. Pezzè, M., Young, M., Software Testing and Analysis, Process, Principles and, Techniques. Wiley. 2007.

[3]. Zhu, H., Hall, P.A.V., May, J.H.R., 1997. Software unit test coverage and adequacy. ACM Computing Surveys 29 (4), 366–427. [4]. B. Korel, 1990. Automated software test data generation, IEEE Transactions on Software Engineering, vol. 16,

[5]. Korel, B. 1992. Dynamic method for software test data and generation, J. of Software Testing, Verification, and Reliability 2: 203–213.

Paper Type : Research Paper
Title : An overview of content-based image retrieval techniques (CBIR)
Country : Iran
Authors : Narjes Fathi || Behrouz Vaseghi || masoud Shemshadi

Abstract: In the current situation, the image plays a vital role in any aspect of life such as commercial images, satellite images, and medical images and so on. By analyzing this data, useful information can be obtaining for future uses. Image retrieval methods are divided into two general categories: 1. text-based image retrieval. 2 - content-based image retrieval (CBIR). The overall system performance in content-based image retrieval is: 1. Features extraction 2. Measuring the similarity.

Keyword: Content-based image retrieval (CBIR, Feature extraction, Image analysis techniques.

[1]. A.Kannan, V. Mohan, and N. Anbazhagan, An Effective Method of Image Retrieval using Image Mining Techniques. arXiv preprint arXiv:1012.0223, 2010.
[2]. S.Hayaty, S. Saryazdi, H.Nezam Abadi and A.Shamsy, new approach to indexing images based on image analysis.
[3]. D.K.Park, Y.S.Jeon and C.S.Won, "Efficient use of local edge histogram descriptor", ACM workshops, 1-58113-311-1, 2000.
[4]. W.Y. Ma, B.Manjunath, "Netra:a toolbox for navigation large image databases,", Proceedings of the IEEE International Conference on Image Processing, 1997, pp. 568-571.
[5]. J.Z Wang,J.Li,D. Chan,G. Wiederhold,"Semanticssensitive retrieval for digital picture libraries," Digital Library Magazine, Vol. 5(11), 1999

Paper Type : Research Paper
Title : Internet of Things: An Overview
Country : India
Authors : Sheetal S. Joshi || Ketki R. Kulkarni

Abstract: The growth of smart applications is reaching a whole new level. This allows shopping, banking and numerous everyday activities resulting in a comfortable life. The credit goes to the IoT (Internet of Things). It comprises capabilities of detecting and connecting numerous physical objects into an integrated system. This paper outlines the concept of Internet of Things and the technologies involved in it. The later section provides in brief the applications of Internet of Things in different domains along with risks associated in it.

Keyword: Internet of Things , RFID, WSN, Bluetooth and Wi-Fi ,network, risk, security

[1]. S. DuBravac, C. Ratti ,The Internet of Things: Evolution or Revolution?, Part1 series 1, Consumer Technology Association
[2]. Y. Huang and G. Li, A Semantic Analysis for Internet of Things, IEEE International Conference on Intelligent Computation Technology and Automation,2010,pp. 336-339
[3]. L. Coetzee and J. Eksteen, The Internet of Things – Promise for the Future? An Introduction, IST-Africa, Conference. Proceeding, IIMC International Information Management Corporation, 2011, pp.1-9
[4]. Lu Tan and Neng Wang, Future Internet: The Internet of Things, IEEE 3rd International Conferenc. on Advanced Computer Theory and Engineering(ICACTE),,2010, vol.5, pp. 376-380
[5]. M H Asghar, N Mohammadzadeh and A Negi, Principle Application and Vision in Internet of Things (IoT), IEEE Internationa. Conference on Computing, Communication and Automation (ICCCA), 2015,pp. 427-431

Paper Type : Research Paper
Title : Blueprint on Comparison of WSN Protocols
Country : India
Authors : Prof. Mayuri Bapat

Abstract: A sensor network is a group of specialized devices that converts energy of one form into another that also designed to monitor and record condition at places of different areas. Commonly monitored parameters are humidity, temperature, air pressure, wind speed and direction, sunlight, volume intensity, vibration intensity, illumination intensity, pollution levels and Human Emotions etc. This paper provides the general idea of WSN, Unique features of WSN, WSN Node Architecture and Routing protocols of Sensor Network.

Keyword: Wireless Sensor Network, Topology , MANET, Routing Protocols

[1]. Wireless Sensor Networks by C. S. Raghavendra, Krishna M. Sivalingam and Taieb Znati
[2]. Communication Protocols for Sensor Networks by Weilian Su, Ozgur Baris Akan, and Erdal Cayirci
[3]. Energy Efficient hardware design by Vijay Raghunathan, Curt Schurgers, Sung Park and Mani Srivastava
[4]. "Insights to Sensor Technology and it's Applications" by Prof. Mayuri Bapat
[5]. "Wireless Sensor Networks- A Review on Topologies and Node Architecture" by Shamneesh Sharma, Dinesh Kumar and Keshav Kishore

Paper Type : Research Paper
Title : Data Security using Cryptography and Steganography
Country : India
Authors : Ms. Arati Appaso Pujari || Mrs. Sunita Sunil Shinde

Abstract: As use of computer networks and internet is growing very fast and admiring day by day, information security is become a major concern in computer networks. There is always risk in violation of network security which leads a need of an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it. Encryption is one of the security technique widely used to ensure secrecy. Encryption is an entirely mathematical process that takes in data, performs some predefined mathematical operations on the data, and then outputs the result.......

Keyword: Blowfish, Cryptography, Decryption, Encryption, Security, Steganography.

[1]. Russell K. Meyers and Ahmed H. Desoky, "An Implementation of the Blowfish Cryptosystem", IEEE conference 2008
[2]. Ajit Singh and Swati Malik, "Securing Data by Using Cryptography with Steganography", International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013
[3]. SumedhaKaushik and AnkurSinghal, "Network Security Using Cryptographic Techniques", International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 12, December 2012
[4]. Dr. A. Suruliandi and A. Ramesh, "Performance Analysis of Encryption Algorithms for Information Security", International Conference on Circuits, Power and Computing Technologies 2013
[5]. PratapChnadraMandal, "Superiority of Blowfish Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012

Paper Type : Research Paper
Title : Sox Compliance: Eleven Essential Controls for Sme
Country : India
Authors : Utkarshni Sharma

Abstract: Sarbanes-Oxley (SOX) act, was enacted in 2002, in the wake of large accounting scandals ENRON and WORLDCOM .Especially for SMEs (small to mid-sized enterprises) that can benefit from implementing the control objectives, for governance, compliance and improved security. SOX compliance did not gave detailed requirements for IT compliance, therefore many auditors adopted COBIT and COBIT guidelines to comply with SOX. This research discusses the latest sox developments in the SME, key findings from ISACA study and COBIT control objectives to satisfy internal IT controls .This compliance escalates and maps out internal it controls that protect information assets.

Keyword: SOX, COBIT, ISACA, IT controls.

[1]. Sarbanes Oxley requirement:
[2]. IT Control Objectives for Sarbanes-Oxley Using COBIT 5, 3rd Edition.
[3]. The costs and benefits of Sarbanes Oxley act:
[4]. Corporate Ethics and › Corporate Counsel › Law Library
[5]. COBIT 5: A Business Framework for the Governance:

Paper Type : Research Paper
Title : An Indepth Understanding of e-Governance initiatives: e-Procurement- A Great Success in Odisha
Country : India
Authors : Shaikh Imtiyaj || Er. Govinda Chandra Mangual

Abstract: Odisha is the first position among smart cities. The capital of Odisha, Bhubaneswar is the Number.1 smart city in the country. e-Governance aims to provide good governance to the public by using the Information and Communication Technology (ICT) for speedy, accurate, transparent and secured services. Information and Communication Technology is being increasingly used in daily life of a common man and it has become the nucleus part of providing the better governance services to the citizens of a country. Now a days, departments, business sectors and customers alike collect, store and transmit vast amount of information electronically and they want to believe that this information is secure

[1]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , "An Indepth Understanding of e-Procurement: A Case Study Approach",
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. V (Nov –
Dec. 2015), PP 20-24
[2]. Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , "Digital Signature Certificate: A blessing for e-Governance Application in
Human Development", International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp
350-355,January 2015
[3]. William S.," Cryptography and Network Security, Principles and Practice", Prentice Hall of India, 2005.
[4]. Dhiren R. Patel ,"Information Security Theory and Practice" , 2008 Edition
[5]. Atul Kahate, "Cryptography and Network Security", Second Edition

Paper Type : Research Paper
Title : Auto Secured Text Monitor in Natural Scene Images
Country : India
Authors : Sowmya H N || Swetha Dareshwar || Sowmya K || Vijayalakshmi S Katti || Sushitha S || N.Samanvita

Abstract: Monitoring the text in content based images is an important task. An accurate and robust method to monitor texts in natural scene images. In this paper fast and effective decision tree algorithm (MSERs) is used to extract a character participant by reducing regularized character dissimilarities. Character participant are grouped into text participant by using single-link clustering algorithm. Text participant with high non-text probabilities are removed and texts are establish with a text classifier. Valuable information may be broken in many content-based images, such as web images. We need to detect text before recognizing and retrieving

Keyword: Single-link clustering Algorithm, binarization, Maximally Stable Extremal Regions (MSERs) algorithm

[1]. C.C.AggarwalandP.S.Yu,(2012)" On text clustering with side information," in Proc.ICDE Conf, Washington, DC, USA,
[2]. J. Chang and D. Blei, "Relational topic models for document networks," in Proc. AISTASIS, Clearwater, FL, USA, 2009, pp. 81–88.
[3]. P. Domingos and M. J. Mazzini, "On the optimality of the simple Bayesian classifier under zero-one loss,"Mach. Learn., vol. 29, no. 2–3, 1999 pp. 103–130.
[4]. A. Banerjee and S. Basu, "Topic models over text streams: A study of batch and online unsupervised learning," inProc. SDM Conf., 2009, pp. 437–442.
[5]. D. Cutting, D. Karger, J. Pedersen, and J. Tukey, "Scatter/Gather: A cluster-based approach to browsing large document collections," in Proc. ACM SIGIR Conf., New
[6]. York, NY, USA, 1992, pp. 318–329.

Paper Type : Research Paper
Title : A Survey Report on Distributed System Using Load Balancing Approach
Country : India
Authors : Arju Malik || PankajPratap Singh

Abstract: A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each processor and minimizing the execution time of the program. In practice, it would be possible even to execute the applications on any machine of worldwide distributed system. This results in a significant performance improvement for the users........

Keyword: Load balancing, Distributed system, Internet, Server, QoS.

[1]. Md. Firoj Ali and RafiqulZaman Khan. "The Study On Load Balancing Strategies In Distributed Computing System". International SJournalOf Computer Science & Engineering Survey (IJCSES) Vol.3, No.2, April 2012
[2]. Ahmad I., Ghafoor A. and Mehrotra K. "Performance Prediction of Distributed Load Balancing On Multicomputer Systems". ACM, 830-839, 1991.
[3]. Antonis K., Garofalakis J., Mourtos I. and spirakis P. "A Hierarchical Adaptive Distributed Algorithm for Load Balancing". Journal of Parallel and Distributed Computing, Elsevier Inc. 2003.
[4]. Kokilavani .K . "Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds". International Journal of Engineering and Innovative Technology (IJEIT). Volume 3, Issue 6, December 2013.
[5]. M. Randles, D. Lamb, and A. Taleb-Bendiab, "A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing", Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, April 2010.

Paper Type : Research Paper
Title : Investigating Procedures for Intuitive GUI design of Indian E-Commerce shopping sites
Country : India
Authors : Megharani Patil || Madhuri Rao

Abstract: This work is all about finding procedures to design intuitive e-commerce shopping websites in India by mapping existing GUI with end user's mental model and behavioral pattern to improve website structure, navigation and interaction. We considered 7 factors, viz. simplicity, readability, learnability, navigability, interactivity, supportability and acceptability for the same. The first three are related to web structure, navigability is related to website navigation and the last three are related to website interaction. Considering these factors, a questionnaire of 27 questions and 10 tasks are designed. Here we have captured the data by conducting a survey of 318 participants.......

Keyword: Intuitive GUI design, Mental model, Procedures, Website structure, Website navigation, Website interaction

[1]. Alghamdi, A., Aldabbas, H., Alshehri M.,and Nusir M.(2012). Adopting User-Centred Development for Arabic E-Commerce Websites. International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.2.
[2]. Ahmed, M., Kaysar, J., and Rahman, N. (2011). Design Approaches to Enhance Usability for E-Commerce Sites. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, ISSN (Online): 1694-0814.
[3]. Benbunan-Fich, R., (2001). Using protocol analysis to evaluate the usability of a commercial web site. Information & Management, 39(2), pp.151-163.
[4]. Bruijn, O., Angeli, A., Sutcliffe, A., (2007). Customer experience requirements for E-commerce websites. Int. J. Web Engineering and Technology, Vol. 3, No.4.
[5]. Chen, L., Gillenson, M. L., & Sherrell, D. L. (2004). Consumer acceptance of virtual stores: A theoretical model and critical success factors for virtual stores. ACM SIGMIS Database, 35(2), 8-31.

Researcher can also search IOSR published article contents through

IOSR Xplore