IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. - Dec. 2016 Volume 18 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Fundamentals of Molecular Biology for Gene Analysis
Country : India
Authors : V.Sujatha || Dr.Shaheda Akthar

Abstract: Biological data analysis and data management is very useful, interesting and mostly needed dynamic research area. Biological data details are usually represented by means of data sequences for ease of analysis of bio relationships. State-of-the-art, automated, efficient, effective, scalable, and interoperable bio data analysis and data management techniques are needed. Accurate and automated data mining techniques are needed to analyze, process, compare biological data sequences of data in order to discover relationships among the patterns of bio data sequences............

Keywords: DNA, RNA, SAGE, NCBI, gene expression, biological data, DNA microarray

[1]. Data mining Jiawei Han, Kamber, Second edition Cancer Classification Using Gene Expression Data Ying
[2]. Lu Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801, USA
[3]. Li, W.; Han, J.; and Pei, J. 2001. CMAR: Accurate and efficient classification based on multiple class-association rules. In Proc. of the Int. Conf. on Data Mining (ICDM-01).
[4]. Madhavan, J.; Bernstein, P.; Chen, K.; Halevy, A.; and Shenoy, P. 2003. Matching schemas by learning from a schema corpus. In Proc. of the IJCAI-03 Workshop on Information Integration on the Web.
[5]. McCallum, A.; Nigam, K.; and Ungar, L. 2000. Efficient clustering of high-dimensional data sets with application to reference matching. In Proc. 6th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining


Paper Type : Research Paper
Title : Interference Mitigation Approach for WBAN by Improving RAKE Receiver Modulation
Country : India
Authors : Mainak Chakraborty || Suparna Biswas

Abstract: In Wireless Body Sensor Network in order to diminish the interference caused by interpersonal communication and avoiding packet overhead collision problem in data link layer and MAC layer we propose a rake receiver to be implemented in body sensor network and improving the modulation techniques. Rake recovers are widely accepted because of its efficiency to remove near far problem. Moreover in recent research works encompassing the wireless sensor body area network highlights that body sensor intermediate control nodes are not immune to noise elimination and data reshaping..........

Keywords: WBAN, QPSK, MAC layer, Bit Error Rate, Signal to Noise Ratio

[1] Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The Stanford Digital Library Metadata Architecture. Int. J. Digit. Libr. 1 (1997) 108–121
[2] D. Jea and M. B. Srivastava, "A remote medical monitoring and interaction system," Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys '06), Uppsala,Sweden, June 2006.
[3] Morchon, O.G, Baldus H, Sanchez, D.S, 3-5, "Resource Efficient Security for Medical Body Sensor Networks, Wearable and Implantable Body Sensor Networks", BSN International Workshop,4pp, April 2006.
[4] N. F. Timmons and W. G. Scanlon, "Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking," in Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004),October 2004, pp. 16–24
[5] Interference Mitigation Between WBAN Equipped Patients by Judhistir Mahapatro , Sudip Misra, Nabiul Islam,IEEE


Paper Type : Research Paper
Title : Efficient Clustering Algorithm with Improved Clusters Quality
Country : India
Authors : Mr. Anand Khandare || Dr. A.S. Alvi

Abstract: Clustering algorithm is data mining task where the value of a number of clusters and data objects are given as inputs to the algorithm to divide the data objects into k clusters. Clustering can be used in various applications like clustering online retailers, SMS, and email spam collection, human activity recognition and much more. There are huge researches and applications in the area of clustering. There are various clustering algorithms are available such as the k-means, k-medoids etc............

Keywords: Clustering, Cluster quality, k-means, k-medoids, Sum of Square Error, Compactness

[1] Jeyhun Karimov, Murat Ozbayoglu, Clustering Quality Improvement of k-means using a Hybrid Evolutionary Model, Procedia Computer Science 61 38 – 45 2015.
[2] Rui Xu, Donald Wunsch,Survey of Clustering Algorithms, IEEE Transaction on NEURAL NETWORKS, VOL. 16, NO. 3, (2005).
[3] Wenyuan Li, Wee-Keong Ng,Ying Liu, Member, Kok-Leong Ong, Enhancing the Effectiveness of Clustering with Spectra Analysis, IEEE Transaction on KNOWLEDGE AND DATA ENGINEERING, vol. 19, no. 7, 2007.
[4] Sriparna Saha,Sanghamitra Bandyopadhyay,Performance Evaluation of Some Symmetry-Based Cluster Validity Indexes, IEEE Transaction on SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, Vol. 39, No. 4, 2009.
[5] Mr.Anand D.Khandare,Modified K-means Algorithm for Emotional Intelligence Mining, International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015.


Paper Type : Research Paper
Title : Eeg Based Person Identification and Authentication Using BCI
Country : India
Authors : Shashank N || Mr.Anil Kumar

Abstract: now a day, a wide variety of security system requires reliable recognizable scheme to either confirm or identify the person from a group. Due to the characteristics of EEG, it is very difficult to forge or copy the EEG signal. In this paper, for feature extraction-multiwavelet transforms are used. For classification, kNN method is used.

Keywords: EEG;biometric;person identification;k-nearest neighbor(kNN)

[1] Brain computer interface and its types - a study Anupama. H.S, N.K.Cauvery , Lingaraju.G.M
[2] An Introduction to Biometric Recognition-Anil K. Jain
[3] Brainwave based authentication system- Pinki Kumari, Dr. Abhishek Vaish
[4] Exploring EEG-based Biometrics for User Identification and Authentication-Qiong Gui, Zhanpeng Jin, Wenyao Xu
[5] Person Authentication using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation-Sebastian Marcel, José del R. Mill ´an


Paper Type : Research Paper
Title : Text Summarization for Telugu Document
Country : India
Authors : Dr.M.Humera Khanam || S.Sravani

Abstract: Text Summarization is the process of reducing a text Document with a computer program in order to create a summary that retains the most important points of the original document. As the problem of information overload has grown, and as the quantity of data has increased, text summarization has became an important and challenging area in natural language processing. It is very difficult for human beings to manually summarize large documents of text. This paper presents a text summarization technique to summarize a text document by using Frequency based approach. This approach extracts the most important sentences of the text document which gives the meaningful information of the large document.

Keywords: Text Summarization, frequency based approach, Extraction

[1] Inderjeet Mani, "Advances in Automatic TextSummarization", MIT Press, Cambridge, MA, USA, 1999.
[2] Jade Goldstein, Mark Kantrowitz, Vibhu Mittal, and Jaime Carbonell, "Summarizing textdocuments:sentence selection and evaluation metrics", ACM SIGIR, 1999, pp 121–128.
[3] E.H. Hovy and C.Y. Lin, "Automated Text Summarization in SUMMARIST", Proceedings of the Workshop on Intelligent Text Summarization, ACL/EACL-97. Madrid, Spain, 1997.
[4] J. Carbonell and J. Goldstein, "The use of MMR, diversitybased reranking for reordering documents and producing summaries," ACM SIGIR, 1998, pp. 335–336.
[5] Zha Hongyuan, "Generic Summarization and Key phrase Extraction Using Mutual Reinforcement Principle and Sentence Clustering", ACM, 2002


Paper Type : Research Paper
Title : A Fuzzy Expert System for Risk Self-Assessment of Chronic Diseases`
Country : Turkey
Authors : Enes Furkan Erkan || Çağatay Teke || Didem Güleryüz

Abstract: Non communicable diseases, also known as chronic diseases are leading causes of death in the world. Even though advancements in the field of medicine make it easier to treat chronic diseases, there are still insufficiencies regarding the determination and evaluation of its risk factors. In this study, various risk factors used to diagnose were investigated by taking into consideration the individuals with common symptoms and complaints about chronic diseases. Accordingly, risk factors of them were determined............

Keywords: Chronic diseases, fuzzy expert system, fuzzy logic, risk assessment.

[1] WHO, People-Centred Health Care: A Policy Framework, World Health Organization, 2007.
[2] CDC, Chronic Disease - At a Glance, Centers for Disease Control and Prevention, 2009.
[3] J.S. Abduljabar, Using fuzzy logic methods for carbon dioxide control in carbonated beverages, master's diss., University of Ankara, Ankara, 2011.
[4] N. Allahverdi, S. Torun, I. Saritas, Design of a fuzzy expert system for determination of coronary heart disease risk, Proc. International Conference on Computer Systems and Technologies, 2007, 1–8.
[5] S. Barro, R. Marin, Fuzzy logic in medicine (Heidelberg: Physica-Verlag HD, 2002).


Paper Type : Research Paper
Title : Enhancing Hadoop Performance Utilizing the Metadata of Related Jobs: A Survey
Country : India
Authors : Shweta v. Chaudhari || R.M. Wahul

Abstract: Cloud computing influences Hadoop system for preparing Big Data in parallel. Hadoop has certain confinements that could be abused to execute the job effectively. These restrictions are generally due to information locality in the cluster, employments and job planning, and asset distributions in Hadoop. Proficient asset designation remains a provocation in Cloud Computing Map Reduce stages. Hadoop contains a few confinements that could be created to have a higher execution in executing jobs. These confinements are generally as a result of data locality in the cluster, job and job Scheduling , CPU execution time, or asset distributions in Hadoop. In this paper here is a study of how to overcome from these confinements.

Keywords: Big Data, Cloud Computing, Hadoop, Hadoop Performance, Map Reduce.

[1]. H. Alshammari, J. Lee, and H. Bajwa, "H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs," IEEE Transactions on Cloud Computing, vol. (PP), 2016.
[2]. http://bradhedlund.com/2011/09/10/understanding-hadoop-clusters-and-the-network/.
[3]. http://www.admin-magazine.com/HPC/Articles/MapReduce-and-Hadoop
[4]. M. Chen, S. Mao, and Y. Liu, "Big Data: A Survey," Mobile Networks and Applications, vol. 19, pp. 171-209, 2014.
[5]. R. Gu, X. Yang, J. Yan, Y. Sun, B. Wang, C. Yuan, et al., "SHadoop: Improving MapReduce performance by optimizing job execution mechanism in Hadoop clusters," Journal of Parallel and Distributed Computing, vol. 74, pp. 2166-2179, 2014.


Paper Type : Research Paper
Title : Serial Number Recognition in Banknotes Using HoG Feature Extraction and KNN Classification
Country : India
Authors : Er.Ramanjit Kaur || Er. Priyadarshni

Abstract: Character recognition is one of the many complex areas of pattern recognition with immense research and practical importance. This paper presents serial number recognition in Indian banknotes which can help to manage the currency circulation, financial transactions and prevents forgery crimes by detecting fraudulent banknotes. This approach consists of various steps including preprocessing, feature extraction and classification. In preprocessing, linear contrast stretching and morphological opening is performed for the gray level normalization and removal of irrelevant pixels from the degraded images...........

Keywords: Character recognition, linear contrast stretching, HoG feature extraction, KNN classification

[1] Qizhi Xu, Louisa Lam, Ching Y. Suen: 'Automatic segmentation and recognition system for handwritten dates on Canadian bank
cheques'. Proceedings of the 7th International Conference on Document Analysis and Recognition, Edinburgh, UK, August 2003,
pp. 704-708.
[2] R. Vishnu, Bini Omman: 'Principal component analysis on Indian currency recognition'. Proceedings of the 5th International
Conference on Computer and Communication Technology, Allahabad, India, September 2014, pp. 291-296.
[3] Ting-Ting Zhao, Ji-yin Zhao, Rui-rui Zhang, Lu-lu Zhang: 'Study on RMB number recognition based on genetic algorithm artificial
neural network'. Proceedings of the 3rd International Congress on Image and Signal Processing, Yantai, China, October 2010,
Volume 4, pp. 1951-1955.
[4] Wenhong Li, Wenjuan Tian, Xiyan Cao, Zhen Gao: 'Application of support vector machine (SVM) on serial number identification
of RMB'. Proceedings of the 8th World Congress on Intelligent Control and Automation, Jinan, China, July 2010, pp. 6262-6266.
[5] Bo-Yuan Feng, Mingwu Ren, Xu-Yao Zhang, Ching Y. Suen: 'Part-based high accuracy recognition of serial numbers in bank
notes', N.El Gayar et al. (Eds.): ANNPR, LNAI 8774, Springer, Switzerland, 2014, pp. 204-215.


Paper Type : Research Paper
Title : Improving Efficiency of Association Rules by Means of Classification
Country : India
Authors : L Kiran Kumar Reddy || Dr.S.Phani Kumar

Abstract: Data Mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis. Information mining in enterprise applications facing challenges due to the complex data distribution in large heterogeneous sources. In such scenario, a single approach or method for mining, limited the information needs and it also will be high processing and time consuming. It is necessary to develop an effective mining approach which can be useful for the real time business requirements and decision making tasks.

Keywords: Data mining, Association rules, Classification, Associative classification.

[1]. R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB'94, Chile, Sept. 1994.
[2]. P. Clark and T. Niblett. The CN2 induction algorithm. Machine Learning, 3:261–283, 1989.
[3]. G. Dong, X. Zhang, L. Wong, and J. Li. Caep: Classification by aggregating emerging patterns. In DS'99 (LNCS 1721), Japan, Dec.
1999.
[4]. R. Duda and P. Hart. Pattern Classification and Scene Analysis. John Wiley & Sons, 1973.
[5]. J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD'00, Dallas, TX, May 2000


Paper Type : Research Paper
Title : Remote Monitoring (RM) – System using ZigBee and WiFi wireless network for oil palm plantation
Country : Malaysia
Authors : Pushparani Marappan

Abstract: The increasingly competitive global agriculture market is undergoing challenges to create sustainable operational efficiency. To enhance work productivity by increasing workflow efficiency and maintaining operational effectiveness, remote monitoring could be one of the solutions for plantation industry. Wireless remote monitoring is a well-established technology that can be applied to the agriculture industry to improve efficiency and operational productivity. This research describes a methodology that incorporates hardware and software components that enable........

Keywords: load management, remote monitoring, soil testing, security surveillance

[1] Gatto, M. (2015). Land-use dynamics, economic development, and institutional change in rural communities-Evidence from the
Indonesian oil palm sector (Doctoral dissertation, Göttingen, Georg-August Universität, Diss., 2015).
[2] Portilla, J., De Castro, A., De La Torre, E., & Riesgo, T. (2006). A Modular Architecture for Nodes in Wireless Sensor Networks. J.
UCS, 12(3), 328-339.
[3] Sivasothy, K. (2005). A new approach to plant-wide automation of palm oil mills. In Proceedings of the 2005 MPOB National
Seminar. Paper 1.
[4] Jusoff, K., & Pathan, M. (2009). Mapping of individual oil palm trees using airborne hyperspectral sensing: an overview. Applied
Physics Research, 1(1), p15.
[5] He, D., Bai, Y., Wang, Y., & Wu, H. (2007, January). A crop field remote monitoring system based on web-server-embedded
technology and CDMA service. In Applications and the Internet Workshops, 2007. SAINT Workshops 2007. International
Symposium on (pp. 72-72). IEEE.


Paper Type : Research Paper
Title : A Feature- Driven Ontology for Agile FDD Software Development
Country :  
Authors : Dr Farheen Siddiqui

Abstract: Agile FDD methods have evolved and practiced in recent years as a new way in software development, leading to minimum dependency on the process of building software systems from some of the limitations of waterfall like approaches. However the excess of overlapping procedures makes it difficult to utilize important features of an agile FDD approach to facilitate any particular method and provide us with an overarching methodology. This paper takes an ontological approach to analyzing the core components of an feature driven development (FDD) based on an analysis of existing literature related to agile FDD ontology. The purpose of this ontology is to deepen the understanding of the most important part of software engineering theory that underlies agile FDD methodology.

Keyword(s): feature driven development, agile FDD methods, ontology, software engineering

[1] J. Highsmith, Agile FDD software development ecosystem, Boston: Addison-Wesley, 2002.
[2] D. Parsons, H. Ryu and R. Lal, R. "The Impact of Methods and Techniques on Outcomes from Agile FDD Software Development Projects" in IFIP 8.6 Conference: Organisational Dynamics of Technology-based Innovation: Diversifying the Research Agenda, McMaster, Wastell, Ferneley and DeGross (eds.), Springer, 2007, pp. 235-249.

[3] I. Jacobson, 2009 In need of a theory for software engineering, http://ivarblog.com/2009/05/29/in-need-of-a-theoryfor-software-engineering/
[4] B. Marick, "Methodology Work Is Ontology Work", ACM SIGPLAN Notices, 39(12) pp. 64 – 72, 2004.
[5] P. Wongthongtham, E. Chang, T. Dillon and I. Sommerville, "Software engineering ontologies and their implementation", in Kobol, P. (ed), IASTED International Conference on Software Engineering (SE), pp. 208-213, Innsbruck, Austria, ACTA Publishing, 2005.


Paper Type : Research Paper
Title : A Pmipv6-Fog Scheme for Vehicular Mobility Support
Country : Iraq
Authors : Dr. Haider N. Hussain

Abstract: Vehicular Ad-hoc Networks (VANETs) and the rapid development of communicationand computation technologiesare one of the main next generation wireless networks which are envisaged to be an integration of homogeneous and heterogeneous wireless networks. Although VANETs are deployed in reality offering several services, a seamless handover mechanism with negligible handover delay is required to maintain active connections during roaming across these networks.Cloud computing as a solution has been deployedwith special requirements of mobility............

Keywords: VANET,MIIS, fog computing, cloud computing, Proxy Mobile IPv6, vehicular cloud computing.

[1] Whaiduzzaman M, Sookhak M, Gani A, et al. A survey on vehicular cloud computing. Journal of Network and Computer
Applications, 2014, 40(1): 325−344.http://dx.doi.org/ 10.1016/j.jnca.2013.08.004
[2] Brolaw A P. A simple three-terminal IC bandgap reference. IEEE Journal of Solid-State Circuits, 1974, 9(6): 388−393.
http://dx.doi.org/ 10.1109/JSSC.1974.1050532
[3] Lee K K, Lande T S, Hafliger P D. A sub-μW bandgap reference circuit with an inherent curvature-compensation property. IEEE
Transactions on Circuits and Systems I: Regular Papers, 2015, 62(1): 1−9.http://dx.doi.org/ 10.1109/TCSI.2014.2340553
[4] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, "Fog computing and its role in the internet of things", MCC workshop on Mobile cloud
computing, Aug., 2012.http://dx.doi.org/ 10.1145/2342509.2342513
[5] I. Stojmenovic, S. Wen, "The Fog Computing Paradigm: Scenarios and Security Issues", Federated Conference on Computer
Science and Information Systems (FedCSIS), 7-10 Sept2014.http://dx.doi.org/ 10.15439/2014F503


Paper Type : Research Paper
Title : Web Application Security- SQL Injection – Modes of Attacks, Defense and why it Matters
Country : India
Authors : Monali Sachin Kawalkar

Abstract: SQL injection attacks represent a serious threat to any database-driven site. The methods behind an attack are easy to learn and the damage caused can range from considerable to complete system compromise. Despite these risks an incredible number of systems on the internet are susceptible to this form of attack.Not only is it a threat easily instigated, it is also a threat that, with a little common-sense and forethought, can be almost totally prevented. This paper will look at a selection of the methods available to a SQL injection attacker and how they are best defended against.

[1] "SQL Injection Are Your Web Applications Vulnerable?". SPI Dynamics.2002.http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf
[2] Www.OWASP.org/index.php/SQL_Injection_Prevention_Cheat_sheet
[3] Anley, Chris. "Advanced SQL Injection in SQL Server Applications". NGSSoftware Insight Security Research (NISR) Publication. 2002.
[4] OWASP Top Ten Project - http://www.owasp.org/index.php/Top_10
[5] OWASP Code Review Guide - http://www.owasp.org/index.php/Category:OWASP_Code_Review_Project


Paper Type : Research Paper
Title : Performance Analysis of Location Aware Cluster Based Routing Scheme in Wireless Sensor Network
Country : India
Authors : Hrituparna Paul || Prodipto Das

Abstract: Wireless Sensor Networks have created new opportunities across the variety of human efforts including engineering design, forest fire tracking, and battlefield surveillance. It is a cluster of sensor nodes that comprised of sensing, computing, and communication elements that gives an administrator the ability to view and react to events and phenomena in a specified environment. Scheming of energy efficient routing protocols is significantly important in WSN. Design of an energy efficient and reliable routing protocols for mobility centric applications of WSN such as wildlife monitoring, battlefield surveillance and health monitoring is a great challenge because of the frequent changes in topology of the network..........

Keyword: WSN, Energy Values, Latency Values, Packet Delivery Ratio, Residual Energy Values.

[1] [Shio kumar ,singh,MP singh, and DK singh. ―A Survey of Energy- Efficient Hierarchical Cluster-Based Routing in Wireless SensorNetworks. Int. J. of Advanced Networking and Applications (2010), VOL: 02, Page: 570-580
[2] S. Jerusha, K. Kulothungan & A. Kannan ,"Location Aware Cluster Based Routing In Wireless Sensor Networks, Int. J. of Computer & Communication Technology ISSN: 0975-7449, Volume-3, Issue-5, 2012
[3] Efrat, A., Har-Peled, S., Mitchell, W.: "Approximation algorithms for two optimal location problems in sensor networks‟. Proc. Int. Conf.on Broadband Communication, Networks and System, 2005, pp. 1–14.
[4] Shi, Y., Hou, Y.T., Efrat, A.: "Algorithm design for base station placement problems in sensor networks‟. Proc. Int. Conf. on QoS in Heterogeneous Wired/Wireless Networks, Waterloo, Ontario, Canada, 2006, pp. 7–9
[5] Vass, D., Vidacs, A.: "Positioning mobile base station to prolong wireless sensor network lifetime‟. Proc. Int. conf. on Emerging network experiment and technology, 2005, pp. 300–301.


Paper Type : Research Paper
Title : Digital Image Compression Using Improved Genetic Algorithm
Country : India
Authors : Shailesh Saxena || Dr. R. P. Singh

Abstract: Improved genetic algorithm increase the compression ratio and rate of digital image. The improved genetic algorithm process the parallel selection of transform block in multiple sequence. For the transformation of image data used the fractal transform function. The fractal transform function gives the non-overlapping blocks of given image. The dimension and transform of image mapped in second dimension. The improved genetic algorithm process of data based on reference direction of image. The direction of image divide into three section horizontal, vertical and diagonal........

Keyword: Digital Image, Compression, Fractal Transform, Genetic Algorithm.

[1]. Jiantao Zhou, Xianming Liu, Oscar C. Au, Fellow, Yuan Yan Tang "Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL-9, 2014. Pp 39-51.
[2]. Sujoy Paul, BitanBandyopadhyay "A Novel Approach for Image Compression Based on Multi-level Image Thresholding using Shannon Entropy and Differential Evolution" Proceedings of IEEE 2014. Pp 56-61.
[3]. Utpal Nandi, Jyotsna Kumar Mandal "Fractal Image Compression By Using Loss-Less Encoding On The Parameters Of Affine Transforms" IEEE, 2012. Pp 561-568.
[4]. Soumi C.G, Joona George, Janahanlal Stephen "Genetic Algorithm based Mosaic Image Steganography for Enhanced Security" ACEEE Int. J. on Signal and Image Processing , Vol-5, 2014. Pp 15-26.
[5]. H. Ramezani, F. Keynia, F. Ramezani "A Novel Image Steganography in Contourletdomain Using Genetic Algorithm" nternational Journal of Future Computer and Communication, Vol-2, 2013. Pp 359-364..


Paper Type : Research Paper
Title : Perceptual Hash Based Video Fingerprinting to Search and Identify Content
Country : India
Authors : Nikhil Sahni

Abstract: The goal of this research is to identify a suitable algorithm for searching and identifying content considering the transformations or attacks on a given input and yet be tolerant enough to distinguish between dissimilar files. These transformations can include skew, rotation, contrast adjustment and different compression/formats..

[1] https://en.wikipedia.org/wiki/Perceptual_hashing
[2] http://blockhash.io/
[3] http://elog.io/dev/
[4] http://phash.org
[5] https://github.com/pragone/jphash
[6] http://cloudinary.com/blog/how_to_automatically_identify_similar_images_using_phash


Paper Type : Research Paper
Title : Smart Decongestion Model Based Upon QoS and Multicasting Mechanisms for Vehicular Networks
Country : India
Authors : Gurjot Kaur || Samanpreet Singh || Bharti Chhabra

Abstract: The availability deals with network services for all nodes comprises of bandwidth and connectivity. In order to encounter the availability issues, prevention and detection technique using vehicular network traffic decongestion scheme has been introduced. The scheme is focusing on retaining the maximum availability by exchanging the messages smartly and with less effort and minimized volume between vehicles to vehicle and vehicle to RSUs. The major objective of this research work is to maximize the resource availability by smartly analyzing and forwarding the data...........

Keyword: Load balancing, Decongestion, Congestion aware data propagation, Centralized data propagation management.

[1]. Chen, Lu, Hongbo Tang, and Junfei Wang. "Analysis of VANET security based on routing protocol information." In Intelligent Control and Information Processing (ICICIP), 2013 Fourth International Conference on, pp. 134-138. IEEE, 2013.

[2]. Dias, João A., João N. Isento, Vasco NGJ Soares, Farid Farahmand, and Joel JPC Rodrigues. "Testbed-based performance evaluation of routing protocols for vehicular delay-tolerant networks." In GLOBECOM Workshops (GC Wkshps), 2011 IEEE, pp. 51-55. IEEE, 2011.

[3]. Ghaleb, Fuad A., M. A. Razzaque, and Ismail Fauzi Isnin. "Security and privacy enhancement in vanets using mobility pattern." In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, pp. 184-189. IEEE, 2013.

[4]. Hung, Chia-Chen, Hope Chan, and EH-K. Wu. "Mobility pattern aware routing for heterogeneous vehicular networks." In Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, pp. 2200-2205. IEEE, 2008.

[5]. Javed, Muhammad A., and Jamil Y. Khan. "A geocasting technique in an IEEE802. 11p based vehicular ad hoc network for road traffic management." InAustralasian Telecommunication Networks and Applications Conference (ATNAC), 2011, pp. 1-6. IEEE, 2011..


Paper Type : Research Paper
Title : Dual Image Steganography Technique: Countermeasure and Analysis
Country : India
Authors : Deepak Kumar Patidar || D. Srinivasa Rao || G. Sriram

Abstract: The Internet has become the most important source of information in today's life which offers the users to exchange information. But the transfer of such information leads to a great security threat. The objective of steganography is to conceal the presence of the message from unapproved party. For concealing confidential data in pictures, there exist a huge classification of steganographic systems some are more difficult than others and every one of them have strong and weak points...........

Keyword: Steganography, Image, Cryptography, AES, DES, Data Security, LSB

[1] Muhalim Mohamed Amin "Information Hiding Using Steganography", ethesis, University Technology Malaysia, 2003.
[2] Komal Patel and Sumit Utareja, "Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm", International Journal of Computer Applications (IJCA), Volume 63– No.13, February 2013.
[3] Chandramouli, R., Kharrazi, M. & Memon, N., "Image steganography and steganalysis: Concepts and Practice", Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003.
[4] Currie, D.L. & Irvine, C.E., "Surmounting the effects of lossy compression on Steganography", 19th National Information Systems Security Conference, 1996.
[5] Anderson, R.J. & Petitcolas, F.A.P., "On the limits of steganography", IEEE Journal of selected Areas in Communications, May 1998..


Paper Type : Research Paper
Title : Cloud Computing in brief
Country : India
Authors : Sova Pal (Bera)

Abstract: The term "cloud computing" is now very popular. Yet, it is not always clearly defined. Cloud computing is growing now-a-days in the interest of technical and business organizations. It gives subscription-based delivery of computing services- servers, storage, databases, networking, software, analytics and more over the Internet ("the cloud"). Though questions remain on its different aspects such as security and vendor lock-in, it has many benefits. This paper explores some of the basics of cloud computing such as the characteristics, service models and deployment models in use today, as well as the benefits and security associated with cloud computing.

Keyword: Internet, Cloud, Cloud Computing

[1] National Institute of Science and Technology draft definition of cloud computing,
[2] http://csrc.nist.gov/publications/ drafts/800-145/Draft-SP-800-145_cloud-definition.pdf.
[3] http://www.computerweekly.com/feature/A-history-of-cloud-computing
[4] http://www.buyya.com/MasteringClouds/Chapter1.pdf

[5] Cloud computing by Chris Woodford. Last updated: August 13, 2016


Paper Type : Research Paper
Title : Applicability Erasure Coding on Non-Traditional Cloud Storage Services for Storage Fault Tolerance
Country : India
Authors : L. Srinivasa Rao || Dr.I. Raviprakash Reddy

Abstract: With the fastest growing nature of application migrating to cloud, the problem of choosing the best suitable cloud service for storage is always a challenge. The cloud storage services are majorly paid service and some of them are designed to deal best with specific kinds of data like read only or update only. Some of the services are designed to match small amount of data blocks and some of the services are designed to best match the larger blocks of data. Many of the application uses file storage, rather than RDBMS storage structure on cloud services. Moreover the failure is an added component of risk to cloud storage........

Keyword: Cloud Storage, Performance Comparison, Evolution Application, Response Time, Comparison, Erasure, RAID, RAID 4, RAID 5, Array Code, Reed – Solomon Code, Azure, Amazon S3, Performance Matrix.

[1]. J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, "Oceanstore: An Architecture for Global-Scale Persistent Storage," Proc. Ninth Int'l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, 2000.
[2]. P. Druschel and A. Rowstron, "PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility," Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, 2001.
[3]. A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, "Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment," Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002.
[4]. A. Haeberlen, A. Mislove, and P. Druschel, "Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures," Proc. Second Symp. Networked Systems Design and Implementation (NSDI), pp. 143-158, 2005.
[5]. Z. Wilcox-O'Hearn and B. Warner, "Tahoe: The Least-Authority Filesystem," Proc. Fourth ACM Int'l Workshop Storage Security and Survivability (StorageSS), pp. 21-26, 2008.


Paper Type : Research Paper
Title : Fire-Extinguishing Robot Design by Using Arduino
Country : Turkey
Authors : Abdülkadir ÇAKIR || Nyan Farooq Ezzulddın EZZULDDIN

Abstract: The aim of this thesis is to contribute to the development of automation systems and to design an unmanned fire extinguisher robot. By this purpose, an attempt was made to develop a mobile robot in order to detect fires (simulated with fire, candle) that could occur In a closed environment. Designing robot able to motion by using the (rotor motor), beyond the barriers by(sensor MZ80), find the flame by (flame sensor), and extinguish the fire by(fan), and it progresses in conjunction with the search for the fire to control it and send message to the mobile or tablet by using (blutooth HC-05) when it founded the fire and all of this is controlled by the microcontroller (Arduino uno )...........

Keyword:Fire-Extinguishing, Robot Design, Arduino.

[1] A. Kızılhan, Z. Bingül and A. Vertiy, Yer Altı Üç Boyutlu Görüntüleme Amaçlı Gezgin Robot Tasarımı ve İmalatı, Otomatik Kontrol Ulusal Toplantısı, Kocaeli, Turkey, 21-23 Eylül 2010.
[2] B. Mert, Bir Endüstriyel Robotun İnsan Kolu Hareketlerinin Derinlik Harıtası İle Algılanmasıyla Kontrolü, TOBB Economy and Technology University Institute of Science and Technology, Master Thesis, Ankara, Turkey, 2016.
[3] E. Eroğlu, Gezgin Robotlarda Ultrasonik Mesafe Algılayıcılarla Robot Davranışlarının Kontrolü ve Çevre Haritalama, Eskişehir Osmangazi University Institute of Science and Technology, Electrical and Electronics Engineering, Master Thesis, Eskişehir, Turkey, 2006.
[4] B. J. Qiu, G. H. Qian, Z. P. Xiang, and Z. P. Li, Avoiding Barriers in Control of Mowing Robot, Frontiers of Mechanical Engineering in China, 1(3), 2006, 346-349.
[5] I. Çavuşoğlu, F. Kırmızı, Seri Port İle Haberleşebilen Uzaktan Kumandalı Kameralı Araç, Yildiz Technical University, İstanbul, Turkey, 2007.


Paper Type : Research Paper
Title : Inadequate use of patterns derived from data mining techniques leads to the ineffective performance
Country : Turkey
Authors : Dr. Sunil Kumar Sah || Amit Kumar

Abstract: Many data mining techniques have been proposed for mining useful patterns in databases. However, how to effectively utilize discovered patterns is still an open research is- sue, especially in the domain of text mining. Most existing methods adopt term-based approaches.However, they all suffer from the problems of polysemy and synonymy. This paper presents an innovative technique, pattern taxonomy mining, to improve the effectiveness of using discovered pat- terns for finding useful information. Substantial experiments on RCV1 demonstrate that the proposed solution achieves encouraging performance.

Keyword: Text mining, Pattern Taxonomy, Pattern Evolving

[1]. R. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison Wesley, 1999.
[2]. W. Lam, M. E. Ruiz, and P. Srinivasan. Automatic text categorization and its application to text retrieval. IEEE Transactions on Knowledge and Data Engineering, 11(6):865–879, 1999.
[3]. D. D. Lewis. Evaluating and optimizing automous text classification systems. In Proceedings of SIGIR, pages 246–254, 1995.


Researcher can also search IOSR published article contents through

IOSR Xplore