IOSR Journal of Computer Engineering (IOSR-JCE)

Jan. - Feb. 2017 Volume 19 - Issue 1

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : PageRank Algorithm
Country : Albania
Authors : Albi Dode || Silvester Hasani
: 10.9790/0661-1901030107      logo

Abstract: The way in which the displaying of the web pages is done within a search is not a mystery. It involves applied math and good computer science knowledge for the right implementation. This relation involves vectors, matrixes and other mathematical notations. The PageRank vector needs to be calculated, that implies calculations for a stationary distribution, stochastic matrix. The matrices hold the link structure and the guidance of the web surfer. As links are added every day, and the number of websites goes beyond billions, the modification of the web link's structure in the web affects the PageRank..........

Keyword: Algorithms, Distribution, Google, Math, PageRank.

[1]. Internet Stats, 2016). Retrieved 2016, from https://internetlivestats.com
[2]. Damping Factor, 2016). Retrieved 2016, from Forum DigitalPoint: https://forums.digitalpoint.com/threads/what-is-the-damping-factor-in-page-rank-and-whats-the-concept-behind-using-it.1885967/
[3]. BIANCHINI, M., GORI, M., & SCARSELLI, F. (2005). Inside PageRank. ACM Transactions on Internet Technology, 92-128.
[4]. Srivastava, S., & Aggrawal, R. R. (2012). A Modified Algorithm to Handle Dangling Pages using. International Journal of Computer Applications.
[5]. Chen, Y.-Y., Gan, Q., & Suel, T. (2002). I/O Efficient Techniques for Computing Pagerank.


Paper Type : Research Paper
Title : Multi-Robot Formation Control Based on Leader-Follower Optimized by the IGA
Country : China
Authors : Ting Huang || Mingxin Yuan || Donghan Lv || Yi Shen
: 10.9790/0661-1901030813     logo

Abstract: To improve the efficiency of multi-robot formation control, a new formation control algorithm based on leader-follower optimized by the immune genetic algorithm (IGA) is put forward in this paper. Firstly, the formation control is realized by leader-follower algorithm. Then, the proportion coefficients k1, k2 in leaderfollower is optimized by the immune genetic algorithm. Finally, the optimized proportion coefficients k1 and k2 is used in the leader-follower algorithm to finish the multi-robot formation control. Compared with other three formation control algorithms (i.e. GA, simple leader-follower algorithm, behavior algorithm).........

Keywords: Multiple robots, Formation control, Leader-follower, Immune genetic algorithm

[1] C.J. Chen, Formation control based on leader-followers for multiple mobile robots, doctoral diss., Hangzhou Dianzi University,
Hangzhou, China, 2015
[2] Y. Pang, Research on behavior-based formation control of multi-robot, doctoral diss., Tianjin University, Tianjing, China,2012.
[3] F. Zhang, Z. Sun, M.J. Liu, Formation control based on the method of artificial potential and the leader-follower for multiple mobile
robots, Journal of Shenyang Jianzhu University (Natural Science), 26(4), 2010, 803-807.
[4] B. Li, X.F. Wang, Formation control based on dynamic leader multi-robots, Journal of Changchun University of Technology
(Natural Science Edition), 30(2), 2009, 210-214.
[5] L. Zhang, Y.Q. Qin, D.B. Sun, J. Xiao, Behavior-based control for arbitrary formation of multiple robots, Control Engineering of
China, 12(2),2005, 174-176.


Paper Type : Research Paper
Title : Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulations with Neural Networks
Country : Brazil
Authors : Orlando Gea || Luiz P. Calôba
: 10.9790/0661-1901031423      logo

Abstract: The acoustic emission (AE) technique is a non-destructive testing technique applied to pressurized rigid pipelines in order to identify metallurgical discontinuities. This study analyses the dynamic behavior of the propagation of discontinuities in cracks via AE, in the following propagation classes: no propagation (NP), stable propagation (SP), and unstable propagation (UP). The methodology involves applying the concept of modulation of analogue signals, which are used in signal transmission in telecommunications, for the development of a neural network in order to determine new parameters for the AE waveform. The classification of AE signals into propagation classes occurs..............

Keywords: Acoustic emission, analogue modulation, neural network, non-destructive testing.

[1]. C F C Pinto, R R da Silva, L P Calôba and S D Soares, Probability of defect propagation in pipelines (POP curves), Insight, 56 (4), pp 1-7, 2014.
[2]. R R Silva, L P Calôba, M H S Siqueira, L V S Sagrilo and J M A Rebello, Detection of the Propagation of Defects in Pressurized Pipes through the Acoustic Emission Technique Using Artificial Neural Networks, ECNDT - Poster 1, pp 1-17, 2006.
[3]. R R Silva, S D Soares, L P Calôba, M H S Siqueira and J M A Rebello, Detection of the propagation of defects in pressurised pipes by means of the acoustic emission technique using artificial neural networks, Insight, 48 (1), pp 45-51, 2006.
[4]. R R Silva, D Mery and S D Soares, Evaluation of acoustic emission signal parameters for identifying the propagation of defects in pressurised tubes, Materials Evaluation, Vol 66, pp 493-500, 2008.
[5]. S D Soares, Correlações entre Emissão Acústica de Defeitos e Parâmetros de Mecânica da Fratura na Avaliação da Integridade de Equipamentos Pressurizados, doctoral thesis, Federal University of Rio de Janeiro, Rio de Janeiro, Brazil, 2008


Paper Type : Research Paper
Title : Density Driven Image Coding for Tumor Detection in mri Image
Country : India
Authors : Somashekhar Swamy || P.K.Kulkarni
: 10.9790/0661-1901032430     logo

Abstract: The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.

Keywords: Spectral features, spectral density feature selection, pattern recognition, retrieval accuracy.

[1]. Te-Wei Chiang, Tien-Wei Tsai, "Content-Based Image Retrieval via the Multiresolution Wavelet Features of Interest", Journal of Information Technology and Applications Vol. 1 No. 3, December, 2006.
[2]. Vinayak D. Shinde, Vijay M. Mane, " Pattern Recognition using Multilevel Wavelet Transform", International Journal of Computer Applications, Volume 49– No.2, July 2012.
[3]. ZhongliangLuo, "Iris Feature Extraction and Recognition Based on Wavelet-Based Contourlet Transform", Procedia Engineering, Elsevier, 2012.
[4]. Mathieu Lamard, Guy Cazuguel, Gw_enoleQuellec, Lynda Bekri, Christian Roux, "Content Based Image Retrieval based on Wavelet Transform coefficients distribution", Conference proceedings : Annual International Conference of the IEEE Engineering in Medicine and Biology Society., IEEE, 2007.
[5]. Hamid Soltanian-Zadeha, FarshidRafiee-Rad, SiamakPourabdollah-Nejad D, "Comparison of multiwavelet, wavelet, Haralick, and shape features for micro calcification classification in mammograms", journal of Pattern Recognition, Pergamon, Elsevier, 2004.


Paper Type : Research Paper
Title : Panorama Technique for 3D Animation movie, Design and Evaluating
Country : Iraq
Authors : Ola Mudher abd || Dr. Karim Q. Hussein
: 10.9790/0661-1901033136     logo

Abstract: This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc..............

Keywords: 3D animation, Modelling, Camera, Visual and Audio Effects, Skectup.

[1]. T. Zizka, 3D Modeling. Cherry Lake Publishing, 2014.
[2]. Kapp, Karl M. O'Driscoll, Tony 'Learning in 3D : Adding a New Dimension to Enterprise Learning and Collaboration ' , December 2009.
[3]. Meng Li, Xin Yuan Huang, Tie Jun Zheng 'Application of 3D Animation Technology in Movie Art Design', Advanced Materials Research, Vol. 267, June 2011.
[4]. Waiyawat Saitum*, Cee Triamornpan, Nuttapon Thitichaiyongkit, Nuttawut Tipamornwiwat, '3D Animation Silent Movie Entitled "The Seed": Research for Level of Understanding Compare between Male and Female' Department of Computer and Information Technology, Faculty of Industrial Education and Technology, KMUTT, Bangkok, Thailand, 2014.
[5]. Surendra Pal Singh, Kamal Jain, V. Ravibabu Mandla, 'Image Based 3D Modeling of Campus' Geomatics Engineering Section, Department of Civil Engineering, Indian Institute of Technology, Roorkee, Uttarakhand, India, ISSN: 2348-5124, 2013.


Paper Type : Research Paper
Title : Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynamically Generated Aggregate Key
Country : India
Authors : Chetna Waykole || Prof.D.D.Patil
: 10.9790/0661-1901033741     logo

Abstract: The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud..............

Keywords: Cloud Storage, Data Sharing, Key Aggregate Encryption, Multi-cloud infrastructure.

[1] F. C. Chang and H. C. Huang, \Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage," Inf. Sci., vol. 192, no. 1, pp. 3949, Jun. 2012.
[2] S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, \SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment," in Applied Cryptography and Network Security .,ACNS 2012, ser. LNCS, vol. 7341. Springer, 2012, pp. 526543. pp. 173184, 2011.
[3] L. Hardesty, Secure computers arent so secure, \MIT press,"2009,http://www.physorg.com/news176107396.html..
[4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, \Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,Proc ," 13th ACM Conf. Computer and Comm. Security (CCS 06),pp. 89-98, 2006.
[5] S.S.M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, \Practical Leakage- Resilient Identity-Based Encryption from Simple Assumptions ," in Proc. ACM Conf. Com-puter and Comm. Security,pp. 152-161, 2010.


Paper Type : Research Paper
Title : Assessment of the Approaches Used in Indigenous Software Products Development in Nigeria
Country : Nigeria
Authors : G.O. Binuyo || M. O. Alimi
: 10.9790/0661-1901034252     logo

Abstract: Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources...............

Keywords: Software Development, Software products, approaches, stakeholders, indigenous, Nigeria.

[1]. A.. Abran, L. LaFramboise, and P. Bourque, "A Risk Assessment Method and Grid for Software Measurement Programs", Software Engineering Management Research Laboratory, 3 October, 2000. Http://www.Irgl.uqam.ca/publications/pdf/271.pdf Retrieved on November, 2009.
[2]. J. A. Alic, "Technology in the service industries", International Journal of Technology Management 2005, 9 (1), pp. 1-14.
[3]. A.O. E . Animalu, "Technology Policy and Funding in Nigeria‟, Science and Technology News: a quarterly Publication of the Federal Ministry of Science and Technology, Abuja. July-Sept. 2002, 40 – 45.
[4]. M. K. Badawy, Technology Management Education: alternative Models California Management Review, 2008, 40 (4), pp. 94 – 115.
[5]. S. Bagchi, "India‟s software industry: the people dimension", IEEE Software May/June. 1999, pp. 62-65.


Paper Type : Research Paper
Title : Value Based Decision Control: Preferences Portfolio Allocation, Winer and Color Noise Cases
Country : Bulgaria
Authors : Yuri P. Pavlov
: 10.9790/0661-1901035360     logo

Abstract: The paper presents an innovative approach to mathematical modeling of complex systems "human-dynamical process". The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise..............

Keywords: Portfolio, Optimal control, Machine Learning, Utility Theory, Human Preferences

[1]. Allais, M.: Le comportement de l'homme rationnel devant le risque: Critique des postulats et axiomes de l'école américaine, Econometrica 21, 503-546 (1953).
[2]. Charness, G. and U. Gneezy: Portfolio choice and risk attitudes: An experiment, Economic Inquiry, 48, 133–146, (2010).
[3]. Cohen, M., Jaffray, J.Y.: Certainty Effects versus Probability Distortion: An Experimental Analysis of Decision Making Under Risk. Journal of Experimental Psychology: Human Perceptions and Performance 14(4), 554-560 (1988).
[4]. Collopy, P., Hollingsworth, P.: Value-driven design. AIAA Paper 2009-7099, American Institute of Aeronautics and Astronautics, Reston, VA (2009).
[5]. Farquhar, P.: Utility Assessment Methods. Management Science 30, 1283-1300 (1984).


Paper Type : Research Paper
Title : Human Face Detection Systemin ANew Algorithm
Country : Iraq
Authors : HewaMajeedZangana
: 10.9790/0661-1901036166     logo

Abstract: Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts..............

Keywords: Face detection, skin color, YCbCr.

[1]. Hong, S. and al, e, "Facial feature detection using Geometrical face model: An efficient approach," journal of pattern recognition, Vols. 31, No. 3, pp. 273-282, 1998.
[2]. Leung, C, "Real Time Face Recognition," B. Sc. Project, School of Information Technology and Electrical Engineering. University of Queesland, 2001.
[3]. Sanjay Kr, Singh, D. S. Chauhan, MayankVatsa and Richa Singh, "A Robust Skin Color Based Face Detection Algorithm," Tamkang Journal of Science and Engineering, vol. 6 (4), pp. 227-234, 2003.
[4]. Muhammad Tariq Mahmood, "Face Detection by Image Discriminating," 2006. [Online]. Available: http://www.bth.se/fou/cuppsats.nsf/all/6c509ae86a297ca4c12571d300512cac/$file/DVD009-MasterThesisReport.pdf.
[5]. Michael Padilla and Zihong Fan, "Automatic Face Detection Using Color Based Segmentation and Template / Energy Thresholding," 2003. [Online]. Available: http://www.stanford.edu/class/ee368/Project_03/Project/reports/ee368group16.pdf


Paper Type : Research Paper
Title : Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Country : Pakistan
Authors : Aftab Alam || Sehat Ullah || Numan Ali
: 10.9790/0661-1901036771     logo

Abstract: In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach.

Keywords: Virtual Environments, Adaptive 3D-Virtual Learning environments, Cognitive aids, Multimodal feedback, Multimodal Virtual laboratory (MMVL)

[1]. Ali, N., S. Ullah, and A. Alam, The Effect of Multimodalityand 3d Interaction In A Virtual Laboratory on Students'learning In Chemistry Education. Sindh University Research Journal-SURJ (Science Series),. 47(4), 2015.
[2]. Ali, N., et al., 3D Interactive Virtual Chemistry Laboratory for Simulation of High School Experiments. Paper presented at the Proceedings of EURASIA GRAPHICS 2014,Paper 12, 2014.
[3]. Alam, A., Ullah, S., Burqi, M. Z., Ullah, A., & Ali, N. , Evaluating Students Performance in Adaptive 3D-Virtual Learning Environments Using Fuzzy Logic. Sindh University Research Journal-SURJ (Science Series), 48(2): p. 245-250, 2016.
[4]. Troyer, D., F.K. O., and A. Ewais, Enhancing virtual reality learning environments with adaptivity: lessons learned. in Symposium of the Austrian HCI and Usability Engineering Group, Springer., 2010.
[5]. Ewais, A. and O.D. Troyer, Authoring adaptive 3D virtual learning environments. International Journal of Virtual and Personal Learning Environments (IJVPLE). 5(1): p. 1-19, 2014.


Researcher can also search IOSR published article contents through

IOSR Xplore