IOSR Journal of Computer Engineering (IOSR-JCE)

Jul - Aug 2017 Volume 19 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7


Paper Type : Research Paper
Title : Data Storage on Cloud Using Hybrid Encryption with One Time Password
Country : India
Authors : Munavvara Tahaseen || Maniza Hijab || Sofia Mariam Hussain
: 10.9790/0661-1904070105     logo

Abstract: The arrival of cloud computing has been so extensive that it has become the most sought-after idea for data owners to outsource their data to the cloud thereby allowing users to retrieve it. Although traditional methods are proof enough that the models created based on symmetric key encryption perform well, a significant drawback is vulnerability of the security of the key which when once leaked, discloses confidential data of the data owner. Another drawback is the process of data user authentication, which is very tedious where a long conversation is carried out between the administration server and the user to verify the identity of the user. In this paper, we initiate schemes that deal with improvising the traditional methods as well as improvising the process of data user authentication.............

Keywords: Symmetric Encryption, Asymmetric Encryption, Hybrid Encryption, Cloud Computing, One Time Password, Security..

[1] R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. ACM Conf. Computer and Comm. Security (CCS'06), 2006.
[2] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributed Systems, vol.23, No.8, Aug.2012.
[3] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distrib.Comput.Syst., Genoa, Italy, Jun. 2010 elevated channel lowtemperature poly-Si TFT," IEEE Electron Device Lett., vol. 20, pp.569–571, Nov. 1999.

[4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy- preserving multi-keyword ranked search over encrypted cloud data," in Proc.IEEE INFOCOM, Shanghai, China, Apr.2011.
[5] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy- preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25.


Paper Type : Research Paper
Title : Dynamic Resource Allocation Scheme for Map Reduce Tool in Cloud Environment
Country : India
Authors : Dr. M. Mohamed Surputheen || M.Abdullah
: 10.9790/0661-1904070611     logo

Abstract: Most scientific data consists of analysing huge amount of data collected from different resources. Hence, parallel algorithms and frameworks are the important which can process huge volumes of data and meeting the requirements of performance and scalability entailed in such scientific data analyses. In this paper, we proposed a concurrent VM reconfiguration mechanism for big data tool which is mapreduce on virtualized cloud environments. Our reconfiguration enhances the input data locality of a virtual MapReduce cluster. It adds cores to VMs to run local tasks temporarily..............

Keywords: Cloud Computing, Big Data, Map Reduce, Virtualization.

[1] I. Raicu, I. Foster, Y. Zhao. "Many-Task Computing for Grids and Supercomputers", Invited Paper, IEEE MTAGS 2008.
[2] R.Udendhran, "New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment" Asian Journal of Computer Science And Information Technology 4 : 12 (2014) 87 - 91 ISSN 2249-5126.
[3] J. Dean and S. Ghemawat. MapReduce: simplified data processing on large clusters. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 137–150, 2004.
[4] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly. Dryad: distributed data-parallel programs fromsequential building blocks. In Proceedings of the 2ndEuropean Conference on Coputer Systems (EuroSys), 2007.
[5] Apache Hadoop. http://hadoop.apache.org.


Paper Type : Research Paper
Title : A Hotel Recommendation System Based on Data Mining Techniques
Country : India
Authors : Ravindra Ramawat || Mr.B.L.Pal
: 10.9790/0661-1904071219     logo

Abstract: The recommendation system is a software tool to recommend user about the quality of items or services to be use by the user.Due to increase of tourism industry as well as growth IT industry tourist or employee visiting from one place to another place frequently and staying in hotel for short period. So, numbers of researchers have design and developed hotel recommendation system for these types of visitors using different – different type of algorithms like memory based algorithm, model based algorithm and Association rule. Each and every algorithm has their own prose and cons. That is why we have design and developed a new recommendation system for the hotel booking using K-Means algorithm, Apriori algorithm and association rule.

Keywords: K-means Clustering, Apriori Algorithm, hotel, Association rule, visitors etc

[1] Meenal Moghe, Abhishek Raghuvanshi, 2015 has proposed,"A Novel Collaborative Filtering Recommendation System Algorithm"– (IJETR)-October 2015
[2] Ahmed Mohammed K. Alsalama – "A Hybrid Recommendation System Based On Association Rules" –ISSR-2015
[3] Qi Wang, Wei Cao and Yun Liu– "A Novel Clustering Based Collaborative Filtering Recommendation System Algorithm " –Springer 2014
[4] Mohammad Hamidi Esfahani, Farid Khosh Alhan - "New Hybrid Recommendation System Based On C-Means Clustering Method " -IEEE-2013 5th conference of information Knowledge
[5] Hazem Hajj, Wassim El-Hajj, Lama Nachman – "A Hybrid Approach with Collaborative Filtering for Recommender Systems" –IEEE 2013.


Paper Type : Research Paper
Title : Computational Framework for Web Metrics towards Automated Web Design
Country : India
Authors : Meenakshi Sridhar || Nasib Singh Gill
: 10.9790/0661-1904072029     logo

Abstract: The discipline of engineering of software has evolved from software engineering to web engineering, and now to cloud engineering, the last of which develops required resources & environment for cloud computing. Apart from the technical characteristics of each, software engineering has been first product-oriented and then also process-oriented; web engineering has client-orientation and now cloud engineering is oriented toward open-endedness. Because of changes in the orientations and other concerns during the evolution, from time to time, the sets of web metrics required..............

Keywords: web design automation, web metrics flexible knowledge-base, web facets: science, social science, engineering etc.

1] Sridhar M. & Gill N.S. (2017), An Approach for Automating Design of Web, its Metrics & Knowledge-base, communicated
[2] Proceedings of the First International Workshop on Web Engineering, WWW7 Conference, Brisbane (1998).
http://fistsev.macarthur.uws.edu.au/san/WebE98
[3] Communications of the ACM, Special Section on Web-based Information Systems (1998), pp 78-97.
[4] San Murugesan and Yogesh Deshpande (1999) Proceedings of the First ICSE Workshop on Web Engineering, International Conference on Software Engineering, Los Angeles, May 1999. http://fistserv.macarthur.uws.edu.au/san/icse99-webe/
[5] San Murugesan Yogesh Deshpande (Eds.) (2001)Web Engineering: Managing Diversity and ComplexityOf Web Application Development, pp 3-32 & 245-322, Lecture Notes in Computer Science 2016 Springer


Paper Type : Research Paper
Title : Churn Prediction on Huge Telecom Data Using Hybrid Firefly-Particle Swarm Optimization Algorithm Based Classification
Country : India
Authors : Ammar A. Q. Ahmed || Maheswari D.
: 10.9790/0661-1904073039     logo

Abstract: Big data analytics brings in considerable value to decision making and provide more accurate and actionable insights into customer churn in telecom industry. As general meta-heuristics such as Particle Swarm Optimization (PSO) and Firefly Algorithm (FFA) are incapable of handling huge dataeffectively, Spark 2.0 on Hadoop architecture is employed. The parallelized nature of Spark &Hadoop will provide accurate and faster results. FFA and PSO were individually used to predict customer's behavior efficiently but it has issues with highly sparse dataalong with computational complexity and inaccuracy prediction results for the churn dataset. To overcome the above mentioned issues, in the proposed..............

Keywords: Churn prediction, Telecom, Meta-heuristics, Spark, Hadoop, PSO, FFA, HFFPSO

[1]. Y. Huang, B. Huang, and M. T. Kechadi, "A rule-based method for customer churn prediction in telecommunication services," in Advances in Knowledge Discovery and Data Mining, Springer, 2011, pp. 411–422.
[2]. Idris and A. Khan, "Customer churn prediction for telecommunication: Employing various various features selection techniques and tree based ensemble classifiers," in Multitopic Conference (INMIC), 2012 15th International, 2012, pp. 23–27.
[3]. M. Kaur, K. Singh, and N. Sharma, "Data Mining as a tool to Predict the Churn Behaviour among Indian bank customers," Int. J. Recent Innov. Trends Comput. Commun. vol. 1, no. 9, pp. 720–725, 2013.
[4]. V. L. Miguéis, D. Van den Poel, a. S.Camanho, and J. Falcão e Cunha, "Modeling partial customer churn: On the value of first product-category purchase sequences," Expert Syst. Appl., vol. 39, no. 12, pp. 11250–11256, Sep. 2012.
[5]. Coussement K. and D. V. Poel, "Churn prediction in subscription services: An application of support vector machines while comparing two parameter-selection techniques," Expert Syst. Appl., vol. 34, no. 1, pp .313–327, 2008


Paper Type : Research Paper
Title : A Framework for Machine Learning based Multi Agent System
Country : India
Authors : Archana Mangal || Iti Mathur
: 10.9790/0661-1904074045     logo

Abstract: Applications which can facilitate decision making are gaining importance. They can be found in domains like process control, air traffic control, inventory management, airline reservation etc. Developing applications for these domains have several flaws. First, they do not achieve the desired goal. Second, even if they do, their implementation and maintenance is very costly. Agent oriented system offers a qualitative change in this position. An agent learns from its environment, manipulates itself and coordinates with other agents in the system. Researchers have designed many agents but they were unable to solve complex dynamic applications of this kind...............

Keywords: Multi agent System, Machine learning, Decision tree, Support vector machine, Multi layer perceptron, Radial basis function.

[1]. Ketel, Mohammed. "A mobile agent based framework for web services." Proceedings of the 47th Annual Southeast Regional Conference. ACM, 2009.
[2]. Panait, Liviu, and Sean Luke. "Cooperative multi-agent learning: The state of the art." Autonomous agents and multi-agent systems 11.3 (2005): 387-434.
[3]. Claus, Caroline, and Craig Boutilier. "The dynamics of reinforcement learning in cooperative multiagent systems." AAAI/IAAI 1998 (1998): 746-752.
[4]. Sebastia, Laura, Adriana Giret, and Inma Garcia. "A multi agent architecture for tourism recommendation." Trends in Practical Applications of Agents and Multiagent Systems. Springer Berlin Heidelberg, 2010. 547-554.
[5]. Lenz, Mario. "IMTAS: Intelligent multimedia travel agent system." Information and Communication Technologies in Tourism. Springer Vienna, 1996. 11-17.


Paper Type : Research Paper
Title : A Noval Steganography Using Mapping Technique for Different Size Images without Cover File Transformation
Country : India
Authors : K.S.Sadasiva rao || Dr A.Damodaram
: 10.9790/0661-1904074651     logo

Abstract: Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the transmitted information. Steganography is the process of hiding data bits on cover or carrier file. In this paper, instead of embedding the data bits directly on carrier color image, original data bits will be mapped on the carrier file with key vectors. If the size of the source image and cover image is equal (x1 = x2 and y1 = y2) then the corresponding bits are compared in preparing mapping vectors. If the source image (with..............

Keywords: Cryptography, Steganography, Color Image steganography, LSB, mapping vectors, carrier file, different size images, Steganalysis

[1]. Niels Provos and Peter Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security & Privacy, 2003.
[2]. Niel F Johnson, Sushil Jajodia, Exploring Steganography: Seeing The Unseen, IEEE, 1998.
[3]. Tahir Ali, Amt Doegar, "A Novel Approach of LSB Based Steganography Using Parity Checker", IJARCSSE, Vol.5, Issue 1, January 2015, pp. 314-321.
[4]. Niel F Johnson, Sushil Jajodia, Exploring Steganography: Seeing The Unseen, IEEE, 1998
[5]. Wien Hong And Tung-Shou Chen, A Novel Data Embedding Method Using Adaptive Pixel Pair Matching, IEEE Transactions On Information Forensics And Security, Volume 7, No. 1, February 2012


Paper Type : Research Paper
Title : The popular uprising in Syria: Complexity of the problems
Country : India
Authors : Dr. Th. Siamkhum
: 10.9790/0661-1904075255     logo

Abstract: From the early 2010s, countries of Middle-East; Egypt, Libya and Syria witnessed popular uprising against the ruling dictatorial regime of their respective country. While in Egypt and Libya, the uprising eventually, dislodged the ruling dictatorial regime in their respective country, in Syria, however, the popular uprising has been dragging on for more than 6 years, and there is no end in sight as of now. Initially, in Syria, the popular protest movement was launched to demand democratic reforms, released of political prisoners, abolition of emergency laws and an end to rampant corruption in the country. Therefore, the protest movement, initially was not directed towards regime change. However, as................

[1] Syrian uprising: A year in turmoil at The Washington Post.

[2] "Syria collected news and commentary". The Guardian.

[3] Syria collected coverage at Al Jazeera English

[4] "Iraq conducts first airstrikes against ISIS in Syria". CNN. February 24, 2017. "Syria Army Advancing on Key Rebel Town, Supply Route". Theepochtimes.com. 4 March 2014. Archived from the original on 26 June 2015. Retrieved 20 March2014.

[5] "The Nusra Front's Game-Changing Rise in Syria". Carnegie Middle East Center. Retrieved 21 September2015.


Paper Type : Research Paper
Title : Computer Forensics for Private Web Browsing of UC Browser
Country : India
Authors : Rahul Neware
: 10.9790/0661-1904075660     logo

Abstract: Private Browsing modes provides the privacy where the surfing activity traces are not present but this Private Browsing is a great task for the Computer Forensics who want to recover the Browser history in the case of any misuse of the web browser. To recover that history the use of volatile memory forensics methodologies and the tools can be used to obtain the traces in main memory after PB(Private Browsing) session. To gain this artifacts left in the foremost reminiscence the proper memory framework will be beneficial for the investigators to successfully retrieve the reminiscence related with the past PB session History. The framework shown in flowchart below is used to overall procedure to collect and analyse the data related to personal browsing using UC Browser.

Keywords: Private Web Browsing, Web Browsers, Computer Forensics, Web Browser Artifacts, UC Browser

[1]. Aggarwal, G., Bursztein, E., Jackson, C., & Boneh, D. (2010). "Analysis of Private Browsing Modes in Modern Browsers". USENIX Security Symposium (pp. 79-94).
[2]. Al Barghouthy, N., Marrington, A., & Baggili, I. (2013). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.
[3]. Lerner, B. S., Elberty, L., Poole, N., & Krishnamurthi, S. (2013). Verifying web browser extensions' compliance with private-browsing mode. In Computer Security–ESORICS 2013 (pp. 57-74). Springer Berlin Heidelberg.
[4]. Marrington, A., Baggili, I., Al Ismail, T., & Al Kaf, A. (2012). Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers. In Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on (pp. 1-6). IEEE.
[5]. W3schools, (2016). Browser Statistics. [online] Available at: http://www.w3schools.com /browsers/browsers_stats.asp [Accessed 16 Jan. 2015].


Paper Type : Research Paper
Title : Optimizing the Performance of Wireless Rechargeable Sensor Networks
Country : India
Authors : A.H. Mohamed
: 10.9790/0661-1904076169     logo

Abstract: Nowadays, the Wireless Rechargeable Sensor Networks (WRSNs) have been concerned as a new trend to solve the energy problems and extendin the lifetime of wireless sensor networks. This technology is promising to replace the present methods. It enables multiple nodes to be charged simultaneously by wireless charging vehicle. This can improve the network lifetime. In this work, the proposed WRSN system introduces the uses of cluster-heads method to improve the power consumption and the lifetime of WSNs. Besides, it uses the genetic algorithm methodology to optimize the cluster-heads needed to be recharged and the routing (travel) path of the wireless mobile charger...........

Keywords: Wireless energy transfer, Wireless Re-chargeable Sensor networks, Genetic Algorithm (GA), Mobile Charger (MC), and Travel Path.

[1]. Z. Ren, P. Cheng, J. Chen, D. K. Y. Yau, and Y. Sun. Dynamic Activation Policies for Event Capture in Rechargeable Sensor Network. IEEE Transactions on Parallel and Distributed Systems, 25(12):3124 – 3134, Dec 2014.
[2]. A.Kurs, A.Karalis, M.Robert, J.D.Joannopoulos, P.Fisher, and M.Soljacic, "Wireless power transfer via strongly coupled magnetic resonances ", Science, vol.317, pp.83-86, 2007.
[3]. H. Dai, Y. Liu, G. Chen, X. Wu, and T. He, "Safe charging for wireless power transfer," in Proc. IEEE INFOCOM, 2014.
[4]. C. Wang, J. Li, F. Ye, and Y. Yang, "Improve charging capability for wireless rechargeable sensor networks using resonant repeaters," in Proc. IEEE ICDCS, 2015.
[5]. B. Tong, Z. Li, G. Wang, and W. Zhang, "How wireless power charging technology affects sensor network deployment and routing," in Proc. 30th International Conference on Distributed Computing Systems, 2016, pp. 438-447.


Paper Type : Research Paper
Title : Civil War in Syria: Who fight who, for whom and for what
Country : India
Authors : Dr Th.Siamkhum Th Siamkhum
: 10.9790/0661-1904077075     logo

Abstract: Civil war in Syria, as is popularly called, has now been dragging on for more than 6 years with no end in-sight. Initially, it was a popular movement having certain limited aims more democratic reforms, releases of political prisoners and an end to rampart corruption in the country; and that regime change was not included in the agenda. The popular uprising was launched by the combined opposition groups, and was initially unarmed popular movement for restoration of democracy in Syria. However, the government, with the aim to crush the uprising, adopted repressive measures with iron hand, which instead

[1] Human Rights Watch World Report 2005 Events of 2004, Human Rights Watch 2005. ISBN 1-56432-331-5.
[2] Deadly Reprisals: deliberate killings and other abuses by Syria's armed forces" (PDF). Amnesty International. June 2012. Archived from the original (PDF) on 16 June 2012. Retrieved 25 June 2012.
[3] Syria crisis 'worsening' amid humanitarian funding shortfall, warns top UN relief official". UN News Centre. 26 March 2015. Retrieved 28 July 2015.
[4] United Nations General Assembly Resolution 182 session 46 Strengthening of the coordination of humanitarian emergency assistance of the United Nations on 19 December 1991.
[5] United Nations, Syria Humanitarian Assistance Response Plan (SHARP). Retrieved 18 September 2013.


Paper Type : Research Paper
Title : Development of a System for Salary Calculation for State Establishments in Republic Of Iraq
Country : Iraq
Authors : Muneer Sameer Gheni Mansoor || Baydaa Jaffar Al-Khafaji || Mohammed Qasim Dhahir || Hasanien Kariem Abed Kuba || Ammar Ismael Kadhim
: 10.9790/0661-1904077678     logo

Abstract: Human progress is going through the teamwork, especially in terms of implementation and business development. However, in order to provide the cooperation between members of the team, there must be a guarantee of the rights of everybody in the process of work. In a private case, it is important to show the monthly salary for each employee of a company. The goal of the research is the development of a system for salary calculation for state establishments in Republic of Iraq. Thus, the institutions and organizations have a composed structure. If they have branches in different cities far between each other, they will need methods of communication between those branches (departments)...............

[1]. Bell D. IBM developerWorks. [Electronic Resource] URL: http://www.ibm.com/developerworks/rational/library/769.html (the date of access: 05.02.2015).
[2]. Bjoremo M. Evaluation of web applications frameworks with regards to rapid development. – Sweden: Chalmers University of Technology, University of Gothenburg, 2010. – 41 p.
[3]. Blanco J.A., Upton D. CodeIgniter 1.7. – UK: Packt Publishing Ltd, 2009. – 300 p.
[4]. Delisle M. Creating your MySQL Database: Practical Design Tips and Techniques. – UK: Packt Publishing Ltd, 2006. – 105 p.
[5]. Gerrard P. A unified approach to system functional testing. // EuroSTAR, 25–28 October, 1993. – P. 36/1-36/9..


Researcher can also search IOSR published article contents through

IOSR Xplore