IOSR Journal of Computer Engineering (IOSR-JCE)

Sep.- Oct. 2017 Volume 19 - Issue 5

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Data Analysis Using Apriori Algorithm
Country : India
Authors : Nikita Chandekar || Priyanka Ashtikar || Rahul Motghare
: 10.9790/0661-1905040104     logo

Abstract: Development of several case projects throughoffering a graduate level course on Data Mining. It then outlines a particular case project that describes the process of data extracting, data cleansing, data transfer, data warehouse design, and development. It also outlines the development of a data cube as well as application to understand business intelligence. The results can be beneficial to an instructor who wants to develop a practical course or a practitioner venturing into the data warehousing and data mining area. Apriori algorithm has been improved and applied to the substation data mining process. Ant colony algorithm is applied to get the optimal solution of reactive power allocation in substations. The state transition probability formula is amended and parameters are dynamically adjusted in this ant colony algorithm. The choice of the ant's path to the next node is determined by the table formulated according to the confidence level of the data mining. The switching strategy of the capacitor sets is given by algorithm.

Keywords: apriori, warehousing, datamining, OLAP, pattern evaluation, business intelligence (BI).

[1]. WierschemD.Mc.Millen.J. And McBroom, R., (2003),
[2]. "What Academia Can Gain from Building a Data Warehouse," Educes Quarterly, Number 1, pp. 41-46.
[3]. Fang, R. and Tuladhar, S. "Teaching Data Warehousing and Data Mining in a Graduate Program in Information Technology, "Journal of Computing Sciences in Colleges, Vol.21, Issue 5, pp. 137-144.
[4]. Pierce, E. M., "Developing and Delivering a Data Warehousing and Data Mining Course," Communications of the AIS, Vol. 2, Article 16, pp. 1-22.
[5]. Slazinski, E. D., "Teaching Data Warehousing to Undergraduates – Tales from the Warehouse Floor," CITC'03.


Paper Type : Research Paper
Title : Evaluation of Proactive Routing Protocol of Mobile AD HOC Networks
Country : India
Authors : Sonia Arora || Rohit Sharma
: 10.9790/0661-1905040509     logo

Abstract: An Adhoc mobile network is an accumulation of mobile nodes that are energetically and arbitrarily situated such that the interconnections flanked by nodes are equipped for changing on a persistent premise. The main goal of such a specially appointed network routing protocol is honest and efficient course foundation between a pair of nodes so that communication might be conveyed in an opportune way. In this paper we examine routing protocols for adhocnetworks and evaluate these protocols in view of a given arrangement of parameters Multipath routing speaks to a promising routing technique for wireless mobile Adhocnetworks. Multipath routing accomplishes load balancing and is stronger to route failures. As of late, various multipath routing protocols have been proposed...............

Keywords: Proactive, Routing, Protocol, Mobile, Ad Hoc Networks,communication, Multi-path routing, wireless, bandwidth, consumption.

[1]. Ron Banner, and Ariel Orda, "Multipath routing Algorithms for Congestion Minimization", IEEE/ACM Trans. On Networking, vol. 15, n. 2, pp. 413-424, 2007.

[2]. D. Johnson, and D. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, , pp. 153-181, 2010.

[3]. C. Perkins, and E.M. Royer, "Ad-Hoc On Demand Distance Vector Routing", in Proc. of IEEE Workshop Mobile Computing Systems and Application, pp. 90-100, 2012.

[4]. S.J. Lee, and M. Gerla, "AODV-BR: Backup Routing in Ad Hoc Wireless Networks", in Proc. of IEEE Wireless Comm. and Networking Conf., pp. 1311- 1316, 2012.

[5]. S.J. Lee, and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks", in Proc. of ICC, 2011..


Paper Type : Research Paper
Title : Analysis on AD HOC Networks for Multipath Routing
Country : India
Authors : Rohit Sharma || Sonia Arora
: 10.9790/0661-1905041015     logo

Abstract: Multipath routing accomplishes load balancing and is stronger to route failures. As of late, various multipath routing protocols have been proposed for wireless mobile Adhoc networks. Execution assessments of these conventions demonstrated that they accomplish lower routing overhead, bring down end-to-end defer and reduce clog in correlation with single path routing protocols. Be that as it may, a quantitative examination ofmulti-path routingprotocols has not yet been led. The proliferation thinks about demonstrates that the AOMDV protocol achieves best execution in high mobility situations, while AODV Multipath performs better in situations with low mobility and higher node thickness. SMR performs best in networks with low node thickness, however as thickness builds, the protocol's performance is corrupting. Routing protocols assume an essential part for communications in MANET. The greater part.........

Keywords: Ad Hoc Networks, Multipath Routing, load balancing, wireless mobile ad hoc networks Performance, evaluations, protocols

[1]. Liu, J., Chen, J. and Y. Kuo, 2009. Multipath routing protocol for networks lifetime maximization in ad-hoc networks. Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, Sept. 24-26, IEEE Xplore Press, Beijing, pp: 1-4. DOI: 10.1109/WICOM.2009.5305828
[2]. Yoo, D., G. Jin, B. Jang, L.T. Tuan and S. Ro, 2011. A modified AOMDV routing protocol for maritime inter-ship communication. Proceedings of the International Conference on ICT Convergence, Sept. 28-30, IEEE Xplore Press, Seoul, pp: 605-607. DOI: 10.1109/ICTC.2011.6082694
[3]. Tamilarasan, S.M. and K. Eswariah, 2012. Energy aware and delay based ad hoc on-demand multipath distance vector routing in MANETs. Eur. J. Sci. Res., 85: 452-459.
[4]. SenthilMuruganTamilarasan and KannanEswariah "Link stability with energy awaread hoc on demand multipath routing protocol in mobile ad hoc networks" ISSN: 1546-9239 – 2013.
[5]. C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., Feb. 2012, pp. 90–100


Paper Type : Research Paper
Title : A Survey on Techniques And Its Applications of Text Mining
Country : India
Authors : Swathi Agarwal || G.L.Anand Babu || G.Sekhar Reddy
: 10.9790/0661-1905041619     logo

Abstract: Text mining is a procedure that utilizes an arrangement of algorithms for changing over unstructured content into organized data items and the quantitative techniques used to break down these data items. The principal target of Text mining is to empower clients to separate information from text based resources and deals with the operations like recovery, extraction, rundown, order (directed) and grouping (unsupervised). Keeping in mind the end goal to locate a productive and compelling system for text classification, different methods of text categorization is recently developed. Some of them are regulated and some of them unsupervised way of report course of action. In this paper, focus is text mining process, diverse technique for text classification, group examination for content reports and its applications.

Keywords: Clustering, Information Extraction, Information Retrieval, Natural Language Processing, Natural Language Text, Query Processing, Text mining.

[1]. Shilpa Dang, Peerzada Hamid Ahmad, "Text Mining: Techniques and its Application", International Journal of Engineering & Technology Innovations, ISSN (Online): 2348-0866, Volume 1, Issue 4, pp. 22-25, 2014. [2]. Swathi Agarwal, G. L. Anand Babu, Dr. K. S. Reddy, ―Classification Techniques in Data Mining-Case Study‖, International Organization of Scientific Research, Volume 18, Issue 6, 2016.
[3]. Shah Neha K, "Introduction of Text mines and an Analysis of Text mining Techniques", PARIPEX, ISSN: 2250-1991, Volume 2, Issue-2, 2013.
[4]. T. Nasukawa, T. Nagano, ―Text analysis and knowledge mining system‖, IBM Systems Journal, 2001, Volume: 40, Issue: 4, Pages: 967


Paper Type : Research Paper
Title : Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks
Country : India
Authors : P Ravinder || S.Laxman Kumar || P.Sunil Kumar || B.Jaya Vijaya
: 10.9790/0661-1905042023     logo

Abstract: Security is very important and significant issue for transmission of information in WSNs. DNA-Cryptography plays a very vital role in the areas of communications and data transmission. In DNA cryptography, biological DNA concept can be used not only to store data and information carrier, but also to perform computations. This paper is based on computation security using DNA cryptography. An algorithm is proposed that uses DNA cryptography with secure socket layer (SSL) for providing a secure channel with more secure exchange of information in wireless sensor networks

Keywords: DNA cryptography; Secure Socket Layer (SSL); Wireless sensor networks; Encryption; Decryption.

[1]. Neuman BC, Tso T. Kerberos: an authentication service for computer networks. Communications Magazine, IEEE 1994; 32(9): 33–38.
[2]. Diffie W, Hellman ME. New directions in cryptography. Information Theory, IEEE Transactions on 1976; 22: 644–654.
[3]. Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978; 21(2): 120–126.
[4]. Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD. Spins: Security protocols for sensor networks. Proceedings of the 7th annual international conference on Mobile computing and networking 2001. p. 189–199.
[5]. Du W, Deng J, Han YS, Chen S, Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.


Paper Type : Research Paper
Title : An Easy Paging Operation for Reading Three Dimensional Virtual Book via Leap Motion
Country : Japan
Authors : Seiji Sugiyama || Atsushi Ikuta || Miyuki Shibata || Satoshi Hiratsuka
: 10.9790/0661-1905042435     logo

Abstract: This paper proposes a new easy paging operation that is a kind of improved swipe motion to be able to tie plural pages together for reading a 3D virtual book by applying augmented reality technology. Our previous system could display a virtual book by using 3DCG and could capture human hand motions via Leap Motion that is a very small and reasonable contact-less sensor, and it could make users the operational feeling such as a paper book on a PC, for the first time. However, this system had a problem that it is difficult for many users to learn the paging operations because the recognition accuracy of the Leap Motion is not enough to distinguish each fingers correctly, and then, it requires very complex hands and/or fingers form to control the 3D virtual book. To cope with the difficulty, the new function..........

Keywords: E-book, Augmented reality, contact-less motion sensor, 3DCG, WebGL, THREE.js

[1]. Ryota Kobayashi and Atsushi Ikeuchi, Effects of Text Understanding and Memory by Types of Display Media: Comparison between E-book Readers and Papers, Proceedings of Information Processing Society of Japan Technical Report, Vol. 2012-HCI-147, No.29, pp. 1-7, 2012 (In Japanese)
[2]. Kentaro Takano, Kengo Omura and Hirohito Shibata, Comparison between paper books and electronic books in reading short stories, Proceedings of Information Processing Society of Japan Technical Report, Vol. 2011-HCI-141, No.4, pp. 1-8, 2011 (In Japanese)
[3]. J.M. Noyes and K.J. Garland, Computer- vs. paper-based tasks: Are they equivalent?, Ergonomics, Vol. 51, No. 9, pp. 1352-1375, 2008
[4]. S. Sugiyama, M. Shibata, A. Ikuta, S. Saito and S. Miyashita, A Study of Displaying Electronic Text with Seamless Pages --Magnifying And Simplifying System for Text EXTension (MaSSTExt)--, International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), ISSN: 2150--7988, Vol. 2, pp. 137--145, 2010
[5]. S. Sugiyama, A. Ikuta and M. Shibata, A Basic Concept of Displaying Electronic Text with Seamless Pages: Wheel Action for Reeling Paragraphs (WaRP) in the MaSSTExt, International Conference on Computer Information Systems and Industrial Management Applications (CISIM2010), pp. 222-227, 2010


Paper Type : Research Paper
Title : Design and Implementation of Application for Mobile Accessibility of Hearing-Impaired Persons
Country : Korea
Authors : Eunju Park || ChulwooKim || Hankyu Lim
: 10.9790/0661-1905043645     logo

Abstract: Thanks to the convenience of the mobility and portability of mobile device, the paradigm of ICT has been changed leading to the shift from the era of PC to the era of mobiles. Most people use mobile devices and diverse services provided by mobile devices are used not only for business but also for convenience of life. Therefore, the development of applications that support accessibility so that everybody can use the services provided by mobiles is important. In this respect, in the present study, the actual conditions of use of mobiles by hearing-impaired persons that have been a little away from the targets of interest for accessibility were investigated, the elements of development of applications to support hearing-impaired persons' accessibility were examined, and an application was designed and implemented based on the results of the foregoing. The application implemented..........

Keywords: Web Accessibility, Mobile Accessibility, HCI, UI Design, Evaluation of Accessibility, Universal Design

[1] HeesunKim,"Usability Improvement Method of Shopping Mall based on Smartphone,"Journal of Korea Contents Association, 11(10), 2011, 77-84.
[2] KS. Hong, and H. K. Min, "The Improvement of Smart Devices Apps Accessibility for Student with Disabilities,"Journal of Rehabilitation Welfare Engineering & Assistive Technology, 8(2), 2014, 125-131.
[3] DMC REPORT, "2017 Smartphone app use behavior," Digieco Issue & Trend, Republic of Korea, 2017.
[4] Eun-Ju Park, Yang-Won Lim and Han-Kyu Lim, "A Study on mobile accessibility to mobile web site,"Proceeding of Korean Institute of Information Scientists and Engineering,2013(11), 2013, 426-428.
[5] Hyunju MoonandSukil Kim, "A Study on the Amendment of the Mobile Application Accessibility Guideline based on User Evaluation," Journal of Rehabilitation Research, 18(2), 2014, 181-205.


Paper Type : Research Paper
Title : New programming framework for Wireless sensor network
Country : Morocco
Authors : FIHRI Mohammed || EZZATI Abdellah
: 10.9790/0661-1905044650     logo

Abstract: Wireless sensor networking is an innovating area. Where we use specific equipment in order to measure small rated data, which often have a major importance to the user such as temperature or input output state and share it wirelessly. In this paper we will try to make WSN simple to use by common developers that not necessary have the WSN networking knowledge; by creating a new programming framework that is specially created for Linux based operating systems. The use of wireless sensor network involves the use of a routing protocol, security mechanism, application communication layer… How we can provide those solutions and there applications without many coding and in easy way? It's the role of our new programming framework that will be describe in this paper, it.s concept of external calling system depending on the functionality, and its architecture. Finally we present the conformity of our framework with the SCADA System.

Keywords: Framework, WSN, Programming

[1] CARVALLO, A. AND COOPER, J. THE ADVANCED SMART GRID. BOSTON: ARTECH HOUSE, 2015. PRINT.
[2] THOMAS, M. AND MCDONALD, J. POWER SYSTEM SCADA AND SMART GRIDS. CRC PRESS, 2015.PRINT
[3] MCCRADY, S. DESIGNING SCADA APPLICATION SOFTWARE: A PRACTICAL APPROACH. ELSEVIER, 2013. PRINT.
[4] Z. ZHAO, G.-H. YANG, Q. LIU, V.O.K. LI AND L. CUI. IMPLEMENTATION AND APPLICATION OF A MULTI-RADIO WIRELESS SENSOR NETWORKS TESTBED. WIRELESS SENSOR SYSTEMS, IET, VOL. 1, NO. 4, PAGES 191–199, 2011. 28
[5] G. BARRENETXEA, F. INGELREST, G. SCHAEFER, AND M. VETTERLI, ―SENSORSCOPE: OUT-OF-THE-BOX ENVIRONMENTAL MONITORING,‖ IN ACM/IEEE IPSN , 2008 BAYDERE, S.,SAFKAN, Y., AND DURMAZ, O. 2005.


Paper Type : Research Paper
Title : Computer Programming Applied to Operations Research
Country : Saudi Arabia
Authors : Mobin Ahmad
: 10.9790/0661-1905045155     logo

Abstract: Operation research is the portrayal of real-worldsystems by mathematical models together with the utilization of quantitative methods algorithms) for comprehending such models, with a view to advancing. As we probably are aware, C++ Computer Programming language is a center level dialect and a computer program with this language is executed speedier than application software's of the operation research zone. In this paper, a straightforward layout program with basic C++ Computer Programming directions is displayed for reproducing many sorts of optimization problems. This layout is anything but difficult to learn and comprehend for any individual who works in the operation research territory. They can rapidly and effectively recreate many sorts of optimization problems with this template..

Keywords: Computer, Programming, Operations Research, mathematical models, algorithms, program.

[1]. M. Galati, "Introduction to Operation Research", pp.5, Available: http://coral.ie.lehigh.edu/~maghpresent/stetson01.pdf
[2]. Y.liker, Topcu, "Operations Research", pp.6, Available: http://pdfebooks.org/pdf/41997/OPERATIONS-RESEARCH-LECTURENOTES-pdf.pdf
[3]. F.S. Hillier, G.J. Lieberman, "Introduction to Operation Research", 9nd Ed. New York: McGraw-Hill, 2010, pp.30-60.
[4]. M. Moddares, A. Asefvaziri, "Operation Research, Mathematical Programming", 3rd Ed. Tehran :Javan Pub, 2007, pp.184-240.
[5]. M. Razavi, "An Introduction to Operation Research", First Ed. Tehran: Iran Industrial Research and Education Center Pub, 2006, pp.256-258..


Paper Type : Research Paper
Title : Comparative Study on Encryption Techniques for H.264/AVC Videos
Country : India
Authors : Fatma K Tabash || M. Izharuddin
: 10.9790/0661-1905045660     logo

Abstract: H.264/AVC is one of the most popular video encoding standards that is widely used for many real time applications. Encryption process is the effective method used to protect videos from the illegal use. Encryption techniques in H.264/AVC videos depends on which stage through the coding process is applied. For instance, Encryption techniques can be applied before the compression process, through the compression process or after the compression process. Through the compression process, the encryption techniques can be applied through prediction process, preparation of motion vectors, transformation process, entropy coding process or etc. Each type of these encryption techniques has its advantages and disadvantages. Thus, this paper compares between the different types of encryption techniques for H.264/AVC that are applied into different stages of encoding process.

[1] P. Carrillo, H. Kalva, and S. Magliveras, "Compression independent object encryption for ensuring privacy in video surveillance," in Proc. ICME, Jun. 2008, pp. 273–276.
[2] Dufaux and T. Ebrahimi, "H.264/AVC video scrambling for privacy protection," in Proc. IEEE ICIP, Oct. 2008, pp. 1688–1691.
[3] F. Dufaux and T. Ebrahimi, "Scrambling for privacy protection in video surveillance systems," IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 8, pp. 1168–1174, Aug. 2008.
[4] Ahn J, Shim H, Jeon B, Choi I (2004) Digital video scrambling method using intra prediction mode. PCM2004, Springer, LNCS 3333, pp 386–393 (November).
[5] S. Lian, J. Sun, G. Liu, and Z. Wang, "Efficient video encryption scheme based on advanced video coding," Multimedia Tools Applicat., vol. 38, no. 1, pp. 75–89, Mar. 2008.


Paper Type : Research Paper
Title : The study of computational fuzzy extractor for providing security to IOT nodes
Country : India
Authors : Prof. Pragati .Mahale || Ms. Sonali Alwani || Ms. Vaishnavi Borade || Ms. Shreya.Dhanbar || Ms. Pooja Suvarnakhandi
: 10.9790/0661-1905046165     logo

Abstract: With the increase in the usage over the internet over the globe ,the security regarding the confidentiality of the data that is being transferred and received while Internet is being used is the area of major concern. In the recent years, the increase in the use and development in IoT has made it necessary to facilitate keys storage that is cost efficient. The traditional methods that were used before ,proved to be expensive for key storage. An alternative solution for cost minimization, keys were being generated using the noisy entropy. The keys could be secured and made cost efficient when bounded with fuzzy extractor which also made the keys strong cryptographically. To balance the entropy loss at the time of key extraction process, the theoretical fuzzy extractors needed a enormous...........

Keywords: IoT (internet of things),CFE(computational Fuzzy Extractor),PUF(Physical Unclonable Function),LWE(Learning with Errors),TRG(True Random Generator) Introduction.

[1] A.Blum, A. (2003). "Noise-tolerant learning the parity problem and the statistical qyery model". ACM(JACM) , 50, 506-519.
[2] A.Van Herrewege, S.-R. (2012). "Reverse fuzzy Extractor:Enabling lightweight mutual authentication for puf-enabled rfids ". Springer , 374-389.
[3] B.Fuller, X. (2013). "Computaional Fuzzy Extractors". Springer , 174- 193.
[4] D.Bandyopadhyay, J. (2011). "Internet of things:Application and challenges in Technology and Standardization". Springer , 58, 49-69.
[5] D.Kristinsson. (2011). "Ardrand:The arduino as a hardware random- number generator"..


Paper Type : Research Paper
Title : A Study of Two Different Attacks to IPv6 Network
Country : India
Authors : Ayman M. A. Shabour || M.A. Elshaikh
: 10.9790/0661-1905046670     logo

Abstract: In the lights of today and future advancing technologies, the demand of IPv6 internet protocol, had becomes crucial for its usages & benefits. This paper investigates the use of information messages to build a visual perception and follow-up of IPv6-based cyber-attacks on IPv6 networks IPv6 , (DOS)& ARP poisoning , Packet analyzer( wireshark ) and open source tools( virtualbox, Linux kali system, Ubuntu Linux server ) are used ,to verify the existence of attacks on IPV6. The experimental results ,proved that the traces of simulated attacks extend form the link layer to the application layer.

Keywords: Internet Protocol version 6(IPv6), Internet Protocol version 4(IPv4) Transfer Control Protocol(TCP), Address Resolution Protocol(ARP), Denial of Service(DOS), Internet Control Message Protocol version6 (ICMPv6)..

[1] ICANN. Available Pool of Unallocated IPv4 Interne Addresses .Internet : https://www.icann.org/en/system/files/press-materials/release-03feb11-en.pdf .February.3,2011 accessed [May.10,2017]
[2] UK ESSAYS . Ipv4 Internet Protocol Security Features Computer Science Essay. Internet : https://www.ukessays.com/essays/computer-science/ipv4-internet-protocol-security-features-computer-science-essay.php#ftn1. March.23,2015 accessed [May.10,2017]

[3] [RFC 4861] Narten, T., Nordmark, E., Simpson, W., Soliman,H. "Neighbor Discovery for IP version 6 (IPv6)". September 2007.Available : https://tools.ietf.org/html/rfc4861 .accessed [June .16,2017]
[4] [RFC 5175] B.Haberman,R .Hinden "IPv6 Router Advertisement Flags Option" March 2008 Available : https://tools.ietf.org/html/rfc5175 . accessed [June .16,2017] https://www.virtualbox.org/ accessed March.20, 2017
[5] Wireshark User's Guide :for Wireshark 1.7 by Ulf Lamping,Richard Sharpe,Ed.Warnicke Copyright © 2004-2011; Source: https://www.wireshark.org/about.html accessed March.20, 2017..


Paper Type : Research Paper
Title : Speech Recognition Systems: A Comparative Review
Country : India
Authors : Rami Matarneh || Svitlana Maksymova || Vyacheslav V. Lyashenko || Nataliya V. Belova
: 10.9790/0661-1905047179     logo

Abstract: Creating voice control for robots is very important and difficult task. Therefore, we consider different systems of speech recognition. We divided them into two main classes: (1) open-source and (2) close-source code. As close-source software the following were selected: Dragon Mobile SDK, Google Speech Recognition API, Siri, Yandex SpeechKit and Microsoft Speech API. While the following were selected as open-source software: CMU Sphinx, Kaldi, Julius, HTK, iAtros, RWTH ASR and Simon. The comparison mainly based on accuracy, API, performance, speed in real-time, response time and compatibility. the variety of comparison axes allow us to make detailed description of the differences and similarities, which in turn enabled us to adopt a careful decision to choose the appropriate system depending on our need.

Keywords: Robot, Speech recognition, Voice systems with closed source code, Voice systems with open source code.

[1] Caute, A., & Woolf, C. (2016). Using voice recognition software to improve communicative writing and social participation in an individual with severe acquired dysgraphia: An experimental single-case therapy study. Aphasiology, 30(2-3), 245-268.
[2] Godwin-Jones, R. (2011). Mobile apps for language learning. Language Learning & Technology, 15(2), 2-11.
[3] Duarte, T., Prikladnicki, R., Calefato, F., & Lanubile, F. (2014). Speech recognition for voice-based machine translation. IEEE software, 31(1), 26-31.
[4] Ciobanu, D. (2014). Of Dragons and Speech Recognition Wizards and Apprentices. Tradumàtica, (12), 0524-538.
[5] Kumar, K., Aggarwal, R. K., & Jain, A. (2012). A Hindi speech recognition system for connected words using HTK. International Journal of Computational Systems Engineering, 1(1), 25-32...



Researcher can also search IOSR published article contents through

IOSR Xplore