IOSR Journal of Computer Engineering (IOSR-JCE)

Nov.- Dec. 2017 Volume 19 - Issue 6

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : Web Search Optimization Using Semantic Web
Country : India
Authors : Shaifali Nagar || Prof (Dr.) Mohit Gangwar
: 10.9790/0661-1906020106     logo

Abstract: An IT has developing in to the mature phase, this do not expect this state should continue. Something has to be done to certify that this can learn from other people by taking as much information or knowledgably data as this can and make it meaningful. Due to presence of vast amount of resources on the Web thus poses a serious problem of precise search. This is mainly because today's WORLD WIDE WEB (WWW) is a human-readable Web, where information data cannot be easily managed by machine. Highly cultured, efficient keyword based search engines that have grew today have not been able to bridge this breach. Ontology describes a set of representational primitives with which a field of knowledge is demonstrated. In our proposed algorithm Web Search Optimizing on Cloud Host base Semantic.........

Keywords: sole documents, intellectual information data, knowledge supervision, detecting replicate, organization, electronic commerce base data, replication, search engine, sole URL's, web page, Ontology, Semantic Web.

[1] Maier, R., Hadrich, T., Peinl, R.: Enterprise Knowledge Infrastructures, 2nd edn. Springer, Berlin (2009)
[2] Edward H.Y. Lim, Hillman W.K. Tam, Sandy W.K. Wong, James N. K. Liu and Raymond S. T. Lee,Collaborative Content and User-based Web Ontology Learning System, IEEE, 2009, Pg 1050-1055

[3] Awny Sayed, Amal Al Muqrishi, "IBRI-CASONTO: Ontology-based semantic search engine",Egyptian Informatics Journal, Elsevier, 2017.
[4] P. Hema Priya, R. RangaRaj, "An Improved Search Engine by Semantic Web Using Ontology", International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Volume 2 Issue 12, December 2013, World Wide Web (WWW)
[5] Noryusliza Abdullah and Rosziati Ibrahim, "Semantic Web Search Engine Using Ontology, Clustering and Personalization Techniques" , B. Murgante et al. (Eds.): ICCSA 2012, Part IV, LNCS 7336, pp. 364–378, 2012, © Springer-Verlag Berlin Heidelberg 2012.

Paper Type : Research Paper
Title : Formulating a Simple Theoretical Framework for Data Flow in SCADA System
Country : Nigeria
Authors : Alade A. A || Ajayi O. B || Okolie S. O. || Alao D. O.
: 10.9790/0661-1906020712     logo

Abstract: Studies in Supervisory Control and Data Acquisition (SCADA) System revolves around SCADA System security due to the impact of attacks on the critical infrastructure such as national electricity network, complex oil/gas network, power station, etc. which SCADA System is expected to control and manage. However, in the paper, attention is directed towards "formulation of theoretical framework for SCADA System". This brings to light the basic understanding of the protocol transmission procedures and rules in SCADA System that set it apart from other industrial Control System (ICS). As a consequence of SCADA System unbalanced transmission in which only the master station...........

Keywords: attacks, state machine, graphical, protocol, master, slaves, topology

[1] Q. FU, J. Chen and Z. KIU, Implementation of Telecontrol Protocols in SCADA systems based on FSM, Proceedings of the 8th International Power Engineering Conference, China, 2007.

[2] G. Clarke and D. Reynders, Practical modern scada protocols: DNP3, 60870.5 and related systems ( Burlington, MA: Newnes, Elsevier, 2004).

[3] H. Gao and W. Tong, Analysis and evaluation of fieldbus communication and protocol static characteristic, Association for Computing Machinery 978-1-60558-088-3, 2008.

[4] S.H. Hong, Bandwidth allocation scheme for cyclic-service fieldbus networks, IEEE/ASME Transactions on Mechatronics, 6(2), 2001, 197-204.
[5] H. Hans-Petter, Modbus Overview, 2013. Available at /modbus/Modbus%20Overview.pdf..

Paper Type : Research Paper
Title : A Signal processing approach to Music tutorm
Country : Bangladesh
Authors : Md. Tareq Hasan || AmathulHadi Shakara
: 10.9790/0661-1906021325     logo

Abstract: Computer science plays a vital role providing us different kinds of software and the facility to learn singing accurately and smartly. This paper is to provide a singing tutor which will compare the learner song with the tutor song and provide the result of accuracy in the learner song. So any one sitting in his/her own room with a laptop or desktop computer can learn singing and judge the accuracy of the song. Firstly, to detect voiced and unvoiced part of the song, linear model is used here. Apply EMD (Empirical mode decomposition) to obtain IMFs. From the first IMF which captures most of the noise, estimate the noise level in the noisy signal and "noise only" model from the confidence..........


[1]. M. Honda, NTT CS Laboratories, Speech synthesis technology based on speech production mechanism, How to observe and mimic speech production by human, Journal of the Acoustical Society of Japan, Vol.55, No. 11, pp. 777-782, 1999 (in Japanese).
[2]. Appelman, Dudley Ralph (1986). The science of vocal pedagogy: theory and application. Bloomington, Indiana: Indiana University Press. pp. 434.ISBN 0253351103.OCLC13083085
[3]. McKinney, James C (1994). The diagnosis and correction of vocal faults. Nashville, Tennessee: Genovex Music Group. pp. 213.ISBN 1565939409.OCLC30786430
[4]. "Singing".Britannica Online Encyclopedia.
[5]. Vennard, William (1967). Singing: the mechanism and the technic. New York: Carl Fischer. ISBN 978-0825800559. OCLC248006248..

Paper Type : Research Paper
Title : A Novel Design Based Internet of Things to Counter Lone Wolves Threat – Application for Intelligent Transportation Systems
Country : India
Authors : Dr G Vijay Kumar || Y Anjani
: 10.9790/0661-1906022630     logo

Abstract: This paper proposes a new design methodology for Intelligent Transportation Systems, which uses existing smart techniques in transportation systems and human behavior detections to counter lone wolf threats and driver violations. The design can be attached to vehicles as an intelligent embedded system. In this design, the electroencephalogram analysis techniques are used to detect the irregularity in driver behavior which can be categorized into threatened or violated behavior. In threaten behavior like deliberate run-over accidents, the system will stop the vehicle as soon as possible and inform the security agency to ensure a speed response.To minimize the consequences of the vehicle fast stopping, it proposed to green the next traffic light signs. By applying this system in vehicles a lot of accidents can be avoided, in particular those caused by lonely wolves like deliberate run-over accidents or stolen of vehicles.

Keywords: Intelligent Transportation Systems, Internet of Things, Deliberate Run-Over Accidents, Berlin Attack, Lone Wolves Threats.

[1] J. Besenyo, "Low-cost attacks, unnoticeable plots? – overview on the economical character of current terrorism," Strategic Impact, vol. 1/62, pp. 83-100, 2017.
[2] L. Kaati, A. Shrestha, and T. Sardella, "Identifying warning behaviors of violent lone offenders in written communication," Proceedings of the 2nd International Workshop on Data Science for Social Media and Risk, Barcelona, Spain, December 2016.

[3] T. Houston, "Mass surveillance and terrorism: does PRISM keep americans safer?," Thesis Projects, University of Tennessee Honors, 2017.
[4] Hassan F. Morsi, M. I. Youssef, and G. F. Sultan, "Novel design based internet of things to counter lone wolf, part a: Nice attack," Proceedings of the 3rd International Conference on Advanced Intelligent Systems and Informatics, September 2017, Cairo: Advances in Intelligent Systems and Computing, Springer, in press.
[5] Wikipedia: Berlin attack, Accessed 5 June 2017.

Paper Type : Research Paper
Title : An Approach to Design a Topic Nature Based Courseware through the Criteria of E-learning
Country : Bangladesh
Authors : K.M. Aslam Uddin
: 10.9790/0661-1906023136     logo

Abstract: E-learning plays a great role in our learning environment especially in distance learning. It is an innovative approach for delivering electronically mediated, well designed, learner-centered and interactive learning environments for anyone, anywhere, anytime through internet and other telecommunication association digital technologies with instructional design principles. So far courseware we have seen online, are based on only course name and enriched with some video, audio, lecture or ppt. Among all courseware, which we have found, MIT courseware is one of the best than all other online courseware. But it is also not enriched with topic nature based course materials (TNBCM)...........

Keywords: TNBCM, CBT, E-learning, Animated video, Distance learning.

[1]. Richard, H., & Haya, A, Examining student decision to adopt web 2.0 technologies: theory and empirical tests. Journal of computing in higher education, 21(3), 183-198, 2009.
[2]. Rosenberg M. E-Learning: Strategies for Delivering Knowledge in the Digital Age. New York: McGraw-Hill, 2001.
[3]. Masie, Elliot, The Business of Online & eLearning Conference, Seattle, Washington, Jan. 2000.
[4]. M. Y. Wang, "The assessment of the impact of elementary scientific education between e-learning teaching system and e-libraries,"National Science Council special study, no. 91-2520-S-364-001-X3, 2002.
[5]. Mukundan, J. & Nimehchisalem, V , Educational software and English teaching courseware: Promising panaceas? Journal of Nepal English Language Teachers‟ Association (NELTA). 12 (1-2), 71-79, 2008.

Paper Type : Research Paper
Title : Building detection form High resolution images using morphological operation
Country : India
Authors : Karuna S. Kirwale || Dr.Seema S. Kawathekar
: 10.9790/0661-1906023741     logo

Abstract: Building detection from satellite image is tedious task because constructed buildings are of different size and having different shapes. In this study used different image processing techniques like thresholding, morphological opening operation is uses for identify shapes of building because morphological operation is dealing with the shape. The high resolution images are used for extracting the buildings and count the total building found. The count of the building found with the help of the counting the bounded elements of the image.

Keywords: Building Extract, building count, Bounding box, Matlab, Morphological operation

[1] Sonke Muller, Daniel Wilhelm Zaum, Robust Building Detection in Aerial Images, In: Stilla U, Rottensteiner F, Hinz S (Eds) CMRT05. IAPRS, Vol. XXXVI, Part 3/W24 --- Vienna, Austria, August 29-30, 2005.
[2] Jon Atli Benediktsson (2003), 'Classification and Feature Extraction for Remote Sensing Images From Urban Areas Based on Morphological Transformations', IEEE Transactions on Geoscience and remote sensing, Vol. 41, NO. 9
[3] Sébastien Lefèvre et al (2010), 'Automatic Building Extraction in VHR ImagesUsing Advanced Morphological Operators' Remote sensing and data fusion over Urban areas (URBAN), France (2007), DOI : 10.1109/ URS.2007.371825.4.

Paper Type : Research Paper
Title : Sentiment Analysis of #MakeInIndia & #Demonetization using R
Country : India
Authors : CH.R.Vinodkumar || Prof.D.Lalitha Bhaskari
: 10.9790/0661-1906024247     logo

Abstract: With the advancement of web technology and the availability of digital devices, studies reveal that there is a huge volume of data available in the web for internet users. Internet has become a platform for online learning, exchanging ideas and sharing opinions through Social networking sites like Twitter, Facebook, Google+, LinkedIn etc. thus contributing to huge amount of data every second. The availability of voluminous data has led to an interesting research in the field of sentiment analysis. This paper focuses on the sentiment analysis of Twitter data based on the tweets made for #Make in India, a prestigious initiative by the Government of India in the year 2015and #Demonetization tweets. The main aim of this work is to analyze the opinions of the citizens based on the generated tweets which can...........

[1]. A Survey of Data Mining Techniques for Social Network Analysis proposed by Mariam Adedovyin – olowie, Mohammed MedhatGabbar.
[3]. Social Networks Overview: Current Trends and Research Challenges November 2010, Coordinated by the "nextMEDIA" CSA, European Commission, Information society and Media
[4]. An Approach to Harvesting, Cleaning, and Analyzing Data from Twitter Using R , Stephen Hill , Rebecca Scott ,2016 Proceedings of the EDSIG Conference ISSN: 2473-3857 Las Vegas, Nevada USA [5]. Po-Wei Liang, Bi-Ru Dai, "Opinion Mining on Social Media Data" IEEE 14th International Conference on Mobile Data Management 2014.

Paper Type : Research Paper
Title : New Model of Neural Networks for Solving Unrelated Parallel Machine Scheduling With Common Due Date
Country : Saudi Arabia
Authors : Abdelaziz Hamad Elawad
: 10.9790/0661-1906024853     logo

Abstract: In this paper the concept of Sequence the jobs on unrelated parallel machine with common due date has been studied, so that the total penalty cost to be minimized. This cost is composed of the total earliness and the total tardiness costs. We designed a new model system of multi layer neural networks base on unit's vector for inputs and out puts. We use Mat lap Software neural networks for training the model to solve a new similar problem. The performance of the new model system has been measured on numerical examples from literature reivews. The results are very encouraging for further investigation.

Keywords: Unrelated parallel machine, Common due date, Earliness and Tardiness

[1]. S.L.van de Velde(1993) "Duality – based algorithms for scheduling unrelated parallel machines" Journal on computing. (5) 192-205.
[2]. J. Bank and Fwerner (2001) "Heuristic algorithms for unrelated parallel machine scheduling with a common due date release dates and linear earliness and tardiness penalties"Mathematical and Computer Modelling (1) 363-383
[3]. Abdelaziz and Baharom (2001) "A neural network for common due date job scheduling problem on unrelated parallel machine scheduling problems" Matematica,(1) 63-70.
[4]. Abdelaziz, H. and Baharom, S.(2011)" A neural network and jobs scheduling problems" Lap Lambert Academic Publishing GmbH &Co.KG and licensors.
[5]. Coelho and A.M. (2015) "Hybrid Tabu search and a truncated branch-and-bound for the unrelated parallel machine scheduling problem", Computers and Operations Research, 53, 107–117.

Paper Type : Research Paper
Title : Two stage Fuzzy C- means Algorithm for Segmentation of White Matter Hyperintensity from Brain Images
Country : India
Authors : Dancy Kurian || Sheeja Y.S. || Kala Karun
: 10.9790/0661-1906025458     logo

Abstract: Segmentation of medical images is a challenging task owing to their complexity which can used as a diagnostic tool in neuro medicine. The fuzzy C-means is a clustering algorithm efficiently implemented for the brain image segmentation. This paper proposes two stage fuzzy c-means algorithm for the effective segmentation of the White Matter Hyperintensities (WMH) visible on brain magnetic resonance images. The steps involved are preprocessing of the brain image, skull stripping which uses the intensity based method and morphological operation, segmentation of the WMH. The developed technique is validated using the brain MR images of stroke patients and compared with seeded region growing method.

Keywords: Brain images, Fuzzy C-means, Preprocessing, Segmentation, White Matter Hyperintensity

[1]. Smitha Sunil Kumaran Nair, K. Revathy, Quantiative analysis of brain tissues from Magnetic Resonance Imaging., International Conference on Digital Image Processing, IEEE, 2009; 57-61
[2]. Andrew Todd Pokropek, Runa Parveen, Volume Estimation and Tissue Classification in Medical Images, Image segmentation and Classification, Medical Image Group
[3]. Minjie Wu, Caterina Rosana, Meryl Butters, Ellen Whyte.,A fully automated method for quantifying and localizing White Matter Hyperintensities on MR images., NIH Public Access Psychiatry, Res.2006, Dec 1; 148(2-3):133-142
[4]. Wei Wen, Perminder S. Sachdev, Extent and distribution of White Matter Hyperintensities in Stroke Patients The Sydney stroke Study, Stroke Journal of the American Heart Association, Oct 21, 2004;2813-2819.
[5]. H Kalska, R Mäntylä, R Ylikoski, M Hietanen, T Pohjasvaara, M Kaste, T Erkinjuntti., White matter hyperintensities as a predictor of neuropsychological deficits post- stroke, J Neurol Neurosurg Psychiatry 2005;76:1229-1233..

Paper Type : Research Paper
Title : Smart Transaction in Services through Secured Framework for task scheduling in cloud environment
Country : India
Authors : Prof. Ramesh Babu Inampudi || Mrs. Nahla Ahmed Farag
: 10.9790/0661-1906025967     logo

Abstract: Managing multiple clouds for data transaction with proper tasks allocation and scheduling from decentralized place(service) is a big challenge in service oriented architectures which maintains virtual machines for data sharing and communications. Proper resources have to be allocated for data transactions and data divisions with proper security. This work proposes STSASF(Smart Transaction in Services and Secured Framework) with 6 virtual machines communications in cloud environment. Based on the available bandwidth and long time waiting virtual machines will be identified by STSASF and will be allocated with tasks and scheduled for smooth data transactions...........

Keywords: -Transaction, Task Scheduling, Regex, Virtual Machine, pool, division.

[1]. Luiz F. Bittencourt, Carlos R. Senna, and Edmundo R. M. Madeira, "Enabling Execution of Service Workflows in Grid/Cloud Hybrid Systems ",2010 IEEE/IFIP Network Operations and Management Symposium Workshops,pp.343-349.
[2]. Susanta, Nanda and Tzi-cker, Chiueh. "A survey on virtualization technologies," Experimental Computer Systems Lab, Feb 2005.
[3]. Rajkumar kannan, Raihan Ur Rasool, Haijin,Sr.R.Balasundaram " Managing and Processing Big Data in Cloud Computing"2016 pp.195-197.
[4]. T. L. Saaty, "How to make a decision: the analytic hierarchy process," Eur. J. Oper. Res., vol. 48, no. 1, pp. 9–26, 1990.
[5]. D.I. George Amalarethinam, T. Lucia Agnes Beena,"Customer Facilitated Cost-based Scheduling (CFCSC) in Cloud" International Conference on Information and Communication Technologies (ICICT 2014) Science Direct Published by Elsevier B.V.© 2015.

Paper Type : Research Paper
Title : Ontology Based Searching For Optimization Used As Advance Technology in Web Crawlers
Country : India
Authors : Pankaj Pratap Singh || Palak Agarwal
: 10.9790/0661-1906026875     logo

Abstract: As Web is massive, much less coherent, changes more rapidly, and is spread over geographically distributed computers. This requires new information retrieval techniques, or extensions to the old ones, to deal with the gathering of the information, to make index structures scalable and efficiently updateable, and to improve the discriminating ability of search engines. A crawler solves the Resource Discovery Problem in the context of WWW by retrieving information from remote sites using standard web protocols. The importance of a page for a crawler can also be expressed as a function of the similarity of a page to a given query. Web crawlers that attempt to download pages that are similar to each other are called focused crawler or topical crawlers.

[1]. A Novel Architecture of Ontology based Semantic Search Engine, International Journal of Science and Technology Volume 1 No. 12, December, 2012
[2]. Thomas R. Gruber, A translation approach to portable ontology specifications, KnowledgeAcquisition 5 (1993), no. 2, 199–220.
[3]. Sajendra Kumar, Ram Kumar Rana, Pawan Singh, "A Semantic Query Transformation Approach Based on Ontology for Search Engine", International Journal on Computer Science and Engineering (IJCSE), May 2012. (688-693).
[4]. P. Jaganathan, T. Karthikeyan, Highly efficient architecture for scalable focused crawling using incremental parallel web crawler, Journal of Computer Science, 2014
[5]. Eakansh Manglik, Priyanka Sharma, Paramjeet Rawat, Nidhi Tyagi, Ontology based context synonymy web searching, Information systems and Computer Networks, 2013..

Paper Type : Research Paper
Title : Smart Ration Card System Using QR Code and One Time Password
Country : India
Authors : Prof. Pragati Mahale || Kiran Nanaware || Siyona Navgire || Komal Popli || Divya Prabhu
: 10.9790/0661-1906027680     logo

Abstract: In this paper, we have proposed a Smart Ration Card System using Quick Response Code (QR Code), One Time Password and SMS. The existing conventional Ration Card System consists of three categories of cards based on the user's income and the information is updated manually which leads to unfair practices. In this system, the QR Code contains the URL and an Identification Number of the customer which points to the record in the database. The QR Code can be scanned using a Smart phone. On scanning the QR Code, the user's personal details like name, phone number, address along with family member details, is displayed on the computer. Further, the desired grocery items are selected and the quantity is mentioned after entering the correct OTP. This quantity, if permissible, is deducted from the total remaining quantity. The bill is displayed and a Short Message Service (SMS) will be sent to the customer. This Smart Ration Card System will ensure transparency in the system and hence prevent the exploitation of masses..

Keywords: Smart Ration Card; Quick Response Code; Smart phone; One Time Password; Short Message Service.

[1] Vikram Singh, VellankiAamani , Booreddy Mounika, "SMART RATION CARD," Journal of Global Research in Computer Science, Volume 4, No. 4, April 2013.
[2] K.Balakarthik, "Cloud-Based Ration Card System using RFID and GSM Technology2, Issue,'' vol. 4, Apr 2013.
[3] A.N.Madur, Sham Nayse, "Automation in Rationing System Using Arm 7," International journal of innovative research in electrical, electronics, instrumentation and control engineering, vol.1, Issue Jul 2013.
[4] S.Kanagasubaraja, K. Arul Ganesh, G. Mohesh Viswanath, R. Prabha, "Biometric Device Using Smart Card In Public Distribution System," IRF International Conference, 29th March 2015.
[5] Sana A. Qader Perampalli, Dr. R.R. Dube, "Smart Card based e-Public Distribution System," International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 5, May 2016...

Paper Type : Research Paper
Title : Controlling a 2D computer game with a Leap Motion
Country : Bulgaria
Authors : Georgi Krastev || Valentina Voinohovska || Svetlozar Tsankov || Vanya Dineva
: 10.9790/0661-1906028193     logo

Abstract: The paper presents the process of developing a 2D computer game controlled by a Leap Motion controller. The Leap Motion detects and tracks the movement of hands, fingers and fingerlike items (e.g. a ball-point pen, pencil, stylus, etc.). The software of the device analyses the objects within its virtual field of view by identifying the hands, fingers, and fingerlike items and storing the data of their positions, gestures and movements. The virtual field has the shape of an inverted pyramid located at the device center. The controller identifies motion models as representing gestures of user commands and follow-up mimic hand-shooting gestures. The game is developed in Microsoft XNA Game Studio 4.0 programming languages C# and .NET Framework (4.0).

Keywords: Computer Games, Leap Motion, Unified Modeling Language, XNA, 2D

[1]. Egenfeldt-Nielsen, S., & Smith, S, (2008). Understanding video games: the essential introduction. New York: Routledge, ISBN 978-0-415-97721-0.
[2]. Gredler, M. (2001). Educational games and simulations: a technology in search of a (Research) Paradigm. Handbook of Research for Educational Communications and Technology, Bloomington, Indiana, Association for Educational Communications and Technology.
[3]. Gredler, M. (2004). Games and simulations and their relationships to learning in Handbook of Research on Educational Communications and Technology. Mahwah, Lawrence Erlbaum Associates.
[4]. Honey, M., & Hilton, M. (2011). Learning Science through Computer Games and Simulations. Washington DC: The National Academies Press, ISBN 0-309-18524-6.
[5]. Simpson, E., & Stansberry, S. (2008). Video games and Teacher Development: Bridging the Gap in the Classroom, in Games: Purpose and potential in Education. Morehead, KY, Springer Science + Business Media, (pp. 179 - 197), ISBN 978-0-387-09774-9.

Paper Type : Research Paper
Title : Performance Analysis of Reducing Signaling Cost for a Roaming User in Vertical Handover Algorithm for Mobile Networks
Country : Saudi Arabia
Authors : Dr. Omar Khattab
: 10.9790/0661-1906029499     logo

Abstract: Ubiquitous networks allow the coexistence of different wireless technologies such as GSM (Global System for Mobile Communication), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Long Term Evolution (LTE). Where one of the challenging issues in Next Generation Wireless Systems (NGWSs) is achieving seamless Vertical Handover (VHO) during Mobile User (MU) mobility between these technologies. This paper presents a performance evaluation on the existing Imperative Alternative MIH for Vertical Handover (I AM 4 VHO) algorithm for enhancing VHO in heterogeneous wireless networks environment. Finally, the numerical analysis of the algorithm shows that the VHO signaling cost is extremely reduced.

Keywords: Heterogeneous Wireless Networks, Signaling Cost, Vertical Handover (VHO)

[1]. Our vision: Committed to connecting the world. (2015). International Telecommunication Union (ITU). Retrieved 17 Oct , 2017, from
[2]. B. Angoma, M. Erradi, Y. Benkaouz, A. Berqia, M.C. Akalay, HaVe-2W3G: A Vertical Handoff Solution between WLAN, WiMAX and 3G Networks, 7th International Wireless Communications and Mobile Computing Conference (IWCMC), 2011, 101-106.
[3]. M. Louta, P. Zournatzis, S. Kraounakis, P. Sarigiannidis, I. Demetropoulos, Towards Realization of the ABC Vision: A Comparative Survey of Access Network Selection, IEEE Symposium on Computers and Communications (ISCC), 2011, 472-477.
[4]. M. Zekri, B. Jouaber, D. Zeghlache, Context Aware Vertical Handover Decision Making in Heterogeneous Wireless Networks, IEEE 35th Conference on Local Computer Networks (LCN), 2010, 764-768.
[5]. K. Meriem, K. Brigitte, P. Guy, An Overview of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks, Computer Communications, 31(10), 2008, 2607-2620.

Researcher can also search IOSR published article contents through

IOSR Xplore