IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Advances in Engineering, Technology & Management (AETM'16)

Volume 2

Paper Type : Research Paper
Title : A Co-operative Mechanism to Contrast Black-hole Attacks in Delay Tolerant Networks
Country : India
Authors : Shuchita Upadhyaya and Karishma

Abstract: DTNs are designed to work in post disaster scenario where partitions between nodes are large. To transfer messages in this situation DTN uses intermediate nodes to forward messages. The mechanism used here is store, carry and forward. But here, securely transferring messages from one node to other node is quite challenging task because an intermediate node may behaves maliciously.......

Keywords - DTN (Delay Tolerant Network), Black hole, CFV (Combined Faith Value) and encounters.

[1] Yinghui Guo, Sebastian Schildt and Lars Wolf , "Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks" , IEEE, 2013.

[2] K.Devi and P.Damodharan, "Detecting Misbehavior Routing And Attacks In Disruption Tolerant Network Using Itrm", International Conference on Current Trends in Engineering and Technology, ICCTET'13, 2013.

[3] Gianluca Dini and Angelica Lo Duca, "Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network". Ad Hoc Netw. (2012).

[4] Jaydip Sen, Sripad Koilakonda and Arijit Ukil, "A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks".

[5] Adnan AHMED, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb and Abdul Wahid KHAN, "A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks", 2014.

Paper Type : Research Paper
Title : Better Code by Making Bugs: SWOT Analysis of Mutation Testing
Country : India
Authors : Dr. Mamta Madan || Dr.Kavita || Radhika Thapar

Abstract: In today's world, quality is an important factor for customer satisfaction. Quality assurance and testing are one of the important dimensions. But how can we test? If one does not find a bug, then does that really mean that there aren't any? Have any one wondered, what happens to the guards who are actually guarding us, who is the one who guard the guard's? From this analogy ,question arises how to deliver higher quality software by increasing the efficiency and effectiveness of our testing processes..........
Keywords: Testing, Mutants, SWOT, Equivalent mutants, Mutation


[2] R.A. DeMillo, R.J. Lipton, and F.G. Sayward, Hints on Test DataSelection: Help for the Practical Programmer, Computer, vol. 11,no. 4, pp. 34-41, Apr. 1978.

[3] Madhuri Sharma Center for Development of Advanced Computing, Noida ,Neha Bajpai Center for Development of Advanced Computing, Noida Automatic ―Generation and Execution of Mutants‖ International Journal of Computer Applications (0975 – 8887) Volume 44– No.3, April 2012
[4] Pawan Kumar Chaurasia Assistant Professor Department of Information Technology, Babasaheb Bhimrao Ambedkar University, (A Central University) Lucknow (U.P), India, 226025 "MUTATION TESTING: A REVIEW"

Paper Type : Research Paper
Title : Message Indexing Based Car-theft Prevention Through Smartphone
Country : India
Authors : Vishal Sharma || Abhishek Gulati || Manvi Madan || Kajal Puri

Abstract: Nowadays cars are amongst the most valuable asset for people, hence their security is a major concern for both the people as well as the car manufacturing companies. With the growth in the VLSI Technology has empowered the smart phones of this era to accommodate a solution to everyday problems of the users. Therefore, a system has been proposed which uses the resources of smart phone to prevent car-theft. The system has been developed primarily for Android Operating system and it successfully notifies the user within fraction of seconds in case of a theft-attempt by an unauthorised user of the car. The system empowers the users to ensure the safety of their cars through their smart phones.

Keywords- Android Studio, Arduino, GSM, IR Sensor, Smartphone

[1] Google maps. (2015, December). Retrieved from
[2] Whatsapp.(2015 December). Retrieved from
[3] Google Play Store. (2015, December). Retrieved from
[4] Android Developers Automobile. (2015, December). Retrieved from

[5] Thangarajah, Akilan, BuddhapalaWongkaew, and MongkolEkpanyapong, Implementation of Auto Monitoring and Short-Message-Service System via GSM Modem, IJCER 3.2, 2014, 63-68.

Paper Type : Research Paper
Title : Threshold Based Mechanism to Detect Malicious URL's in Social Networks
Country : India
Authors : Divya || Dr. Kulvinder Singh || Dr. Sanjeev Dhawan

Abstract: In the past six years, tremendous growth in the size and popularity of social networking has fundamentally changed the way to use the Internet. As social aspects to the Internet continue to expand in both quantity and scope, security of the users of social networking sites and the data generated by them will ultimately become an unavoidable concern. Social networks includes various kinds of URL's some of them may contains harmful information that are called malicious URL's. In this paper system architecture of malicious URL detection has been presented. Various existing techniques to detect malicious URL also discussed after that a proposed mechanism threshold based scheme to detect malicious URL has been presented

Keywords:URL, Spam, Web Crawler, filter and classifiers.

[1] Jitendra Apte and Marina Lima Roesler, Interactive Multimedia Advertising and Electronic Commerce on a Hypertext Network, U.S. Patent No. 7,225,142. 29 May 2007.

[2] Ravula and Ravindar Reddy, Classification of Malware using Reverse Engineering and Data Mining Techniques, M.S. Dissertation, University of Akron, CS Dept., 2011.

[3] Justin Ma, Lawrence K. Saul, Stefan Savage and Geoffrey M. Voelker, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs, in Proceedings of 15th ACM international conference on Knowledge discovery and data mining, 2009.

[4] Shanshan HONG, Online Advertising Alliance Based Advertisers Needs Analysis, Proceedings of Conference on Web Based Business Management, 2011.

[5] Zhou Li, Kehuan Zhang and Yinglian Xie, Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising, ACM conference on computer and communications security, 2012.

Paper Type : Research Paper
Title : Performance Analysis of AODV on the Basis of Network Survivability over MANET using NS2
Country : India
Authors : Jitender Grover || Anjali and Anshul

Abstract: In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. Effective transmission power control is a critical issue in the design and performance of wireless ad hoc networks......

Keywords:- MANET, Network Survivability, Transmission Range, NS 2.34

[1] Amruta Kodole and P. M. Agarkar, A Survey Of Routing Protocols In Mobile Ad Hoc Networks, Multidisciplinary Journal of Research in Engineering and Technology, 2(1), 2015, pp. 336-341.

[2] Mostafa Rajabzadeh, Arash Mazidi and Mehdi Rajabzadeh, SG-AODV: Smart and Goal Based AODV for Routing in Mobile Ad hoc Networks, International Journal of Advanced Research in Computer Science and Software Engineering, 5( 1), 2015.

[3] T. D. Lagkas, A. Lamproudi, P. Sarigiannidis and C. Skianis, The impact of mobility patterns on the efficiency of data forwarding in MANETs, in 2015 IEEE International Conference on Communications (ICC), London, DOI: 10.1109/ICC.2015.7249284, pp. 6037 – 6042, 8-12 June 2015.

[4] N. Sarmah, Y. Yang, H. Sharif and Y. Qian, Performance analysis of MANET routing protocols by varying mobility, speed and network load, in 9th International Conference on Signal Processing and Communication Systems (ICSPCS), Cairns, QLD, DOI: 10.1109/ICSPCS.2015.7391749, pp. 1 – 6, 14-16 Dec. 2015.

Paper Type : Research Paper
Title : Liveness Detection for Face Recognition in Biometrics: A Review
Country : India
Authors : Meenakshi Saini || Dr. Chander Kant

Abstract: A Biometric system recognizes an individual by measuring or analyzing his physical or behavioral body traits. In recent times, Facial recognition is one of the most commonly used biometric technology and is rapidly integrated in various applications such as security login or access to the buildings or surveillance etc. Facial recognition is also user friendly and cost effective solution than other technologies. Beside this, Face recognition system is also prone to the spoofing attacks such as placing photographs......

Keywords: Face recognition, Liveness detection, Face spoofing, Biometrics

[1] Anil Jain, Lin Hong and Sharath Pankanti, Biometric Identification,white paper in Communications of the ACM,43(2),February 2000.

[2] Anil K. Jain, Arun A. Ross, Introduction to Biometrics, Handbook of Biometrics, Springer, New York, USA, 2008.

[3] Anil K. Jain, Arun A. Ross and Salil Prabhakar, An Introduction to Biometrics Recognition, IEEE Transactions on Circuits and Systems for Video Technology, Special issue on Image- and-Video-Based Biometrics,14(1), January 2004.

[4] Chris Roberts, Biometric Attack vector and Defenses, Elsevier computers & Security, 2007, 14-25.

[5] Emanuela Marasco and Arun Ross, A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems, ACM Computing, 47(2), Sept 2014, 1-36.

Paper Type : Research Paper
Title : Encounter based Routing in Opportunistic Networks
Country : India
Authors : Nidhi || R. K. Chauhan

Abstract: Opportunistic networks are wireless networks which may be used in areas where large delays are presented between data transmission also long distances may be handled by nodes. In these networks nodes may communicate with others through intermediate nodes. Data transmission takes place via various routing protocols. An opportunistic network provides standard routing protocols that are epidemic routing, prophet routing, spray and wait routing etc. In this paper these protocols are discussed with their own pros and cons. After that a comparative analysis between them is also presented...........

Keywords— Opportunistic networks, epidemic, prophet, spray and wait, store -carry -forward and movement models etc.

[1] PeiyanYuan , LilinFan , PingLiu and ShaojieTang, Recent Progress In Routing Protocols of Mobile Opportunistic Networks: A Clear Taxonomy, Analysis and Evaluation, Journal of Network and Computer Applications Published by Elsevier Ltd , 2016, pp:1-8.

[2] Konglin Zhua, Wenzhong L, Xiaoming Fuc and Lin Zhang, Data Routing Strategies in Opportunistic Mobile Social Networks:Taxonomy and Open Challenges", Computer Networks Published by Elsevier Ltd, 2015, pp. 1-15.

[3] J. Wu, Y. Wang, Opportunistic Mobile Social Networks, CRC Press, 2014.

[4] K. Zhu, W. Li and X. Fu, Rethinking Routing Information in Mobile Social Networks: Location-Based or Social-Based? Comput. Commun. 42, 2014, pp. 24–37.

Paper Type : Research Paper
Title : Profile Based Side-View Face Authentication using Pose Variants: A Survey
Country : India
Authors : Surinder Pal Singh || Ashish Oberoi

Abstract: As a widely used biometrics, side face recognition has many advantages such as being a legal act of entering, formed by nature and submitting without resistance or objection. On the other hand, in existing scenarios with constrained environment, pose variation up to side-view positions makes face recognition a challenging work. This paper recognize the research toward pose-invariant.......

Keywords - Controlled Environment, Face Detection, Feature Extraction, Poses, Occlusions.

[1] X. Zhang, and Y. Gao, "Face recognition across pose: A review," Pattern Recognition, 42, 2009, 2876–2896.

[2] Y. Gao, and M. Leung, "Line segment Hausdorff distance on face matching," Pattern Recognition, 35, 2002, 361–371.

[3] B. Bhanu, and X. Zhou, "Face Recognition from Face Profile Using Dynamic Time Warping," Int. Conf. on Pattern Recognition (ICPR), 4, 2004, 499–502.

[4] F. Tsalakanidou, "Use of depth and colour eigen faces for face recognition," Pattern Recognition Letters, 24, 2003, 1427–1435.

[5] R. Gross, J. Yang, and A. Waibel, "Face Recognition in a Meeting Room," IEEE Int. Conf. on Automatic Face and Gesture Recognition, 294, 2000.

Paper Type : Research Paper
Title : Implications of Various Fake Profile Detection Techniques in Social Networks
Country : India
Authors : Dr. Sanjeev Dhawan || Ekta

Abstract: In the recent years, the fast development and the exponential utilization of social networks has prompted an expansion of social Computing. In social networks users are interconnected by edges or links. Facebook, twitter, linkedin are most popular social networks websites. In this paper focus is made on Facebook for detection of fake profile. Facebook is most used social networking site in which user can share messages...........

Keywords: Facebook, FRAPPE, My page keeper, malicious, spam.

[1] Michael Fire, Dima Kagan, Aviad Elyashar and Yuval Elovici," Friend or foe? Fake profile identification in online social networks", Soc. Netw. Anal. Min. (2014), Springer-Verlag Wien 2014, pp. 1-23.

[2] S. Abu-Nimeh, T. M. Chen, and O. Alzubi, "Malicious and Spam Posts in Online Social Networks," Computer, vol. 44, no. 9, IEEE 2011, pp. 23–28.

[3] Qiang Cao, Michael Sirivianos, Xiaowei Yang and Kamesh Munagala" Combating Friend Spam Using Social Rejections", IEEE 35th International Conference on Distributed Computing Systems, IEEE 2015, pp.235-244.

[4] Rahman MS, Huang TK, Madhyastha HV, Faloutsos M,"Frappe: detecting malicious Facebook applications", in: Proceedings of the 8th international conference on emerging networking experiments and technologies, ACM 2012, pp. 313–324.

[5] Puttaswamy KPN, Sala A, and Zhao BY," Starclique: Guaranteeing user privacy in social networks against intersection attacks", in: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '09. ACM 2009, New York, NY, USA, pp.157-168.

Paper Type : Research Paper
Title : TCP-LP: Fair and Friendly Congestion Control Approach
Country : India
Authors : Deepak Mehta

Abstract: Internet users always seek service prioritization. This service can be defined as"Give importanceto important network traffic over unimportant network traffic".Conventional methods can be categorization of traffic by considering the existing traffic as"best-effort" class can be named as low-priority (LP) class, and keen to develop mechanisms which will give "better-than-best-effort" service.........

Keywords – AQM, drop-tail, fairness, reno, SFQ, vegas.

[1] A. Hernandez and E. Magana, "One-way delay measurement and characterization", Proc. 3rd IEEE Conf. Networking and Services ICNS, 2007.
[2] B. Ott, T. Warnky and V. Liberatore, "Congestion Control for low Priority Traffic", Proc. SPIE.5245, Internet Quality of Service, 154, 2003.
[3] C.Wang, H. Wang, Y. Lin, S.Chen and C. Wu, "Charge-based low priority congestion control", Proc. 3rd IEEE Conf. 2008.
[4] C. Callegari, S. Giordano, M. Pagano and T. Pepe –"Behavior analysis of TCP Linux variants", Computer Networks: The International Journal of Computer and Telecommunications Networking, 56(1), 2012, 462-476.
[5] Venkataraman, Arun, R. Kokku, and M. Dahlin, "TCP Nice: A mechanism for background transfers", ACM SIGOPS Operating Systems Review, 36, 2002, 329-343.

Paper Type : Research Paper
Title : Experimental work on Data Clustering using Enhanced Random K-Mode Algorithm
Country : India
Authors : S. Sathappan || D.C. Tomar

Abstract: Clustering the uncertainty data is not an easy task but an essential task in data mining. The traditional algorithms like K-Means clustering, UK Means clustering, density based clustering etc, to cluster uncertain data are limited to using geometric distance based similarity measures and cannot capture the difference between uncertain data with their distributions. Such methods cannot handle uncertain objects that are geometrically indistinguishable, such as products with the same mean but very different variances in customer ratings......

Keywords:-uncertainty clustering, weather dataset, random k-mode, probability density function

[1] W. K. Ngai, B. Kao, R. Cheng, M. Chau, S. D. Lee,D. W. Cheung, and K. Y. Yip, "Metric and trigonometric pruning for clustering of uncertain data in 2D geometric space", Information Systems,36 (2), 2011, 476–497.
[2] B. Kao, S. D. Lee, F. K. F. Lee, D. W. L. Cheung and W. S. Ho, "Clustering uncertain data using Voronoi diagrams and R-tree index", IEEE TKDE, 22(9) ,2010, 1219–1233.
[3] T. Velmurugan, "Efficiency of K-Means and K-Medoids Algorithms for Clustering Arbitrary Data Points", IJCTA, 2012.
[4] S. Anjani and M. Wangjari, "Clustering of uncertain data object using improved K-Means algorithm", IJARCSSE, 2013.
[5] B. Kao Sau D. L. Foris, K. F. L, David, W. Cheung and W. S. Ho," Clustering Uncertain Data using Voronoi Diagrams and R-Tree Index", IEEE, 2010.

Paper Type : Research Paper
Title : A Comparative Analysis of Different Routing Scheme in Opportunistic Network
Country : India
Authors : Minakshi and Sona Malhotra

Abstract: Opportunistic Networks are pure wireless networks in which no direct communication is present between nodes In OPPNET no base station is used for further communication. Data transmission takes place through intermediate nodes. These intermediate nodes uses store-carry-forward model for data transmission. In opportunistic network numbers of routing protocols are presented. Routing protocols are used for data transmission in network. In this paper first introduce Opportunistic network in detail then performs a comparative analysis on different routing protocols.

Keywords: store -carry forward, opportunistic, bundle, routing etc.

[1] L. Pelusi, A. Passarella and M. Conti, "Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks", IEEE Communications Magazine, 44:131–141, November 2006.

[2] L. Lilien, Z. Kamal, V. Bhuse, and A. Gupta," Opportunistic Networks: The Concept and Research Challenges in Privacy and Security", In Proc. of 2006 International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN'06), Miami, Florida, USA, pp. 134–147, March 2006.

[3] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, " Maxprop: Routing For Vehicle-Based Disruption Tolerant Networks", In Proc. of the 25th IEEE International Conference on Computer Communications (INFOCOM' 06), Barcelona, Spain, pp. 1–11, April 2006.

[4] A. Vahdat and D. Becker, "Epidemic Routing For Partially Connected Ad Hoc Networks", Technical Report CS-2000-06, Dept. of Computer Science, Duke University, 2002.

Paper Type : Research Paper
Title : Analysis on Hinglish Opinion Using Multinomial Naive Bayes Algorithm
Country : India
Authors : Jagmeet Singh || Dr. Shashi Bhushan

Abstract: Sentimental Analysis is the study that analyses people's sentiments, appraisals, attitudes, and emotions towards entities such as products, services, organizations, individuals, issues, events, the topics, and their attributes. These days, the latest mobile devices and websites are interpreting mashup language based keyboards; this has enabled many users to express their opinions and views about products in 'Hinglish'..........

Keywords: Sentimental analysis, Mashup language, Multinomial naïve Bayes.

[1] Kaili Mao, Jianwei Niu, Xuejiao Wang, Lei Wang, Meikang Qiu, "Cross-Domain Sentiment Analysis of Product Reviews by Combining Lexicon-based and Learn-based Techniques" IEEE 17th International Conference on High Performance Computing and Communications, 2015.

[2] Hassan Saif1, Miriam Fernandez, Yulan He and Harith Alani, "Evaluation Datasets for Twitter Sentiment Analysis A survey and a new dataset, the STS-Gold" The Open University‟s repository of research publications, 2013.

[3] Xing Fang and Justin Zhan," Sentiment analysis using product review data" springer open Journal of Big Data, 2015.

[4] Carolina L. dos Santos and Carlos N. Silla Jr," The Latin Music Mood Database" Springer Journal EURASIP Journal on Audio, Speech, and Music Processing, 2015.

[5] Marcel Salathé, Duy Q Vu, Shashank Khandelwal and David R Hunter, "The dynamics of health behavior sentiments on a large online social network" license Springer, 2013.

Paper Type : Research Paper
Title : An Empirical Study of the Factors influencing the effectiveness of Online Advertisement
Country : India
Authors : SeemaWadhawan || Sweety Gupta || Shikha Dua

Abstract: With technological advancement being accessible easily, the field of online advertisement and E-Business is definitely going to be the future in the shopping era. In today's world, in which we are living the information is flowing from all sources like television, advertising, films, videos, billboards, magazines, movies, music, newspaper, and internet. Analyzing the impact of immense opportunities which is being offered by internet, it is providing a new prospect to the industry of advertisement and marketing......

Keywords: online advertisement, social networking sites.

[1] P. Srivastava, "A Study On Impact Of Online Advertising On Consumer Behavior (With Special Reference To E-Mails), International Journal of Engineering and Management sciences, 3(4), 2012, 461-465.
[2] A.B. Mohammed, M. Alkubise, "How do Online Advertisements Affects Consumer Purchasing Intention: Empirical Evidence from a Developing Country, European Journal of Business and Management, 4(7), 2012.
[3] H. Bush, "Advertiser Perceptions of the Internet as a Marketing Communication Tool", Journal of Advertising Research, 1998, 17-27.
[4] V.P.Nikhil, K. Tiwari and V.Ravikumar, "A study on the Impact of Online Advertisements on Buying Decision of Customers of Passenger Car Industry", Global Illuminators, Proc. Conf. on GIMAR-2015, 1, 128-139.
[5] Rezai, Mohamed, Shamsudin and Zahran, "Effect of Consumer Demographic Factors on Purchasing Herbal Products Online in Malaysia", 2013.

Paper Type : Research Paper
Title : Optimum threshold value to segment potato image in hand-held potato grading machine
Country : India
Authors : Er. Amrinder Singh Brar || Dr. Kawaljeet Singh

Abstract: The rising demands of quality food products these days lead to requirement of high speed machine vision systems which can detect the defects of food products. An accuracy and cost effectiveness are two key features which a good machine vision system should include. Potato is one of the most popular food product consumed by humans and its production is rising day by day. But post-harvest losses are reported very high due to poor packing and grading facilities........

Keywords: Potato, Entropy, Texture feature, Segmentation, Machine Vision, Cracks, Rots.

[1] FAOSTAT, 2012. Potatoes Production in the World. Statistics Division. <> (accessed 02/03/2016).
[2] S.K. Pandey, S.V. Singh, R.S. Marwaha and D. Pattanayak, Indian potato processing varieties: their impact and future priorities, Potato Journal, 36(3-4), 2009, 95-114.
[3] FAOSTAT, 2014. Potatoes Production in the World. Statistics Division. <> (accessed 02/03/2016).\
[4] C. Costa,F. Antonucci,F. Pallottino,J. Aguzzi,D.W. Sun & P. Menesatti, Shape analysis of agricultural products: A review of recent research advances and potential application to computer vision, Food and Bioprocess Technology, 4(5), 2011, 673–692.
[5] V. Leemans & M.F. Destain, A real-time grading method of apples based on features extracted from defects, Journal of Food Engineering, 61(1), 2004, 83–89.

IOSR Journals are published both in online and print versions.