IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 3

Paper Type : Research Paper
Title : Analysis And Performance Ratio Of Various Routing Protocol Using Ns
Country : India
Authors : Nilesh N Jaiswal || Shubhangi borkar

Abstract: Adhoc network is a collection of wireless mobile nodes, forming a temporary network without a fixed base station infrastructure and centralized management . The typical areas of mobile adhoc network applications include battlefield , emergency , search rescue and data acquisition in remote areas. The network topology changes frequently due to arbitrary movement of mobile nodes which acts as both hosts and routers ......

Keywords - Adhoc On demand Distance Vector, Adhoc on demand multipath distance vector, Destination Sequence Distance Vector, Dynamic Source Routing.

[1]. Ming Hu and Qiang Zhang, "Applications of Rough Set Theory To Image Preprocessing For Face Detection", proc. IEEE Int. Conf.2008.
[2]. Md. Tajmilur Rahman and Md. Alamin Bhuiyan, "Face Recognition using Gabor Filters", Proc.of 11th Int. Conf. on ICCIT 2008.
[3]. J. Prabin Jose, P.Poornima, "A Novel Method for Face Recognition using KNN Classifier", proc. IEE Int. conf.
[4]. Md.Omar Farque Md. Al Mehedi Hasan, Dept.of Computer science and Engineering, "Face recognition using PCA and SVM".
[5]. Chengliang Wang, Libin Lan, Yuwei Zhang, Minjie Gu," Face Recognition Based on Principle Component Analysis and Support Vector Machine", IEEE International Conference 2011.

Paper Type : Research Paper
Title : Performance Evaluation of STATCOM Connected to Renewable Energy Source
Country : India
Authors : Syeda Saba Khan || R.S.Phasate

Abstract: A Power quality problem is an occurrence of nonstandard voltage, current or frequency that results in a failure or a misoperation of end user equipments. Utility distribution networks, sensitive industrial loads and critical commercial operations suffer from various types of outages and service interruptions which can cost significant financial losses..........
Keywords: Active power filter (APF), distributed generation (DG), distribution system, grid interconnection, power quality (PQ), renewable energy, Photo Voltaic (PV) System

[1]. J. M. Guerrero, L. G. de Vicuna, J. Matas, M. Castilla, and J. Miret, "A wireless controller to enhance dynamic performance of parallel inverters in distributed generation systems," IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1205–1213, Sep. 2004.
[2]. J. H. R. Enslin and P. J. M. Heskes, "Harmonic interaction between a large number of distributed power inverters and the distribution network," IEEE Trans. Power Electron. vol. 19, no. 6, pp. 1586–1593, Nov. 2004.
[3]. U. Borup, F. Blaabjerg, and P. N. Enjeti, "Sharing of nonlinear load in parallel-connected three-phase converters," IEEE Trans. Ind. Appl., vol. 37, no. 6, pp. 1817–1823, Nov./Dec. 2001.
[4]. P. Jintakosonwit, H. Fujita, H. Akagi, and S. Ogasawara, "Implementation and performance of cooperative control of shunt active filters for harmonic damping throughout a power distribution system," IEEE Trans. Ind. Appl., vol. 39, no. 2, pp. 556–564, Mar./Apr. 2003.

Paper Type : Research Paper
Title : Application of Support Vector Machine for Diagnosis of Diabetes: A Systematic review
Country : India
Authors : Ms. Suruchi Pimple

Abstract: The support vector machine is a training algorithm for learning classification and regression rules from data. The SVM is based on statistical learning theory and is a classification tool used with great accuracy and efficiency. The objective of this study is to conduct an empirical study on application of SVM in diagnosis of diabetes. This paper includes various research papers which have used SVM or Enhanced SVM for diagnosis of diabetes. The goal of the study was to identify research goals, diabetes type, data sets, software and technologies used and the outcomes.

Keywords- Data mining, Diabetes mellitus, Support Vector Machine.


Paper Type : Research Paper
Title : Loan Approval Prediction based on Machine Learning Approach
Country : India
Authors : Kumar Arun || Garg Ishan || Kaur Sanmeet

Abstract:With the enhancement in the banking sector lots of people are applying for bank loans but the bank has its limited assets which it has to grant to limited people only, so finding out to whom the loan can be granted which will be a safer option for the bank is a typical process. So in this paper we try to reduce this risk factor behind selecting the safe person so as to save lots of bank efforts and assets......

Keywords: Loan, Machine Learning, Training, Testing, Prediction.

[1]. Rattle data mining tool: available from
[2]. Aafer Y, Du W &Yin H 2013, DroidAPIMiner: 'Mining API-Level Features for Robust Malware Detection in Android', in: Security and privacy in Communication Networks Springer, pp 86-103 .
[3]. Ekta Gandotra, Divya Bansal, Sanjeev Sofat 2014, 'Malware Analysis and Classification: A Survey'available from http://

Paper Type : Research Paper
Title : RS485 Data Transmitter through GSM Service to Server Database Logger
Country : India
Authors : Ashish K. Rewatkar || Ashwin Y.Ankar || Pradeep B. Dahikar

Abstract: Saving electricity in industries is major concern today. Hence, Energy Management System (EMS) remained preferred area for researchers recently. EMS not only saves electricity, but also monitors and records the electrical consumption data. It also helps diagnose electric machine health, energy efficiency and their reliability against failures. Power management has been one of the most talked about topics in the past decade or so because of the decrease in the energy reserves...........

Keywords:- RS485, MODBUS Protocol, AVR Microcontroller and GSM Module.

[1]. CEI/IEC 61036:1996+A1:2000, Alternating current static watt-hour meters for active energy (classes 1 and 2), International Electro-technical Commission
[2]. Interface Circuits for TIA/EIA-485 (RS-485), Texas Instruments design note (SLLA036)
[3]. "Trim-the-fat-off-RS-485-designs". EE Times. 2000.
[4]. Soltero, Manny; Zhang, Jing; Cockril, Chris; Zhang, Kevin; Kinnaird, Clark; Kugelstadt, Thomas (May 2010) [2002]. RS-422 and RS-485 Standards Overview and System Configurations, Application Report (PDF). Texas Instruments (Technical report). SLLA070D.
[5]. Electronic Industries Association (1983). Electrical Characteristics of Generators and Receivers for Use in Balanced Multipoint Systems. EIA Standard RS-485. OCLC 10728525.

Paper Type : Research Paper
Title : Research on Development of Android Applications
Country : India
Authors : Mrs. Prachi Sasankar || Mrs. Usha Kosarkar

Abstract: Introduced the Android platform and the features of Android applications, gave a detailed description of Android application framework from the prospective of developers. A simple music player is provided as instance to illustrate the basic working processes of Android application components. This paper provides guidance to understanding the operation mechanism of Android applications and to developing applications on Android platform.

Keywords- Linux kernel, Android system, Application framework, Dalvik virtual machine.

[1]. OL. Google Android Developers, Android Develop Guide,
[2]. M. Fengsheng Yang, Android Application Development Revelation, China Machine Press, 2010,1
[3]. M. Zhengguo Hu, Jian Wu, Zhenggong Deng, Programming Methodology, National Defence Industry Press, 2008,6
[4]. M. Junmin Ye, Software Engineering, Tsinghua University Press, 2006,6
[5]. J. Dongjiu Geng, Yue Suo, Yu Chen, Jun Wen, Yongqing Lu, Remote Access and Control System Based on Android Mobile Phone'vol.2. Journal of Computer Applications, 2011, pp. 560-562
[6]. J. Li Lin, Changwei Zou, Research on Cloud Computing Based on Android Platform, vol.11. Software Guide, 2010, pp.137-139

Paper Type : Research Paper
Title : Measurement of Employee Productivity using Cluster Analysis of BehavioralIntegrity
Country : India
Authors : Anupama Vishwas Gajbhiye || Jaiprakash KashinathSirur

Abstract: In the area of Human Resource Development there are two known methods:(1)In the first method organizations identify people who can do the job and then find out how their knowledge and skills are different from people who have just been recruited.(2) In the second method there is a need to identify people who can do the job well and perform better........

Keywords—General Intelligence (GI) ,Behavioral Integrity (BI), Cluster Analysis

[1]. ASAP World Consultancy and Jonathan Blain, Special Edition using SAP R/3( Second Edition, PHI Publication, New Delhi,1998).
[2]. Stuart B. Flexner ,The Random House College Dictionary,1988.
[3]. Anderberg M.R. ,Cluster Analysis for Applications( New York: Academic Press,1973).
[4]. Fisher, R. A.,"The Use of Multiple Measurements in Taxonomic Problems," Annals of Eugenics,7, 1936 ,pp.179-188.
[5]. Ward, J.H.," Hierarchical grouping to optimize an objective function‟‟, Journal of the American Statistical Association, 58, 1963 236-244.

Paper Type : Research Paper
Title : Big Data with Knowledge Extraction
Country : India
Authors : Chirag Thakkar || Dr.Kishore Dhole

Abstract:Nowadays Big Data has become one of the biggest concepts in the world of IT especially with the rapid development driving the increase of data. With today's information overload, it has become increasingly difficult to analyze the huge amount of data and to generate appropriate extraction decisions. Big data has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data related problems to be solved in the contemporary organizations.......

Keywords -Big Data, Knowledge Extraction.

[1]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE COMPUTING. Big Data Review Munesh Kataria, Ms. Pooja Mittal, IJCSMC, Vol. 3,Issue 7 , July 2014 , pg. 106 – 110
[2]. Papers refered from ,
[3]. www.
[4]. The Roles of Big Data in the Decision-Support Process: An Empirical Investigation.
[5]. Thiago Poleto,Victor diogho Heuer de Carvalho, and Ana Paula Cabral Seixas Costa.

Paper Type : Research Paper
Title : Novel approach for Energy-Efficient in Green Cellular Network Using Heterogeneous Network
Country : India
Authors : Ashok Hatwar || Amit Pimpalkar

Abstract: A distribute method to detect the energy efficiency of cellular networks can be developed meaningfully by selectively adapting off some of the Base Stations (BSs) during periods of low transportation load. During off-peak period where traffic weights are only a division of the peak-time traffic masses, a subset of BSs is convert off to reduce working energy consumption without disturbing service of network users. This formulation, however, requires a computationally challenging task as the population of the network grows...........

Keywords: Green Radio Networks, Energy-Efficient Operation, Attraction Propagation, Message-Passing Algorithm and self-organization algorithm

[1]. S. H. Lee and I. Son, "Affinity Propagation for Energy-Efficient BS Operations in Green Cellular network", IEEE Transactions on Wireless Communication. vol.3, No.7, June 2015.
[2]. Y. Chen, S. Zhang, S. Cu and G. Y. Li, "Fundamental trade-offs on green wireless networks", IEEECommunication. Magazine. vol. 49, no. 6, pp. 30-37, June 2011.
[3]. S. Lambert, W. V. Heddeghem, W. Vereecken, B. Lannoo, D. Colle and M. Pickavet, "Worldwide electricity consumption of communication networks", Optics Express, vol. 20, no. 26, pp. B513- B524,Dec. 2012.
[4]. E. Oh, B. Krishnamachari, X. Liu and Z. Niu, "Toward dynamic energy efficient operation of cellular network in restructure", IEEE Communication. Magazine. vol. 49, no. 6, pp. 56-61, June 2011.
[5]. F. Han, Z. Safar, W. Sabrina Lin, Y. Chen and K. J. Ray Liu, "Energy-Efficient Cellular Network operation via Base Station Cooperation", IEEE Wireless Communication Symposium, ICC2012.

Paper Type : Research Paper
Title : Challenges of mobile computing in networking: A Review
Country : India
Authors : Manjiri S Dixit

Abstract: Computers able of attaching to the Internet from many places are likely to grow in popularity until they control the population of the Internet. Protocol research has stimulated into high gear to improve appropriate network protocols for associating mobility. Large-scale networks of wireless sensors are becoming an active issue of study. Developments in hardware technology and engineering design have managed to dramatic reductions in size, power consumption and cost for digital integrated circuit, wireless communications and Micro Electro Mechanical Systems.........

Keywords –Security, structural requirement, Error Correction, Source Routing, Operational Requirement, Grey prediction

[1]. "LAN Standards of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specification. IEEE Standard 802.11, 1999 Edition," 1999.
[2]. D. P. Agrawal and Q-A. Zeng, Introduction to Wireless and Mobile Systems, Brooks/Cole publisher, 2002.
[3]. J. Walker, "Overview of IEEE 802.11b Security",
[4]. N. Borisov, I. Goldberg, and D. Wagner, "Intercepting Mobile Communications: the Insecurity of 802.11",
[5]. B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A Secure Routing Protocol for Ad Hoc Networks," Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001.

Paper Type : Research Paper
Country : India
Authors : Shubhangi M. Sherekar

Abstract: The intention of this paper is to provide an overview on the subject of Computer science with Human computer Interaction. Human computer interaction (HCI) is the study of people design, implement, and use interactive computer systems. In this paper we study why do human uses computing system? , what do human uses computing system for? And the computer science of HCI.

Keywords:- Human Computer Interaction, computing system, computer science of HCI.

[1]. Dr. Milind Oka, Management Information Systems: Text and Cases, Everest Publishing House, Pune, 2009.
[2]. V.S. Janakiraman, K. Sarukesi, Decision Support Systems, Prentice Hall of India, New Delhi, 2002.
[3]. Butler, K. A. (1985) Connecting Theory and Practice: A Case Study of Achieving Usability Goals. In: Proceedings of CHI'85 Human Factors in Computing Systems (April 14-18, 1985,San Francisco, CA) ACM, pp. 85-88.
[4]. Wilkund, M. E. (1994) Usability in Practice: How Companies Develop User-Friendly Products, Cambridge, MA: Academic Press.
[5]. Card, S.K., Moran, T.P., and Newell, A., (1983) The Psychology of Human-Computer Interaction, Hillsdale, NJ: Erlbaum.

Paper Type : Research Paper
Title : Human Resources Management and Technology
Country : India
Authors : Meera R. Satav

Abstract: At the time of recruitment it is necessary to complete forms so that we can become an "official" employee. There are data and the human resources (HR) department has always been the custodian of employee data. The type of data collected, where the data are stored, how the data are used, and the type of system used for these purposes has changed over time.........

Keywords:- Human resource information systems (HRIS), HRM, Employee self-service (ESS), Manager self-service (MSS), e- HR.

[1]. G. Dessler, J. Griffiths, and B. Lloyd-Walker, Human Resources Management, 2nd ed. Frenchs Forest.
[2]. Article by Julie Bulmash
[3]. Software and Information Industry Associations,

IOSR Journals are published both in online and print versions.