IOSR Journal of Computer Engineering (IOSR-JCE)

Sep. – Oct. 2015 Volume 17 - Issue 5

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
Country : India
Authors : Shyam Chandran.P || Lisi Mohanraj

Abstract: The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an inter-domain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers.

[1]. H. Aljifri, M.Smets and A.P. Pons.IP traceback using header compression.Computer &Swcurity, Feb.2003.
[2]. F. Baker and P. Savola, INgress filtering for multihomednerworks, RFC 3704, Mar.2004.
[3]. P.Ferguson and D.Senie. Networking ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827,May 2000
[4]. "Atulkahate", "Cryptography and network security", Tata McGraw Hill Publishing Company, New Delhi 2003.
[5]. "Elliote Rusty Harod(1998)", "Java Networking Programming", Galgotia Publications.

Paper Type : Research Paper
Title : 'A Review Study on Future Applicability of Snake Robots in India'
Country : India
Authors : Nidhi Chaudhry || Shruti Sharma

Abstract: In this study we to aim to present an overview of features of snake robots and their application across various fields. Snakes is blessed with a unique feature of moving over or climbing all most all kind of terrains, rough, muddy, watery, narrow cracks, tall trees and this unique mobility feature have inspired the creation of 'Snake Robots'. Snake robots can work as a wonder to reach challenging and cluttered environments where it is impossible or too dangerous or narrow for human beings to operate. Snake robot is an innovation that has a great scope in India. Snake robots, thus, holds a lot in future and great scope for India. Snake robots can be used in various fields like agriculture, sanitation, fire fighting, surveillance and maintenance of complex and possibly dangerous structures or systems such as nuclear plants or pipelines, intelligent services, media, exploration, research, education, military, disaster management, and rescue & search operations.

[1]. S. Hirose. Biologically Inspired Robots: Snake-Like Locomotors and Manipulators. Oxford University Press, 1993
[2]. P. Liljebäck, "Modular snake-robot: Modeling, implementation and control of a modular and pressure based snake-robot," Master's thesis, Norwegian University of Technology and Science, Trondheim, Norway, 2004, Norwegian.
[3]. Pal Liljeback, Kristin Y. Pettersen, Oyvind Stavdahl, Jan Tommy Gravdahl, "Snake Robot Locomotion in Environments with Obstacles", IEEE/ASME Trans. On Mechatronics, December 2012, Vol. 17, No. 6, Pg. 1158-1169
[4]. Kevin J. Dowling, "Limbless Locomotion: Learning to Crawl with a Snake Robot", Unpublished Ph. D Thesis, The Robotics Institute, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA 15213, 1997.
[5]. S. Hirose, A. Morishima, "Design and control of a mobile robot with an articulated body", International Journal of Advanced Robotics, 19909, pp 99-114.
[6]. Blessy Mariam Markose, Harshitha Loke "Intelligent vision based snake robot", International Journal of Research in Engineering and Technology, eISSN: 2319-1163, pISSN: 2321-7308.

Paper Type : Research Paper
Title : Increasing the Visibility of Search using Genetic Algorithm
Country : India
Authors : Jaswinder Singh || Parvinder Singh || Yogesh Chaba

Abstract: The vast repository of informational databases i.e. Web is available to the user in the form of textual documents. It's a challenge to develop an effective information retrieval approach that can ease the user search and increases the visibility of search. Genetic Algorithm based approach has been implemented to increase the visibility of search by expanding the query using Jaccard similarity function as fitness function. The step by step implementation of genetic algorithm for one generation has been explained in the paper and the experiment was repeated for 500 generations to obtain optimum keywords out of which the best suited keyword was considered for expanding the query. The effectiveness of the approach has been experimentally evaluated on manually created training data of retrieved documents for formulated queries using the Google search engine.

Keywords: Information Retrieval, Search Engine Visibility, Similarity Function, Genetic Algorithm

[1] William P. Jones, George W. Furnas, Pictures of Relevance: A Geometric Analysis of Similarity Measures, Journal of American Society for Information Science, Vol. 38, No.6, pages 420-442, 1987.
[2] Michael Gorden, Applying Probabilistic and Genetic Algorithms for Document Retrieval, Communications of ACM, Vol.31, No. 10, pages. 1208-1218, 1988.
[3] V. N. Gudivada, V. Raghavan, W. I. Grosky and R. Kasanagottu, Information Retrieval on the World Wide Web, IEEE Internet Computing, pages 58-68, 1997.
[4] R. Baeza-Yates and B. Ribiero-Neto, Modern information retrieval (Addison Wesley, New York, 1999).
[5] G. Salton and C. Buckley, Improving Retrieval Performance by Relevance Feedback, Journal of the American Society for Information Science, 41(4), pages 288-297, 1990.
[6] C. Lopez-Pujalte, V.P. Guerrero-Bote and F. Moya-Anegon, A Test of Genetic Algorithms in Relevance Feedback, Information Processing and Management, 38(6), pages 795-807, 2002.

Paper Type : Research Paper
Title : Laser pointer interaction for 3D angiography operation
Country : Egypt
Authors : Dina Ahmed || Ayman Atia || Essam A. Rashed || Mostafa-Samy M. Mostafa

Abstract: A primary challenge for creating an interactive display in operating room (OR) is in the definition of control methods that are efficient and easy to learn for the physician. Apart from traditional input methods such as mouse and keyboard, we present a system that utilizes the laser pointer to manipulate directly the 3D medical images of angiography on LCD display. This work is based on laser detection, tracking the spot, and laser gesture recognition using an ordinary laser pointer.

[1] P. Dias, J. Parracho, J. Cardoso, B. Q. Ferreira, C. Ferreira, and B. S. Santos, "Developing and evaluating two gestural-based virtual environment navigation methods for large displays," in Distributed, Ambient, and Pervasive Interactions, pp. 141–151, Springer, 2015.
[2] X. Bi, S.-H. Bae, and R. Balakrishnan, "Walltop: Managing overflowing windows on a large display," Human{Computer Interaction, vol. 29, no. 2, pp. 153–203, 2014.
[3] K. Cheng, J. Li, and C. M¨uller-Tomfelde, "Supporting interaction and collaboration on large displays using tablet devices," in Proceedings of the International Working Conference on Advanced Visual Interfaces, pp. 774–775, ACM, 2012.
[4] C. Ardito, P. Buono, M. F. Costabile, and G. Desolda, "Interaction with large displays: A survey," ACM Computing Surveys (CSUR), vol. 47, no. 3, p. 46, 2015.
[5] L. Hespanhol, M. Tomitsch, K. Grace, A. Collins, and J. Kay, "Investigating intuitiveness and effectiveness of gestures for free spatial interaction with large displays," in Proceedings of the 2012 International Symposium on Pervasive Displays, p. 6, ACM, 2012.

Paper Type : Research Paper
Title : Public conveyance system for shortest path nding for real road network
Country : India
Authors : Agam Mathur || Mayuresh Jakhotia || Anish Lavalekar || Nikita Magar

Abstract: This article analyzes problems of determining the shortest path and optimal route amongst the given stoppages. The model of the problem is presented as a directional graph, where nodes are pickup points (termed as stoppage point in database) and crossings outside stoppage points and edges are roads among stoppage points and crossings. Each node has some information attached to it: stoppageId, stoppageName, latitude, longitude and numberOfPassengers of the stop, maintenance organizations, and mark(s) of the crossing(s). All pickup points are connected by roads.

[1]. Fast Shortest Path Algorithms for Large Road Networks Faramroze Engineer Department of Engineering Science University of Auckland New Zealand
[2]. Heuristic shortest path algorithms for transportation applications: State of the art L. Fua,*, D. Sunb, L.R. Rilettc aDepartment of Civil Engineering, University of Waterloo, Waterloo, ON, Canada N2L 3G1 bCollege of Automation, Chongqing University, Chongqing, 400044, China cMid-America Transportation Center, University of Nebraska-Lincoln, W339 Nebraska Hall, P.O. Box 880531, Lincoln, NE 68588-0531, USA
[3]. Mining the Shortest Path within a Travel Time Constraint in Road Network Environments Eric Hsueh-Chan Lu, Chia-Ching Lin, and Vincent S. Tseng Department of Computer Science and Information Engineering National Cheng-Kung University Tainan, Taiwan, R.O.C.
[4]. Design and implememntation of multiparameter Dijkstra0 s(MPD) algorithm:A shortest path algorithm for real-road networks.(September 2011) 1Nishtha keswani,2Dinesh Gopalani 1asistant professor,central universal of Rajsthan, India 2asistant professor, Malviya National Institute Of Technology, Jaipur. (IJAER) 2011, Vol. No. 2, Issue No. III, Septem-ber 2011

Paper Type : Research Paper
Title : Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
Country : India
Authors : Preeti Ahlawat || Rainu Nandal

Abstract: In today's world of growing advanced mobile technologies, the traditional voting method can be changed to a newer and effective approach termed as mobile voting. The Mobile voting system provides a convenient, easy and efficient way to vote eliminating the shortcomings oftraditional approach. In this paper we propose to build an E-Voting system which is basically an online voting system through which people can cast their vote through their smart phones or by using an e-voting website. To achieve the required security we are using OTP (one time password)approach , which is most commonly on the web to tell the difference between a human using a web service and an automated bot thus making the website more secure against spam- bot attacks.

[1]. Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), "Analysis of an Electronic Voting System", In Proceedings of IEEE Symposium on Security and Privacy 2004, pp. 1-23
[2]. CiprianStănică-Ezeanu (2008), "e-Voting Security", Buletinul Universităţii Petrol – Gaze din Ploieşti, Vol. LX (2), pp 93-97
[3]. Manish K, Suresh K.T, Hanumanthappa. M Evangelin G.D (2005), "Secure Mobile Based Voting System", Retrieved online at http:// on November 17th 2012.
[4]. Rossler T.G (2011),"E-voting: A survey and Introduction",Availableathttp://wiki.agoraciudadana. org/images/5/56/An%2BIntroduction%2Bto%2BElec tronic%2BVoting%2BSchemes.pdf Retrieved on 15th June 2012.
[5]. Avi Rubin (2001),"Security Considerations for Remote Electronic Voting over the Internet", AT&T Labs – Research Florham Park, NJ. Available at, (date accessed 7th July, 2012).
[6]. Dr. Aree Ali Mohammed, Ramyar Abdolrahman Timour, "Efficient E-Voting Android Based System", Volume 3, Issue 11, November 2013, ISSN: 2277,128X

Paper Type : Research Paper
Title : MannAnuro: Classification and Identification of Anuran Amphibians using Wireless Multimedia Sensor Network
Country : Brazil
Authors : César Alberto da Silva || Linnyer Beatrys Ruiz

Abstract: This paper evaluates the energy consumption between two approaches that use Wireless Multimedia Sensor Network (WMSN) for classification of amphibians species. The classification on the first approach is made in each of the node sensors, proposal advocated in this paper, while the second, classification is made in sink, traditional approach to literature. Recent studies show that in a WMSN, reducing energy consumption is a major challenge. Both approaches were applied in two experiments using the Castalia simulator. The data analysis showed a significant difference between the two approaches, identifying that the first approach overcomes the second in energy efficiency. Considering the scenario of 25 sensor nodes, one sink node and the 30-second transmission rate, the first approach was 13% more efficient in energy consumption compared to the second. Thus, the first approach significantly increases the network uptime.

Keywords: Anuran, Environmental, Multimedia, Sensor.

[1] M.I. Akbas, M.R. Brust, C.H.C. Ribeiro, and D. Turgut, fAPEbook - Animal Social Life Monitoring with Wireless Sensor and Actor Networks, Global Telecommunications Conference, Houston, Texas, USA, 2011, 1-5.
[2] G. Vaca-Castaño, and D. Rodriguez, Using syllabic Mel cepstrum features and k-nearest neighbors to identify anurans and birds species, IEEE Workshop on Signal Processing Systems, San Francisco Bay Area, California, USA, 2010, 466-471.
[3] L.B. Ruiz, A.A.F. Loureiro, F.A. Silva, T.R.M.B. Silva, R.S. Pozza, J.C.C. Costa, P.C. Gonçalves, and C.A. Silva. Engenharia de Computação Invisível, in W. Meira Jr. and A.F. Souza (Org), Jornadas de Atualizações em Informática da Sociedade Brasileira de Computação, (Rio de Janeiro: PUC-Rio, 2011) 359-408.
[4] M.F. Othman, and K. Shazali, Wireless Sensor Network Applications: A Study in Environment Monitoring System, Procedia Engineering, 41(1), 2012, 1204-1210.

Paper Type : Research Paper
Title : Energy Efficient Geographic Adaptive Fidelity in Wireless Sensor Networks
Country : India
Authors : Payal Walia || Anuj Mehta

Abstract: Wireless sensor network (WSN) is a quickly developing and existing research that has pulled in impressive exploration consideration in the later past. Routing is to figure out the way to send the detected information to the base station. In WSN, Geographic Adaptive Fidelity (GAF) is a location or zone based routing protocol which transmits data on the location information of destination node. It meets desires in three stages i.e. revelation (discovery) stage, dozing (sleep) stage and dynamic (active) stage. In this paper, a protocol which is a improved version of basic GAF i.e. EEGAF is proposed to enhance the discovery stage and reduces the energy utilized by nodes as a part of discovery state & also optimizes the data sending by using location aware multicast data sending protocol called Location Aided Routing (LAR) to decrease consumption of energy by nodes & enhance network lifetime.

[1] G. Nivetha, "Energy optimization routing techniques in Wireless Sensor Networks", International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X, Volume 2, Issue 7, pp. 344-348, July 2012.
[2] Shio Kumar Singh, M P Singh and D K Singh, "Routing protocols in Wireless Sensor Networks - A Survey", International Journal of Computer Science and Engineering Survey, DOI : 10.5121/ijcses.2010.1206, Volume 1, No.2, pp. 63 - 83, November 2010.
[3] Rajashree V. Biradar, V. C. Patil, S. R. Sawant and R.R. Mudholka, "Classification and Comparison of Routing Protocols in Wireless Sensor Networks", Special issue on Ubiquitous Computing Security Systems, UbiCC Journal, Volume 4, pp. 704-711.
[4] Vandana Jindal, A.K.Verma and Seema Bawa, "How the two Adhoc networks can be different: MANET & WSNs", International Journal of Computer Science & Technology (IJCST), ISSN: 0976-8491 (Online), ISSN: 2229-4333(Print), Volume 2, Issue 4, pp.122-126, Oct-Dec. 2011.
[5] Th. Arampatzis, J. Lygeros, and S. Manesis, "A Survey of Applications of Wireless Sensors and Wireless Sensor Networks", IEEE International Symposium on Intelligent Control, ISSN: 2158-9860, DOI: 10.1109/.2005.1467103, pp. 719-724, June 2005.
[6] Wei Feng, Shihang Li and Lin Zhang, "Energy Efficiency: Optimal Transmission Range with Topology Management in 2-D Ad-hoc Wireless Networks", International Conference on Computer Networks and Communication Systems (CNCS 2012), Accession: 83362725, Volume 35, pp. 26-31.

Paper Type : Research Paper
Title : Lightning Strike and Thunder and its Effect on Television Signal Transmission
Country : Nigeria
Authors : Nweke F. U.

Abstract: The lightning strike and thunder and its effect on television signal transmission in Nigerian Television, NTA Abakaliki Nigeria was analyzed. From the analyses, it was observed that lightning and thunder strike affects television transmissions. This is paramount at the beginning and end of the raining seasons of every year. The result showed that the lightning strike and thunder effect causes image fading lost of signal, breaking of images and sometimes causes the station to be out of broadcast. National Communication Commission, NCC should ensure that all television stations in Nigeria be digitalized and powerful/modern lightning arrester and surge protection device be installed to avert the effects of lightning strike and thunder on their stations to keep transmitter "ON" during transmission. Keyword: Television, Transmission, Transmitter, Lightning strike, Thunder strike, Lightning arrester and Broadcast.

[1]. Technical data sheet (2002). A lightning strike. On line 00816-1100-3047 Rev, CA
[2]. Benjamin F. (1970). Lightning Physics and lightning protections. Institute of Physics Publication, Philadelphia.
[3]. Martin, G. and Kvicera, V. (2003). Refractive Index Measurement at TV Tower Prague, Radio Engineering. Vol. 12, 5-7.
[4]. Martin, A. U. (1986). All about lightning. Dover publication
[5]. John E. (1998). Rain attenuation on Ka, Ku, V bands Scientific America Inc.
[6]. Rakov, V and Uman, M. (2003). Lightning Physics and effect. Cambridge University Press

Paper Type : Research Paper
Title : Improved Energy Conscious Dynamic Source Routing (I-ECDSR) for Adhoc Networks
Country : India
Authors : Asif Munir || Sajad Ahmad Mir

Abstract: Adhoc network is a collection of mobile devices that have a capability of organizing themselves into a temporary network. Efficient routing is one of the key challenges in Adhoc networks. In this paper, we propose a new reactive routing protocol for Adhoc networks that takes two factors viz. delay and hop count into consideration for selecting the path between the source and destination. The protocol ensures that path selected is reliable for transmitting data from source to the destination.

Keywords: Ad-hoc Networks, DSR, ECDSR, Delay, Hop Count

[1] Gupta, N.; Gupta, R., "Routing protocols in Mobile Ad-Hoc Networks: An overview," Emerging Trends in Robotics and Communication
[2] Technologies (INTERACT), 2010 International Conference on , vol., no., pp.173,177, 3-5 Dec. 2010 doi: 10.1109/INTERACT.2010.5706220.
[2] Anang, K.A.; Bello, L.; Eneh, T.I.; Bakalis, P.; Rpajic, P.B., "The performance of dynamic source routing protocol to path loss models at carrier frequencies above 2 GHz," Communication Technology (ICCT), 2011 IEEE 13th International Conference on , vol., no., pp.151,155, 25-28 Sept. 2011, doi: 10.1109/ICCT.2011.6157852.
[3] Chakeres, I.D.; Belding-Royer, E.M., "AODV routing protocol implementation design," Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on , vol., no., pp.698,703, 23-24 March 2004, doi: 10.1109/ICDCSW.2004.1284108
[4] Baisakh; Patel, N.R.; Kumar, S., "Energy Conscious DSR in MANET," Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on , vol., no., pp.784,789, 6-8 Dec. 2012, doi: 10.1109/PDGC.2012.6449922

Paper Type : Research Paper
Title : Fuzzy-Genetic Algorithm based inventory model for shortages and inflation under hybrid & PSO
Country : India
Authors : Dr. Kusum Gupta || Dr. Ajay Singh Yadav || Mr. Ankur Garg || Ms. Anupam Swami

Abstract: The purpose of this article is to evaluate the value of integrating inventory decision. Therefore in this paper a inventory model for deteriorating items is considered under assumption that the Inventory cost (including Fuzzy holding cost and Fuzzy deterioration cost), Fuzzy Transportation cost is incurred and is function of distance irrespective of number of items and the capacity of vehicle. Four kinds of meta-heuristic algorithms or meta-heuristic Fuzzy hybrid algorithms: Fuzzy harmony search, Fuzzy particle swarm optimization, Fuzzy genetic algorithms, Fuzzy simulated annealing. A numerical example is presented to illustrate and validate the model and sensitivity analysis is carried out in case-1for different values of a parameter keeping rest unchanged.

[1]. Ali Diabat (2014). Hybrid algorithm for a vendor managed inventory system in a two-echelon supply chain European Journal of Operational Research, Volume 238, Issue 1, 1 October 2014, Pages 114-121.
[2]. Ali Roozbeh Nia, Mohammad Hemmati Far, Seyed Taghi Akhavan Niaki (2014). A fuzzy vendor managed inventory of multi-item economic order quantity model under shortage: An ant colony optimizationalgorithm International Journal of Production Economics, Volume 155, September 2014, Pages 259-271.
[3]. Arindam Roy, Sova Pal, Manas Kumar Maiti (2009). A production inventory model with stock dependent demand incorporating learning and inflationary effect in a random planning horizon: A fuzzy genetic algorithm with varying population size approach Computers & Industrial Engineering, Volume 57, Issue 4, November 2009, Pages 1324-1335.
[4]. Ata Allah Taleizadeh, Seyed Taghi Akhavan Niaki, Mir-Bahador Aryanezhad, Nima Shafii (2013). A hybrid method of fuzzy simulation and genetic algorithm to optimize constrained inventory control systems with stochastic replenishments and fuzzy demand Information Sciences, Volume 220, 20 January 2013, Pages 425-44.
[5]. Ata Allah Taleizadeh, Seyed Taghi Akhavan Niaki, Mir-Bahador Aryanezha (2009). A hybrid method of Pareto, TOPSIS and genetic algorithm to optimize multi-product multi-constraint inventorycontrol systems with random fuzzy replenishments Mathematical and Computer Modelling, Volume 49, Issues 5–6, March 2009, Pages 1044-1057.

Researcher can also search IOSR published article contents through

IOSR Xplore