IOSR Journal of Computer Engineering (IOSR-JCE)

March – April 2016 Volume 18 - Issue 2

Version 1 Version 2 Version 3 Version 4 Version 5

Paper Type : Research Paper
Title : A Rapid and Reliable Receiver for Warning Delivery in Vehicular Ad-Hoc Networks
Country : India
Authors : Anseena A S || Shameem Ansar A

Abstract: Vehicular ad-hoc networks (VANETs) are known for highly mobile and frequently disconnected characteristics. To improve safety, a warning message in VANETs should be delivered both reliably and urgently. In the existing solution, we make consensus of receiver by assigning rank, and the best forwarder is selected by distance to the centroid of the neighbors in need of message. The proposed work aims at overcoming the above limitations.........

[1] Junliang Liu 1,2, Zheng Yangi, 2, and Ivan Stojmenovic1, 3 "Receiver Consensus : On-Time Warning Delivery For Vehicular
Ad-Hoc Network" July 2013.
[2] S. Biswas, R. Tatchikou, and F. Dion, `` Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic
safety,'' IEEE Commun. Mag., vol. 44, no. 1, pp. 74_82, Jan. 2006.
[3] N. Wisitpongphan, O. Tonguz, J. S. Parikh, P. Mudalige, F. Bai, and V. Sadekar ``Broadcast storm mitigation techniques in vehicular
ad hoc networks,'' IEEE Wireless Commun., vol. 14, no. 6, pp. 84_94, Dec. 2007.
[4] S. Olariu and M. Weigle, Vehicular Networks: From Theory to Practice. Cleveland, OH, USA: CRC, 2009.
[5] M.-T. Sun, W.-C. Feng, T.-H. Lai, K. Yamada, H. Okada, and K. Fujimura ``GPS-based message broadcast for adaptive inter-vehicle
communications,'' in Proc. IEEE Veh. Technol. Co nf., Sep. 2000, pp. 2685_2692.

Paper Type : Research Paper
Title : A Novel Framework for Dependable Cloud Computing
Country : Nigeria
Authors : Dr. Roy Joel Ureigho || Edje Abel || Felix Elugwu

Abstract: The cloud computing is one technology that has taken the computing world by storm with potent opportunities that are so tempting to ignore. Yet many are skeptical about its adoption because of the many problems that came with internet usage. The belief is that since cloud computing is an offshoot of internet, there are possibilities of multifaceted problems possibly inherited from Internet....
Keywords: cloud computing, dependable cloud computing, internet, securityg

[1]. R. Sailer,E. Valdez, T. Jaeger, et al., sHype: Secure hypervisor approach to trusted virtualized systems,RC23511, IBM, Yorktown Heights, NY 2005. (On-line:
[2]. N. Santos, K.Gummand, and R. Rodrigues, Towards trusted cloud computing,In: Workshop on hot topics in cloud computing, San Diego, CA, 2009.
[3]. M. Jensen, J. Schwenk, N. Gruschka. and L. Iacono, On technical security issues in cloud computing,In: IEEE International Conference on Cloud Computing (CLOUD-II 2009), Bangalore, India, September 2009, 109-116.
[4]. F.J. Krautheim, Building trust into utility cloud computing, doctoral diss., University of Maryland, Baltimore County, Baltimore, MD, 2010.
[5]. R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, B. S. Lee, TrustCloud: A framework for accountability and trust in cloud computing. HP Laboratories HPL-2011-38, 2011.

Paper Type : Research Paper
Title : Recommender Systems to Address New User Cold-Start Problem with User Side Information
Country : India
Authors : M. Sunitha || Dr. T. Adilakshmi

Abstract: Due to exponential growth of Internet, users are facing the problem of Information overloading. Recommender Systems (RS) serve as an indispensible tool to solve information overloading problem. Due to their great commercial value, recommender systems have also been successfully deployed in industry, such as product recommendation at Amazon, music recommendation at iTunes, movie recommendation at Netflix, etc.....

Keywords: Information Overloading, collaborative filtering, recommender system, Social Network, Social matrix.

[1]. Jovian Lin, Kazunari Sugiyama, Min-Yen Kan, Tat-Seng Chua, Addressing Cold-Start in App Recommendation: Latent User Models Constructed from Twitter Followers, SIGIR'13, July 28–August 1, 2013, Dublin, Ireland
[2]. Daqiang Zhang, Qin Zou, Haoyi Xiong, CRUC: Cold-start Recommendations Using Collaborative Filtering in Internet of Things, Elsevier ESEP, 9-10 December 2011, Singapore
[3]. F. Ricci, L. Rokach, B. Shapira, and P. B. Kantor, Eds., Recommender systems handbook. Springer US, October 2011
[4]. Xiwang Yang, Yang Guo, Yong Liu,Bayesian-Inference-Based Recommendation in Online Social Networks, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013
[5]. Ko-Jen Hsiao, Alex Kulesza, and Alfred O. Hero,Social Collaborative Retrieval, arXiv:1404.2342v1 [cs.IR] 9 Apr 2014

Paper Type : Review Paper
Title : Aspect Based Sentiment Analysis Survey
Country : India
Authors : Naveen Kumar Laskari || Suresh Kumar Sanampudi

Abstract: Sentiment analysis or Opinion mining is becoming an important task both from academics and commercial standpoint. In recent years text mining has become most promising area for research. There is an exponential growth with respect to World Wide Web, Mobile Technologies, Internet usage and business on electronic commerce applications.

Keywords: Sentiment Analysis, Aspects, Term, Opinion Mining and Polarity.

Journal Papers
[1]. K Vivekanandan International Journal of Computer Applications, "Aspect Based Sentiment Analysis:Survey", Volume 106-No.3
[2]. Liu, Bing. "Sentiment analysis and opinion mining." Synthesis Lectures on Human Language Technologies 5.1 (2012): 1-167.
[3]. Pang, Bo, and Lillian Lee. "Opinion mining and sentiment analysis." Foundations and trends in information retrieval 2.1-2 (2008): 1-135.
[4]. Pavlopoulos, Ioannis, and Ιωάννης Παυλόπουλος. "Aspect based sentiment analysis." (2014).
Proceedings Papers
[5]. Toh, Zhiqiang, and

Paper Type : Research Paper
Title : Direction-Length Code (DLC) To Represent Binary Objects
Country : India
Authors : Dr G D Jasmin || M G Justin Raj

Abstract: More and more images have been generated in digital form around the world. Efficient way of description and classification of objects is a well needed application to identify the objects present in images. Shape is an important visual feature of an image.....

[1]. H. Freeman, "On the Encoding of Arbitrary Geometric Configurations," in Proceedings of IRE Translation Elec-tron Computer, New York, pp-260-268, 1961.
[2]. J.W. Mckee, J.K. Aggarwal, Computer recognition of partial views of curved objects, IEEE Trans. Comput. C-26 790–800 (1977).
[3]. R. Chellappa, R. Bagdazian, Fourier coding of image boundaries, IEEE Trans. Pattern Anal. Mach. Intell. 6 (1) 102–105 (1984).
[4]. C.W. Richard, H. Hemami, "Identi1cation of three dimensional objects using Fourier descriptors of the boundary curve", IEEE Trans. System Man Cybernet, SMC-4 (4) 371–378 (1974).
[5]. Torralba, A., Oliva, A., Freeman, W. T., Object recognition by scene alignment [Abstract]. Journal of Vision, 3( 9): 196, 196a (2003)

Paper Type : Research Paper
Title : Remote Queue Handling At Filling Stations (EasyQ)
Country : Pakistan
Authors : Salman Afghani || Saad Ahmed Khan || Hassaan Shahid Butt ||Muhammad Waqas and Muhammad Ishfaq Javed

Abstract: In countries with social and economic disorder, people are daily part of different queues in different situations, especially for the working class after a hectic day at office when they have to be part of long queues at Filling stations. And after waiting for several hours, they aren't sure that they will be able to get the Fuel. It makes the people uncomfortable because it disturbs their daily routine. This factor effects heavily and adversely on the economy of developing countries.

[1]. Investopedia, "Queuing Theory," 2001
[2]. M. Rouse, "Queue," 2005
[3]. Z. R. Mohsin., "The Crisis of Internally Displaced Persons (IDPs) in the Federally Administered Tribal Areas of Pakistan and their Impact on Pashtun Women" 2013.
[4]. B. Reporter, "BPCL provides automation system to fuel stations," 2011.
[5]. Raytheon, "AutoTrac Air Traffic Management System," 2011.
[6]. Qmagik, "Queue Management System," 2011.

Paper Type : Research Paper
Title : Heteroleach Protocol for Improvement of Stable Operation of Wireless Sensor Networks
Country : India
Authors : Rashmi Jain || Manali Kshirsagar || Latesh Malik

Abstract: Wireless sensor networks(WSN) are very much sensitive to energy consumption by the sensor nodes. Many protocols have been designed for efficient use of energy of the nodes so that the lifetime of the network can prolong. The sensors consume more energy in communication of sensed information to the base station as compared to actually sensing the physical phenomena and processing it. Therefore selection of proper routing protocol for communication is crucial in sensor networks.

Keywords:heterogeneous nodes, multiplying factor α, network lifetime, dynamic clustering, setup phase, steady state phase

[1]. "A review on wireless sensor networks routing protocol: Challenge in energy perspective" Ismail Ahmedy, Md. Asri Ngadi, Syaril
Nizam Omar and Junaid Chaudhry, Scientific Research and Essays Vol. 6(26), pp. 5628-5649, 9 November, 2011.
[2]. "Compression of Various Routing Protocol in Wireless Sensor Network‟, Parul Kansal, Deepali Kansal, Arun Balodi, International
Journal of Computer Applications (0975 – 8887) Volume 5– No.11, August 2010.
[3]. "A Dynamic Clustering Protocol for Wireless Sensor Networks", Zhi-kun Liu, Zhong Liu, 2011 International Conference on
Computational and Information Sciences , 978-0-7695-4501-1/11 , 2011 IEEE.
[4]. "Energy efficient and secure pattern based data aggregation for wireless sensor networks" , P.Nair ,H.Cam, S.Ozdemir and D. M
Espda, IEEE Confrence on cations IEEE Sensors, Volume: 2,2003,pp732-736.
[5]. "A survey on clustering algorithms for wireless sensor networks", Ameer Ahmed Abbasi, Mohamed Younis, Computer
Communications 30 (2007) 2826–2841.5

Paper Type : Research Paper
Title : Performance Measurement of WLAN Based On Medium Access Control for Wirelessly Connected Stations
Country : Bangladesh
Authors : Md. Abbas Ali Khan || Atif Ul Aftab || , Md. Imran Hossain Imu

Abstract: This paper is mainly focuses on the Medium Access Control (MAC) sublayer of the IEEE 802.11 standard for Wireless Local Area Network (WLAN) and delay measurement among the network and also compare of the traffic load. The MAC sublayer is standard mainly includes two fundamental access methods. One is called DCF (Distributed Coordination Function), which uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) approach. Other is PCF (Point Coordination Function), which is based on polling to determine the station that can transmit next.

Keywords: DCF, Delay, MAC and PCF.s

[1] Stallings William, Wireless Communication & Networks. 2nd edition, P-435, prentice- Hall of India, New Delhi-110 0001
[2] Larry L. Peterson & Bruce S. Davie, Computer Networks: A System Approach, 4th edition, section 2.8.2, P-140

Paper Type : Research Paper
Title : A Survey on Load Balancing Techniques in Cloud Computing
Country : India
Authors : Geetha Megharaj || Dr. Mohan K.G.

Abstract: Load Balancing is the one of the most significant parts in distributed environments. As Cloud Computing is one of the best platform that gives storage of data in very minimal cost and accessible for all time over the internet, load balancing for the cloud computing has turned into a very interesting and important study area......

keywords: Cloud Computing, Load Balancing.

[1] A. Beloglazov, and R. Buyya, Energy efficient resource management in virtualized cloud data centers, Proc. 10th IEEE/ACM international conference on cluster, cloud and grid computing, 2010, 826-831.
[2] Qi Zhang, Lu Cheng, and Raouf Boutaba, Cloud computing: state-of-the-art and research challenges, Journal of Internet Services and Applications, 1(1), 2010, 7-18.
[3] Amandeep Kaur Sidhu, and Supriya Kinger, Analysis of Load Balancing Techniques in Cloud Computing, International Journal of Computers & Technology, 4(2), 2013, 737-741.
[4] R. Mishra, and A. Jaiswal, Ant colony optimization: A solution of load balancing in cloud, International Journal of Web & Semantic Technology, 3(2), 2012, 33.
[5] E. Caron, L. Rodero-Merino, F. Desprez, and A. Muresan, Auto-scaling, load balancing and monitoring in commercial and open-source clouds, 2012.

Paper Type : Research Paper
Title : Energy Secure Dynamic Source Routing (ESDSR) Protocol For (MANET)
Country : Pakistan
Authors : Hina Khalid || Tahir Nawaz

Abstract: MANET (Mobile Ad-hoc Network) is an unstructured, self-organized and self-deployment network. It can be set up anywhere, anytime because there is no need of centralize base station. Nodes in MANET are connected by one another via wireless medium. In most cases node's life is limited due to its power resource, therefore to limit the power consumption is a critical issue in MANET.....

Keywords: DSR, Energy Consumption, MANET, Ns-3, Routing Protocols,

[1] A. O. Bang and P.L. Ramteke, MANET: History, Challenges and Applications, International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2 (9), 249-251, 2013.
[2] M. Karimi, Quality of Service (QoS) Provisioning in Mobile Ad-Hoc Networks (MANETs), in Prof. Xin Wang (Ed.), Mobile Ad-Hoc Networks: Protocol Design, 2,( 2011), 23-39.
[3] Y. Wang, Study on Energy Conservation in MANETS, Journal of Networks (JNW), 5(6), 708-715, 2010.
[4] S. E. Kafhali and A. Haqiq, Effect of Mobility and Traffic Models on the Energy Consumption in MANET Routing Protocols, International Journal of Soft Computing and Engineering (IJSCE), 3(1), 2013, 242-249.
[5] M. Fotino and F.D. Rango, Energy Issues and Energy aware Routing in Wireless Ad-hoc Networks in Prof. Xin Wang (Ed.), Mobile Ad-Hoc Networks: Protocol Design, 15, (2011), 23-39.

Paper Type : Research Paper
Title : Sketch Based Image Indexing and Retrieval
Country : India
Authors : Deepali Verma || Mohd. Saif Wajid

Abstract: Content based image retrieval (CBIR) is the technology widely used in present era. The main purpose of the CBIR based systems is to excerpt visual features of an image like color, texture, shape or any combination of them. In the previously existing systems, images are manually annotated with keywords and then retrieved using text-based search methods......
Keywords: CEDD, Clustering, K-Mean Clustering, Descriptors, Texture, Quantization, Fuzzy Linking etc.

[1] B.Sz´ant´o, P. Pozsegovics, Z. V´amossy, Sz. Sergy´an: "Sketch4Match– Content-based Image Retrieval System Using Sketches",
9th IEEE International Symposium on Applied Machine Intelligence and Informatics, January 27-29, 2011.
[2] M. Flickner, H.S. Sawhney, J. Ashley, Q. Huang, B. Dom, M. Gorkani, J. Hafner, D. Lee, D. Petkovic, D. Steele, and P. Yanker,
"Query by Image and Video Content: The QBIC System," IEEE Computer 28, Sept. 1995.
[3] Wong, K.-M., Cheung, K.-W., Po, L.-M.: "MIRROR: an interactive content based image retrieval system." In: Proceedings of IEEE
International Symposium on Circuit and Systems 2005.
[4] Konstantinos Zagoris, Savvas A. Chatzichristofis, Nikos Papamarkos and Yiannis S. Boutalis "Img (Anaktisi): A Web Content
Based Image Retrieval System", IEEE 2009.
[5] B. S. Manjunath, J.-R. Ohm, V. V. Vasudevan and A. Yamada, "Color and texture descriptors", IEEE Trans. Circuits Syst. Vid.
Technol. 11(6) (2001).

Paper Type : Research Paper
Title : Voice Over Wifi Performance Evaluation and Comparisons of IEEE.802.11 B, A, G, N Releases
Country : Sudan
Authors : Mudathir Babiker Idris Babiker || Dr. Amin Babiker A/Nabi Mustafa

Abstract: Cellular networks are not always available indoors, either at home or work. 802.11 WiFi networks can solve part of this problem by providing Voice over WiFi (VoFi) phones or computer with communication devices which make calls through the WiFi network over the internet. Data and calls are improved significantly because IEEE 802.11 standard is typically introduced to cover indoor spaces.

Keywords: IEEE 802.11a,b,g,n, throughput ,delay, packet drop and opent.

[1]. Rich Watson, "Understanding the IEEE 802.11ac Wi-Fi Standard" MERU Networks, 2012.
[2]. Sourangsu Banerji,Rahul Singha Chowdhury, "On IEEE 802.11: Wireless LAN Technology"International Journal of Mobile
Network Communications & Telematics (IJMNCT) Vol. 3, Issue. 4, 2013.
[3]. Ibrahim Eltaher, Dr. Amin Babiker, Dr. Ahmed Salah, "Performance Evaluation and Comparisons of IEEE.802.11 Releases a,b,g
and n Using OPNET Simulator" International Journal Of Advances in Engineering and Management (IJAEM) Volume 2, Issue 2,
February - 2015.
[4]. Aqsa Malik, Junaid Qadir, Basharat Ahmad, Kok-Lim Alvin Yau, Ubaid Ullah, "QoS in IEEE 802.11-based Wireless Networks: A
Contemporary Survey" arXiv: 1411.2852v1 [cs.NI] 11 Nov 2014.
[5]. Raju Sharma, Dr. Gurpal Singh, Rahul Agnihotri "Comparison of performance analysis of 802.11a, 802.11b and 802.11g standard",

Paper Type : Research Paper
Title : Smart GNC scheme forAutonomous Planetary Landing
Country : Saudi Arabia
Authors : Ibrahim Mustafa Mehedi

Abstract: The moon or other nearest planets are important destinations for space science and the smart landing is key technology for exploring the different planets without fail. Due to the long round-trip delay of communication with the earth a pinpoint autonomous GNC (guidance-navigation-control) system will be suitable for precise landing. Hazard avoidance is another key issue for a safe landing of future planetary missions......

Keywords: Planetary landing;Autonomous;Hazard detection and avoidance

[1]. Misu, T., Hashimoto, T., Ninomiya, K., "Optical Guidance for Autonomous Landing of Spacecraft", IEEE Transactions on
Aerospace and Electronic Systems Vol. 35, no. 2, April 1999.
[2]. Robert W. Gaskell, "Determination of Landmark Topography From Imaging Data", 25th Annual AAS Guidance and Control
Conference,Vol 111, pp. 167-180, 2002.
[3]. Yang, C., Adnan, A. "Land mark based position estimation for pinpoint landing on Mars", Proceedings of the 2005 IEEE
International Conference on Robotics and Automation Vol. 22, Issue 22, pp. 4470-4475, 2005.
[4]. Nasab, N. M., Analoui, M., Delp, E. J. "Robust and efficient image segmentation approaches using Markov random field models."
In Journal Electronic Imaging, Vol.12, No.1, pp. 50-58, 2003.
[5]. Kindermann, R., Snell, J. L., "Markov Random Fields and Their Applications." Contemporary Mathematics, American
Mathematical Society, 1980.

Paper Type : Research Paper
Title : 3d Object Recognition Using Centroidal Representation
Country : Iraq
Authors : Anwer Subhi Abdulhussein Oleiwi

Abstract: Three dimensional object recognition from two-dimensional image is implemented in this work with the use of 512 different poses of the object (which is represented by an airplane or a cube or a satellite). The object is rotated in the three directions (x,y,z) by an angle of 2/8 rad. (45). Centroidal sample representation was used to represent the data extracted from the object. Also four or five variables for each object are calculated.

Keywords: Three Dimensional Objects, Two-Dimensional Image, the Mathematical Model, Wavelet Transform, Autoregression Model

[1]. Chuin-Mu Wang,"The human-height measurement scheme by using image processing techniques", Information Security and
Intelligence Control (ISIC), International Conference on IEEE,2012.
[2]. Stefan Haas," Computers & Graphics", Volume 18, Issue 2, Pages 193–199, March–April 1994.
[3]. Hongbin Zhaa1, Hideki Nanamegia, Tadashi Nagataa, "ecognizing 3-D objects by using a Hopfield-style optimization algorithm for
matching patch-based descriptions", Volume 31, Issue 6, Pages 727–741, June 1998.
[4]. Haitham Hasan , S. Abdul-Kareem,"Static hand gesture recognition using neural networks", Artificial Intelligence Review,Volume
41, Issue 2, pp 147-181, January 2012.
[5]. Duan-Yu Chen , Yuan Ze Univ ,Chungli, Taiwan, "An online people counting system for electronic advertising
machines",Multimedia and Expo, IEEE International Conference. ICME 2009.

Paper Type : Research Paper
Title : A Survey on Multiple Patient Data Semantic Conflicts and the Methods of Electronically Data Exchange Advantages and Disadvantages
Country : Iraq
Authors : Rageed Hussein Hussan Al-Hashemy

Abstract: In last few years heterogeneous healthcare information such as electronically patient data has gains a great attention especially from clinicians, researchers, health care organizations. The government of united stat of America had urged for widespread adoption of Electronic Health Records or Medical Records (EHRs) within the next decade shows the need for electronic patient data exchange....

Keywords: Semantic conflicts, Healthcare system, EHR

[1] Beale T. and Hear S., 2005 Beale T, Hear S.: Archetype definition and principles.(Revision 0.6), March 2005
[2] Claus B., 2004 Claus Boyens, Ramayya Krishnan and Rema Padman: On Privacy-Preserving Access to
Distributed Heterogeneous Healthcare Information, 2004
[3] Kalra D., 2006 Kalra D.: Electronic Health Record Standards. Methods In Med 2006, 45(1):136-144
[4] Lee.Yi . et al., 2010 Chiw Yi Lee • Hamidah Ibrahim • Mohamed Othman • Razali Yaakob: Resolving semantic
interoperability challenges in XML schema matching, 2010.
[5] Mead C. N., 2006 Charles N.Mead: Data Interchange Standards in Healthcare IT-Computable Semantic
Interoperability: Now Possible but Still Difficult, Do We Really Need a Better mousetrap?,
Journal of Healthcare Information Management — Vol. 20, No. 1, 2006.

Paper Type : Research Paper
Title : Challenges and Current Solutions of Cyber Physical Systems
Country : India
Authors : Lokesh. M. R || Y.S. Kumaraswamy || Tejaswini K.N

Abstract: The interaction among people has been increased rapidly due to advances in internet and increased use of smart phones that are now available at all price ranges. The next step is to improve communication among machines by connecting the machines and giving intelligence to them to communicate among machines by connecting the machines and giving intelligence to them to communicate with other machines and also to interact with people..

Keuwords: Cyber-Physical system, Architecture, monitoring and actuator, Communication Network, Computation and Control Operations

[1]. Wang, Eric Ke, et al. "Security issues and challenges for cyber physical system." Proceedings of the 2010 IEEE/ACM Int'l
Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing. IEEE
Computer Society, 2010.
[2]. Shi, Jianhua, et al. "A survey of cyber-physical systems." Wireless Communications and Signal Processing (WCSP), 2011
International Conference on. IEEE, 2011.
[3]. Gunes, Volkan, et al. "A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems." TIIS 8.12 (2014): 4242-
[4]. Neuman, Clifford. "Challenges in security for cyber-physical systems." DHS: S&T workshop on future directions in cyber-physical
systems security. Vol. 7. 2009.
[5]. Sun, Meng. "Challenges on Coordination for Cyber-Physical Systems."Applied Mechanics and Materials. Vol. 347. 2013..

Paper Type : Research Paper
Title : Intermediate Guardianship Based Routing Protocol In MANET
Country : India
Authors : Arati Patel || Rajan Patel

Abstract: Mobile Ad hoc network (MANET) is wireless infrastructure-free network. Nodes are connected via wireless channels and can use multiple hops to exchange data. MANETs are characterized by large end to end communication latency and lack of end to end path from a source node to its destination node. Energy is indispensable factor in case of Ad hoc networks. Routing in such networks is a challenge because of characteristics..

Keywords: AODV, Energy Consumption, Routing

[1]. Toh,C.-K., Delwar, M., Allen,D.: Evaluating the communication performance of an ad hoc wireless network. Wireless
Communications, IEEE Transactions on , vol.1, no.3, 2002, pp. 402-414
[2]. IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems-Local and
Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications, IEEE 1997
[3]. Lidong, Z. ,Zygmunt, J.H. :Securing Ad Hoc Networks, Network, IEEE Volume 13, Issue 6, 1999, pp, 24-30
[4]. Uma Rathore Bhatt, Priyanka Jain, RakshaUpadhyay.: Enhanced AODV- An Energy Efficient Routing Protocol for MANET, IEEE
[5]. Kuosmanen, P. Classification of Ad Hoc routing protocols. Finnish Defence Forces, Naval Academy, Finland, petteri.kuosmanen@ 2002

Paper Type : Research Paper
Title : m-Governance in Higher Education institutions: Technology Infrastructure for Cutting-edge Connectivity to stakeholders
Country : India
Authors : E.Ramaganesh || Dr. E. Kirubakaran || Dr. R. Gobi

Abstract: Despite its early stage, m-governance seems to have a substantial influence on the generation of set of complex strategies and tools for e-governance efforts and on their roles and functions. M-governance is inevitable. The number of people having access to mobile phones and mobile internet connection is increasing rapidly.....

Keywords: M-Governance, Technology Infrastructure and m-Governance framework.

[1]. Berners-Lee, T., Hendler, J., Lassila, O., (2001), "The Semantic Web", Scientific American, May 2001.
[2]. Heflin, Jeff, 2001, Towards the Semantic Web: Knowledge Representation in a Dynamic, DistributedEnvironment, PhD Thesis,
University of Maryland, College Park.
[3]. Hellström, J., 2009 forthcoming. Mobile Democracy – Challenges and Way Forward. In Big Brother and Empowered Sisters,
Uppsala University
[4]. McGuinness, D. L., & van Harmelen, F., eds. 2004, OWL Web Ontology Language - Overview , W3C Recommendation 10.
[5]. Sadeh, Norman, 2002, M-Commerce: Technologies, Services and Business Models, John Wiley and Sons, Inc, Canada and USA..

Paper Type : Research Paper
Title : Smart Blood Bank as a Service on Cloud
Country : India
Authors : Bharathwaj Muralidaran || Akshay Raut || Yogesh Salve || Shivshankar Dange || Likhesh Kolhe

Abstract: We all know the working of blood bank management system. A blood bank is a cache or bank of blood or blood components, gathered as a result of blood donation or collection, stored and preserved for later use in blood transfusion.[1] In this project our aim is to develop a web application, which will be hosted on cloud and will provide fast and easy access to reports......

Keywords: Cloud computing, information about the basic blood bank services, online blood bank services, concept of DBMS..

[4]. http://www.Ehow.Com/about_5568190_importancebloodbanks.Html
[5]. www.Wikipedia.Com/Cloud

Paper Type : Research Paper
Title : Cloud Based Global Pharma Solutions
Country : India
Authors : Nikhil Lohar || Pratik Mhatre || Ankush Lad || Akash Gaikwad || Smita Kulkarni

Abstract:Cloud Technology consists of Software-As-A-Service (SAAS) model, which gives many users the freedom to use the single application in which the application will be hosted centrally for the customers. In Current scenarios customers have their own software's which are managed by themselves. The term SAAS would provide advantage known as "Multi-tenancy" in cloud terms, which says that one application can be shared by many users at the same time......

Keywords: Cloud, Inventory System, Pharmaceutical Stores, Multi-tenancy, SAAS.

[3]. A Framework for Migrating Traditional Web Applications into Multi-Tenant SAAS, 2012., pp.100
[5]. Cloud Computing-Overview.pdf, pp.2

Paper Type : Research Paper
Title : An Evaluation of the Influence of Pupils' Physiological Needs Satisfaction on Academic Performance of Public Primary Schools in Eastern Zone of Nakuru Municipality, Kenya
Country : Kenya
Authors : Ondimu Enoch Aming'a

Abstract:This study investigated the influence of physiological needs on academic performance in public primary schools of the Eastern Zone of Nakuru Municipality. The study used survey research design to establish the influence of adequate nutrition, adequate water, adequate sleep, and family well-being on academic performance of class 8 pupils in the area of study. The study target population was 800. 370 respondents were chosen for the study through systematic random sampling. Response rate to the questionnaire administered stood at 72%.........

[1]. Abosi. C. O. (2003). Thoughts on an action plan for the development of inclusive education in Africa. Council for Exceptional Children: Division of International Special Education and Services. Retrieved July 18. 2003. from http://www
[2]. Achoka, J. S. K., Odebero, S., Maiyo, J. K. & Mualuko, N. J. (2007). Access to basic education in Kenya: Inherent Concerns. Educational Research and Review, 2 (10): 275-284.
[3]. Adeyemi, B. (2010). Teacher Related Factors as Correlates of Pupils achievement in social studies in South West Nigeria.Electronic Journal of Research in Educational psychology, 8(1):313-332.
[4]. Akiri, A. A. & Ugborugbo, N. M. (2008). An Examination of genders influence on teachers productivity in secondary schools. J. Soc. Sci, 17(3): 185-191. International Journal of Education and Research Vol. 1 No. 3 March 2013

Researcher can also search IOSR published article contents through

IOSR Xplore