Version-2 (July-August 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the 30 years since HIV/AIDS was first discovered, the disease has become a disturbing pandemic, taking the lives of 30 million people around the world. In 2010 alone, HIV/AIDS killed 1.8 million people, 1.2 million of whom were living in sub-Saharan Africa. In Ethiopia,HIV/AIDS is one of the key challenges for the overall development of Ethiopia, as it has led to a seven-year decrease in life expectancy and a greatly reduced workforce..........
Keyword: Pattern Discovery , Association Analysis,Vulnerable ,Data Mining , HIV/AIDS. .
[1] Comfort A, Patricia A, and Emmanuel I: 'Acceptability of voluntary counselling and testing among medical students in Jos, Nigeria', 2010, 4, (6), pp. 357-361
[2] K, T.G.H.A.P.T.H.E.W.R.L.D.B.A.N.: 'HIV / AIDS in Ethiopia An Epidemiological Synthesis', in Editor (Ed.)^(Eds.): 'Book HIV / AIDS in Ethiopia An Epidemiological Synthesis' (2008, edn.), pp.
[3] Lamptey, P.: 'Facing the HIV/AIDS Pandemic', 2002, 57, (3), pp. 38-42
[4] Williamson, J.: 'Conducting a Situation Analysis of Orphans Vulnerable Children Affected by HIV/AIDS', in Editor (Ed.)^(Eds.): 'Book Conducting a Situation Analysis of Orphans Vulnerable Children Affected by HIV/AIDS' (2004, edn.), pp. February
[5] MIKIYAS G: 'Content-Based Classification Of Ethiopian Nations Music Video Clip '. Msc, Bahir Dar University, 2016
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The last decade has seen tremendous advancements in the field of Multi-Agent Systems. Inter-agent communication is the most integral part of any MAS. The problem of impreciseness and obscurity in agent communication has been swelled with increasing complexity of MAS and deepened with the rise of heterogeneity and diversity in varied platforms of data storage. Another technology with parallel growth is the semantic theory, significantly contributing in providing meaning to expressions thereby reducing ambiguity. The authors here provide two layers of verification of messages............
Keywords: KQML, SPARQL, agent communication, OWL / RDF
[1] Building Custom, Adaptive and Heterogeneous Multi-Agent Systems for Semantic Information Retrieval Using Organizational-Multi-Agent Systems Engineering, O-MaSE, IEEE Explore, ISBN: 978-1-5090-3480-2, Gaurav Kant Shankhdhar, Manuj Darbari.2016.
[2] O-MaSE: A customisable approach to designing and building complex, adaptive multi-agent systems, Scott Deloach, https://www.researchgate.net, 2016.
[3] Gaurav Kant, Atul Verma , Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment, International Journal of Applied Information Systems, 2017
[4] Gaurav Kant Shankhdhar, V K Singh and M Darbari. Article: Legal Semantic Web- A Recommendation System. International Journal of Applied Information Systems 7(3):21-27, May 2014. Published by Foundation of Computer Science, New York, USA.
[5] Tim FININ "KQML as an agent communication language" University of Maryland Baltimore County Baltimore MD USA, 1995.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Nowadays growth of digital data is increasing rapidly. Textual documents created and distributed on the Internet are changing in various forms. All these data or documents are not efficiently useful. We have to analyze large amounts of data in an effort to find correlations, patterns, and insights that is nothing but Data mining. To discover relationship between two or more variables in data we require Data Mining...............
Keywords: Data mining, Text mining, Framework, Methods, Techniques
[1] Sonali Vijay Gaikwad, Archana Chaugule, Pramod Patil, Text Mining Methods and Techniques, International Journal of Computer Applications (0975 8887) VOL. 85, No. 17, JANUARY 2014
[2] Ning Zhong, Yuefeng Li, and Sheng-Tang Wu, Effective Pattern Discovery for Text Mining, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 1, JANUARY 2012.
[3] K.L.Sumathy, M.Chidambaram, Text Mining: Concepts, Applications, Tools and Issues An Overview, International Journal of Computer Applications (0975 8887) VOL. 80, No.4, OCTOBER 2013
[4] Haralampos Karanikas, Babis Theodoulidis Manchester, (2001), Knowledge Discovery in Text and Text Mining Software, Centre for Research in Information Management, UK.
[5] Vishal Gupta, Gurpreet S. Lehal, A Survey of Text Mining Techniques and Applications, JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 1, NO. 1, AUGUST 2009..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Password security is the main issue in today's trends. Everything is based on the internet. For securing our data, files etc. we need password .Password should be secure and safe from third party and it must be safe from shoulder suffering attack, for that purpose we design an authentication scheme at application layer. To secure our password we use AES Encryption technique. This Paper shows the design of effective security issue for password by AES algorithm for encryption and decryption. It is based on AES Key Expansion in which the encryption process is a bit wise exclusive or operation of a set of strings and numbers with the 128 bit key which changes for every set of strings..
Keywords: Authentication, AES algorithm, Encryption, Decryption.
[1] P.Karthigaikumar, Soumiya Rasheed, Simulation of Image Encryption using AES Algorithm IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, 2011, 166-172.
[2] Ahmad Salameh Abusukhon, "Block Cipher Encryption For Text-To-Image Algorithm" International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 50 - 59, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[3] J. V. Gorabal and Manjaiah D. H, "Image Encryption Approach for Security Issues" International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 2, 2010, pp. 59 - 64, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.
[4] B.Subramanyan, Vivek.M.Chhabria, T.G.Sankar babu, Image Encryption Based on AES Key Expansion, 2011 Second International Conference on Emerging Applications of Information Technology 978-0-7695-4329-1/11 $26.00 © 2011 IEEE DOI 10.1109/EAIT.2011.60, 217- 220
[5] About AES – Advanced Encryption Standard, Copyright 2007 Svante Seleborg Axantum Software AB.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Since the origin of wireless communication it has gained huge popularity and acceptance in the whole world, providing a setup which uses minimum amount of cables for transmission of data. There has been an explosive growth in the wireless communications over the last few decades in its applications cellular telephony, wireless internet and wireless home networking arenas. As we have advanced so has the data processed and transmitted has increased exponentially leading to Big Data problems..........
Keywords: Laser power transmission, Receiver, Transmitter, Wireless Network
[1] http://www.ijarcsse.com/docs/papers/April2012/Volume_2_issue_4/V2I40056.pdf. International Journal of Advanced Research in Computer Science and Software Engineering Research Paper: Research Issues in Wireless Networks.
[2] [.Concepts for wireless energy transmission via laser by Leopold Summerer, Oisin Purcell. (http://www.spaceward.org/elevator2010-pb)
[3] H. Singh and S. Singh, ―Energy Consumption of TCP Reno, Newreno, and SACK in Multi-Hop Wireless Networks II ACM SIGMETRICS Perf. Evaluation Rev., vol. 30, no. 1, June 2002, pp. 206-216.
[4] Chip Craig J. Mathias Principal, Farpoint Group COMNET 2003 ―Wireless Security: Critical Issues and Solutions‖ 29 January 2003
[5] IEEE 802.11-1999, IEEE Standard for Local and Metropolitan Area Networks Specific Requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 12, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Semantic web based E-learning Applications |
Country | : | India |
Authors | : | Vinay M || Dr. Deepaanand |
: | 10.9790/0661-1904023438 |
Abstract: Today, the growth in the technological usage in people's life has triggered an increased use of internet in mobile devices among teachers and students in many institutions. They use the technologies not only for the social networking and personal work but also for the discovery of new knowledge to prepare them for the demand of the current industries and world. One of the most valuable innovation in the current technological era is the semantic web...........
Keywords: E-Learning, Semantic Web, Ontology, Semantic Web, Educational Resource
[1] Abazi-Bexheti, L. ; Apostolova-Trpkovska, M. &Kadriu, A. "Learning Management Systems: Trends and Alternatives". 37th International Convention on Information and Communication Technology, Electronics and Microelectric (MIPRO). pp: 773-777. (2014).
[2] "E-Learning", Available at: http://etec.ctlt.ubc.ca/510wiki/Promoting_Success_In_E-Learning_For_The_High_School_Student
[3] Brewster, C. & O'Hara, K. (2007), 'Knowledge representation with ontologies: Present challenges future possibilities', International Journal of Human-Computer Studies 65(7), pp. 563 – 568.
[4] "The semantic web and e-learning", Available at: http://elearnmag.acm.org/featured.cfm?aid=1555528.
[5] Woelk, Darrell, and Paul Lefrere. "Technology for performance-based lifelong learning." IEEE International Conference on Computers in Education,Proceedings., pp. 92-96, 2002.1.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: SMEs (Small and Medium-size Enterprises) are essential drivers for innovation and growth in India. It is observed that SMEs are picking up the most from cloud computing, as it is a complex and costlier task to set-up and run ICT (Information and Communication Technology) in a traditional way. But, many SMEs generally do not see all the information security risks involved in cloud computing and have to compromise on their data at the end. This paper provides a guidance for...........
Keywords: Cloud Adoption, Cloud Computing, Cloud Security, Security Taxonomy, Indian SMEs.
1] Cloud Computing For Small And Medium-Sized Enterprise, Office of Privacy Commissioner of Canada.
[2] Changing the Business Ecosystem, KPMG India, 2011.
[3] IbrahimAS, Hamlyn-HarrisJ, Grundy. Emerging Security Challenges of Cloud Virtual Infrastructure. In: Proceedings of APSEC2010 Cloud Workshop, APSEC'10, 2010.
[4] Catteddu D, Hogben G, "Benefits, risks and recommendations for information security. Tech.rep", European Network and Information Security Agency, enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment.
[5] Security Guidance for Critical Areas of Focus in Cloud Computing. Tech.rep, Cloud Security Alliance, 2009..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The main aim of this work is to propose a novel Computer-aided detection (CAD) system based on a Contextual clustering combined with region growing for assisting radiologists in early identification of lung cancer from computed tomography(CT) scans. Instead of using conventional thresholding approach, this proposed work uses Contextual Clustering which yields a more accurate segmentation of the lungs from the chest volume. Following segmentation GLCM and LBP features are extracted which are then classified using three different classifiers namely Random forest, SVM and k-NN.
Keywords: Computer aided detection(CAD);computed tomography(CT)imaging; lungcancer; Support vector machine(SVM); Random forest(RS); K-NN.
[1] B. S. Morse, Lecture 18: Segmentation (Region Based), 1998-2000.
[2] Giorgio De Nunzio, Eleonora Tommasi, Antonella Agrusti, Rosella Cataldo, Ivan De Mitri, Marco Favetta, Silvio Maglio, Andrea Massafra, Maurizio Quarta, Massimo Torsello, Ilaria Zecca, Roberto Bellotti, Sabina Tangaro, Piero Calvini, Niccolò Camarlinghi, Fabio Falaschi, Piergiorgio Cerello, and Piernicola Oliva, "Automatic Lung Segmentation in CT Images with Accurate Handling of the Hilar Region", Journal of digital imaging, Vol 24, No 1, pp 11-27, 2011.
[3] J. Quintanilla-Dominguez, B. Ojeda-Magaña, M. G. Cortina-Januchs, R. Ruelas, A. Vega- Corona, and D. Andina, "Image segmentation by fuzzy and possibilistic clustering algorithms for the identification of microcalcifications," Sharif University of Technology Scientia Iranica, vol. 18, pp. 580–589, Received 21 July 2010; revised 26 October 2010 accepted 8 February 2011.
[4] Eero Salli, Hannu, J, Aronen, Sauli Savolainen, Antti Korvenoja & Ari Visa 2001, 'Contextual Clustering for Analysis of Functional MRI Data', IEEE transactions on Medical Imaging, vol. 20, no. 5, pp.403-414, 2001.
[5] Linda G. Shapiro and George C. Stockman (2001): "Computer Vision", pp 279-325, New Jersey, Prentice-Hall, ISBN 0-13- 030796-3..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | GPR System to Inspect Underground Distribution Systems |
Country | : | India |
Authors | : | P. Kiran Kumar Reddy |
: | 10.9790/0661-1904025359 |
Abstract: Laboratory experiments were used to investigate the potential of using ground penetrating radar (GPR) to detect problems in the underground distribution system. Surface geophysical methods are noninvasive, trenchless tools used to characterize the physical properties of the subsurface material. This characterization is then used to interpret the geologic and hydro geologic conditions of the subsurface. Many geophysical techniques have been suggested among them Ground penetrating radar (GPR) is one of the common sensor systems for underground inspectios..........
Keywords: GPR, B-scan images, N-row average subtraction, Min-max normalization
[ 1] G. Olhoef, "Applications of ground penetrating radar," in Proc. 6th Int. Conf. Ground Penetrating Radar (GPR'96), Sendai, Japan, Oct. 3, 1996, pp. 1–4.
[ 2] J. D. Young and L. Peters, Jr., "A brief history of GPR fundamentals and applications," in Proc. 6th Int. Conf. Ground Penetrating Radar (GPR'96), Sendai, Japan, Oct. 3, pp. 5–14.
[ 3] Frigui, H. & Gader, P. Detection an discrimination of land mines in ground-penetrating radar based on edge histogram descriptors and a possibilistic k-nearest neighbor classifier. IEEE Trans. Fuzzy Sys., 2009, 17(1), 185-199. doi: 10.1109/TFUZZ.2008.2005249.
[ 4] Torrione, P.A.; Throckmorton, C.S. & Collins, L.M. Performance of an adaptive feature-based processor for a wideband ground penetrating radar system. IEEE Trans. Aerospace Electron. Sys., 2006, 42(2), 644-658. doi: 10.1109/TAES.2006.1642579
[ 5] U. Spagnolini, "Permittivitty measurements of multilayered media with monostatic pulse radar," IEEE Trans. Geosci. Remote Sensing, vol. 35, pp. 454–563, Mar. 1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An IoTbased Smart Architecture for Traffic Management System |
Country | : | India |
Authors | : | Harkiran Kaur || Jyoteesh Malhotra |
: | 10.9790/0661-1904026063 |
Abstract: From the last few yesteryears, traffic management is one of the hot issues for the research. There are verities of vehicles are available in the market according to the different status of people. Nowadays, everyone can buy their own vehicle that increases the number of registered vehicles on roads which leads to enormous problems congestion, pollution, noise, increase in traveling time. To improve the efficiency of the transport system, we use Internet of Things which helps to control the congestion..........
Keywords: Internet of Things (IoT), Radio Frequency Identification (RFID), Wireless Sensor Network (WSN)
[1] G. Aditya, S. Bryan, P. Gerard, and M. Sally, "Smart City Architecture and its Application based on IoT," Sci. direct , Elsevier, vol. 52, pp. 1089–1094, 2015.
[2] N. Lanke, "Smart Traffic Management System," Int. J. Comput. Appl., vol. 75, no. 7.
[3] R. Hawi, G. Okeyo, and M. Kimwele, "Techniques for Smart Traffic Control : An In-depth Review," vol. 4, no. 7, pp. 566–573, 2015.
[4] H. A.-K. I. Al-Bahadly, "Intelligent Parking Management System Based on Image Processing," J. Eng. Technol., vol. 2, pp. 55–67, 2014.
[5] H. O. Al-Sakran, "Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology," Int. J. Adv. computer Sci. Appl., vol. 6, no. 2, 2015
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Conservation of energy and delivery of multimedia information such as image, video and audio data in a stipulated time is one of the major concerns in wireless multimedia sensor networks (WMSN). Unlike wireless sensor networks which senses and communicates scalar data, WMSN senses multimedia data which is helpful in surveillance applications such as monitoring of military, agriculture, infrastructure, and so on. In order to tackle this issue of conserving energy and thereby ensuring longer network lifetime, this paper presents the agent based context aware multipath routing in WMSN..........
Keywords: Context Aware Computing, Multipath Routing, Software Agent, Wireless Multimedia Sensor Networks.
[1] Ian F. Akyildiz, TommasoMelodia, Kaushik R. Chowdhury, "A survey on wireless multimedia sensor networks", Science Direct, Comput.Netw.(2006), doi:10.1016/j.comnet.2006.10.002
[2] Islam T. Almalkawi, Manel Guerrero Zapata, Jamal N. Al-Karakiand, Julian Morillo-Pozo,"Wireless Multimedia Sensor Networks: Current Trends andFuture Directions", Sensors 2010, 10, 6662 – 6717; doi:10.3390/s100706662
[3] RadiMarjan, DezfouliBehnam, BakarKamalrulnizam Abu, LeeMalrey, "Multipath 2012;12:650–85.
[4] A.V. Sutagundar, S.S. Manvi, "Location aware event driven multipath routingin Wireless Sensor Networks: Agent based approach", Egyptian Informatics Journal (2013) 14, 55–65.
[5] Ashok V. Sutagundar, S. S. Manvi, "Context Aware Multisensor Image Fusion for Military Sensor Networks using Multi-Agent system", International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Of Mobile Communication Networks "A Dependent Of Handover Techniques |
Country | : | India |
Authors | : | Shivi Saxena || S.Qamar |
: | 10.9790/0661-1904027484 |
Abstract: Handoff is the procedure providing the connection to the backbone network while a mobile terminal is moving across the boundaries of coverage of two wireless points of connection.An individual set of messages is utilized for each of the handover stages. As the messages are exchanged consequently, a short interval during which the mobile station cannot receive and/or transmit data occurs in the case of the hard handover. This interval is called handover interruption or handover delay.........
Keywords: Handoff, Handover Interruption and Base Station System
[1]. M. Sidi, D. Starobinski, "New call blocking vs handoff blocking in cellular networks," ACM J. Wireless Networks, vol. 3, no. 1, 1997, pp.15–27,1997
[2]. I. F. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu, and W. Wang, "Mobility Management in Current and Future Communications Networks," IEEENetwork, vol. 12, no. 4, pp. 39-49,1998
[3]. S. Thomson and T. Narten, "IPv6 stateless address autoconfiguration," RFC 2462, IETF, December 1998.
[4]. T. Narten, E. Nordmark, and W. Simpson, "Neighbour Discovery for IP Version 6 (IPv6)," RFC 2461, IETF, December 1998.
[5]. N. D. Tripathi, J. H. Reed, and H. F. VanLandingham, "Handoff in Cellular Systems," IEEE Personal Communications, vol. 5, no. 6, 1998, pp. 26-37,1998.