• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues
    +91-9950712474

    Volume-6 Issue-4


    Title: A Brief Review on Security Attacks in Cognitive Radio Wireless Sensor Networks

    Authors: SHAHID.K. K and VIJITHA.S

    Abstract: Wireless Sensor Network (WSN) usually operate in unlicensed spectrum bands. Most of the networks use ISM bands, like 2.4 GHz band and the same band is also used by a large number of popular wireless applications. The gradual increase in the WSN based system make the unlicensed frequency bands overcrowded. The coexistence of multiple communication networks with a huge number of devices transmitting in the same frequencies has become a challenge in spectrum allocation. The coexistence issues in unlicensed frequency bands are a subject of extensive research. This problem is going to become acuter with the continuous growth of WSNs. These networks usually have a large number of nodes that transmit at the same time in a limited area. Therefore, new collaborative strategies to share the spectrum are needed. Cognitive Radio( CR) is introduced as a solution to this problem. Adoption of this CR feature into WSN will improve the performance of the sensor networks. The networks that combine all the features of both CR and WSN are termed as CRWSN. A CRWSN has many constraints and many different features compared to traditional WSN. These differences and constraints often affect their security. The security models are generally rooted from WSNs and do not fit the specifications of Cognitive Radio network. This paper deals with the CRWSN security problems.

    Download file

    Title: Peak-to-Average-Power-Ratio (PAPR) Reduction Techniques in Multicarrier Modulated Signals for LTE

    Authors: Samreen Kosser, Arshid Iqbal Khan and Vikas Gupta

    Abstract: The data traffic growth in cellular based mobile broad-band networks brusquely the need for higher spectral efficiency and better spectrum usage. One of the solutions to meet this increasing demand for more bandwidth is to shift the existing radio technologies to higher bands of unlicensed spectrum. Multi-carrier Cognitive Radio proves to be the enabling technology to exploit the unused spectrum band by accessing the unlicensed secondary users (Su?s) to dynamically access the licensed spectrum owned by primary users (Pu?s) on the basis of some agreement or on an opportunistic basis. Multi-Carrier modulation (MCM) in Cognitive Radio technology helps in decreasing the equalization complexity and overcoming frequency selective fading. OFDM based Multi-carrier modulation has gained too much importance in the modern communication technology, that it is considered best choice for next generation wireless systems. Multi-Carrier modulation leads to several sinusoids and time domain OFDM is the sum of these sinusoids. Therefore, multi-carrier CR systems are known to have high Peak-to-Average- Power-Ratio (PAPR). The high PAPR degrades the efficiency of power amplifiers and decreases the Signal-to-Quantization- noise ratio of Analog to Digital Converters and Digital to Analog converters. This imposes a non-linear distortion over a communication channel. Thus PAPR problem need to be tackled in more efficient manner in CR systems.

    Download file

    Title: Analyzes the Parameters of Wireless Sensor Network

    Authors: Dr. Sachin. V. Chavan and Dr. Bhimrao. P. Ladgaonkar

    Abstract: Indeed, the Wireless Sensor Network (WSN) is revolutionary field of electronic research and ubiquitously growing across the world, depicting wide spectrum of applications. Wireless Sensor Network is the systematically distributed organization of the smart Sensor Nodes (SN) of an embedded philosophy, wirelessly routed among them and also to the Base Station (BS) through well featured networking protocol, working under the standards of IEEE 802.15.4. The WSN is most suitable for monitoring of environmental data of Site Specific Variability (SSV). The values of the parameters, those are depicting spatio-temporal variation in symmetric or non-symmetric mode, may be accumulated with help of WSN. During early days, the WSN establishment was constrained to the GPS based application. However, paradigm of Wireless Sensor Networks (WSN) is shifted to local area monitoring with low data rate of communication. Recently, the Wireless Sensor Network (WSN) is considered as a pillar technology of the forthcoming era of Internet of Things (IoT). In present paper, the Wireless Sensor Network is elaborated which is used for monitoring of industrial environment parameters. For establishment of the WSN to collect the site specific data, the five sensor nodes of promising capabilities have been successfully designed. In addition to this, to facilitate the Base Station, the inherent part of the WSN, a coordinator is also deployed. Before, implementation of the WSN, it is essential to analyze the WSN parameters. The Coordinator node receives the different parameters and received parameters are analyzed at the base station.

    Download file

    Title: Real Time Human Emotion Recognition Using MAM Pooling Based Convolutional Neural Networks

    Authors: T. Muni Reddy and Dr. R.P. Singh

    Abstract: Now a day?s one of the unsolved problem in computer vision is recognizing or understanding other people's emotions and feelings. In this paper we proposed MAM Pooling (Mean of Average and Maximum) method with CNN to recognize human emotions. We focus on automatic identification of six emotions in real time: Happiness, Anger, Sadness, Surprise, Fear, and Disgust. Convolutional Neural Network (CNN) is a naturally roused trainable design that can learn invariant highlights for various applications. All in all, CNNs comprise of substituting convolutional layers, non-linearity layers and highlight pooling layers. In this paper, a Novel component pooling technique, named as MAM pooling is proposed to regularize CNNs, which replaces the existing pooling activities with a new strategy by taking the average of max pooling and normal pooling strategies. This overcome the over fitting problem encountered by CNN generation.

    Download file

    Title: Comparative Study of Karnataka State Assembly Elections 2018 Using Sentiment Score Method

    Authors: Bharat Naiknaware and Seema Kawathekar

    Abstract: we are studied comparative analysis pf the Karnataka State Assembly elections results that are happened in May 2018. In this research paper we are analysing the twitter data and predict the Karnataka election results. The use of social media is increasing rapidly today. With this increase, there is a lot of meaningful and meaningless data in social media environments. Parallel to this data formation, new working areas have also been formed. Sentiment analysis is an important area of study for generating meaningful information from this large data set. The sentiment analysis study objectively indicates whether a phrase is positive, neutral or negative. That is, it is the process of determining whether the content is positive, negative or neutral. In this study, the analysis of the shares belonging to a certain Twitter user was performed by sentiment analysis method. Score Method is used in the analysis phase. The method extracts and analyses sentimental information from microblogs to predict the popularity of party. The proposed method was used for predicting the result of the 2018 Assembly Karnataka election.

    Download file

    Title: Throughput Maximization of Massive MIMO for 5G Wireless Communication Systems using Convex Optimization Techniques

    Authors: Ab Wahid Bhat, Raqib Rasool Bhat, Saranjeet Singh and Arshid Iqbal Khan

    Abstract: In the past few years Wireless Telecommunication Systems have improved significantly in terms of both efficiency and cost. However, with every passing year the demand for the data rate in increasing exponentially. With the advent of Multiple Input Multiple Output (MIMO) Systems Wireless Communication systems have undergone a transformation. MIMO systems have the ability to communicate with more than a single antenna simultaneously being deployed at both ends of the system. Nowadays spectral efficiency has achieved new limits by the deployment of Massive MIMO technology. This has led to huge improvements in the field of throughput while using the same bandwidth and density of base stations as in current networks. In this paper awe have devised and implemented a new method of maximizing the rate of Massive MIMO Systems using Convex Optimization Techniques. Massive MIMO systems make use of a large number of antennas at both the base stations enabling spatial multiplexing of tens of user terminals. Simulations are performed for 4?4, 8?8, 16?16, 32?32 and128x128 MIMO systems. Simulation results prove that ZF technique performs better at higher power levels.

    Download file

    Title: Enhanced Approach to minimize Makespan and Flowtime using Hybrid Approach of PSO and SSTF

    Authors: Ekta and Dr. Monika Sachdeva

    Abstract: Resource allocation to jobs in cloud become critical to investigate since resources are decaying and need of resources is substantially enhanced. To tackle the issue proposed literature presents a new hybrid strategy of optimal jobs selection within PSO algorithm and SSTF. Nature inspired multi-heuristic PSO approach contains the selection procedure. This selection procedure contained job sorting procedure where jobs are placed within the queue according to least cost and maximum profit. Least cost and maximum profit becomes the fitness function. This queue is presented to the PSO and SSTF for execution and result is obtained. Job selection procedure again sorts the job randomly and procedure of PSO again is performed. The fireflies glowing brightly attract other fireflies indicating solution obtained which is superior is followed by all the other jobs present within the queue. PSO algorithm hybridised with the job selection procedure gives reduced Makespan and Flowtime. Makespan and Flowtime obtained as a result which is improved by 6%.

    Download file

    Title: Review - Women Safety Device Against Atrocities

    Authors: Kirti

    Abstract: INDIA, the country once known for its pureness and respect towards woman, is now turning in a drastic way. The world is becoming unsafe for women in each and every aspect. Nowadays, women and children safety is a prime issue of our society. The victims are increasing day by day. Different techniques and methods were used to safe woman against crime. Examples, using GPS, GSM module, Bluetooth, hidden camera, IOT and microprocessors like ARM, PIC16F877. There are many apps even that are serving safety to woman. This paper contains the same concept but with new techniques. The author wants to develop a device which has no connection with internet, i.e. Without having mobile phones and internet service, there will a device which will safe the life of women.

    Download file

    Title: Analysis of Genomic Sequences of Mycobacterium Tuberculosis using Short time Fourier Transform

    Authors: Sonu Gupta and Devendra Kumar Shakya

    Abstract: As there are two types of Tuberculosis mainly drug susceptible (DS) and drug resistance (DR). Drug resistance can be further classified into Multi drug resistance (MDR) and extremely drug resistance (XDR). Digital signal processing methods have gained attention for the analysis of genomic sequences, since it can be mapped into numerical sequences. Proposed method uses short time Fourier transform (STFT) for the analysis of different genomic sequences of Mycobacterium tuberculosis (MTB) with different resistances. It helps to differentiate between the DS, DR Tuberculosis and MDR, XDR Tuberculosis. Statistical parameters are calculated from STFT coefficients and compared. Identification of drug resistance and drug susceptible resistance leads to appropriate treatment to cure the disease for that particular resistance. Proposed method does not require any wet lab experiment thus this method is much faster than the conventional diagnostic tests.

    Download file

    Title: Histogram Peak Least Center Distance Based Threshold to Segment Brain Tumor from T1 Weighted Contrast Enhanced MRI

    Authors: Ardhendu Mandal, Kanishka Sarkar and Subhro Sarkar

    Abstract: Digital image segmentation is a process of partitioning an image into distinct parts containing each pixel with similar attributes. In Brain tumor segmentation, MRI images play an important role by providing the information of anatomical structure as well as potential abnormalities. Brain tumor segmentation is a sensitive and challenging task to perform because of the variability and complexity of the location, size, shape and texture of the tumor. In this paper, a threshold based segmentation procedure has been implemented in MATLAB to do the proper brain tumor segmentation from MRI images. The procedure incorporates with noise removal functions, segmentation tumor extraction and applicable to detect different types of tumors.

    Download file

    Title: Hybrid Heuristic Algorithm Based Cache Management for Wireless Content Delivery Networks

    Authors: Resmi.A.M and Dr.R.Manicka Chezian

    Abstract: Fast content delivery is the ultimate aim of the current internet scenario. Content caching is one of the techniques to improve the content delivery speed over internet. Especially for multimedia content, the attention and expectation on fast delivery is tremendous. The quality of service (QoS) in the content streaming is improved by deploying optimal cache management. Rapidly increasing consumption of multimedia content in mobile networks brings a complication on effective cache management with QOS considerations. Cache development for content delivery network (CDN), which has high mobility environment, is the main aim of the current proposal. To adopt the inherent characters and functions of content delivery networks with effective cache management, a hybrid heuristic algorithm is developed. It combines the features of linear and non-linear techniques to adopt a better content distribution. Implementation outcome demonstrate the performance improvements of the proposed strategy compared to the performance of existing representative strategies. The comparison has made in terms of service delay, throughput, and the amount of delivered packets within a given delay deadline.

    Download file

    Title: March Based Low Power MBIST Architecture for SRAM

    Authors: G. Rajesh Kumar and K. Babulu

    Abstract: Low power configuration has risen as the most fundamental field of work in VLSI framework plan. In the meantime power dissemination in testing turned out to be more basic while planning testability incorporated in VLSI circuit. Amid testing the plan will expend substantially more power contrasted and typical practical mode. A novel Static Random Access Memory Testing plan is exhibited in this paper, which can test memories utilizing March test algorithms with an incredible decrease in test power. Memory testing in March algorithms is based or many read write operations carried out an each memory location. Like this every byte in the memory is tried various number of times. Sequencing in these testing algorithms is of binary sequencing. Due to the parallel sequencing different number of bits flips in each address pattern. On the off chance that the binary sequencing is supplanted with the proposed low power address decoder, the number of advances in the succession decreases. There by power utilization in the testing diminishes massively. March-Y based Built in Self-Test (BIST) algorithm is depicted utilizing Verilog HDL language and is implemented utilizing Xilinx ISE. Spartan 3E FPGA is utilized to implement the design.

    Download file

    Title: Low-Pass Band-Pass Microwave Filter Design Using Dielectric Resonator with Micro-Strip Line

    Authors: Raqib Rasool Bhat, Ab Wahid Bhat, Saranjeet Singh and Arshid Iqbal Khan

    Abstract: The basic requirement of all the emerging communication systems weather wireless, space or satellite communication links are temperature stability, light weight, low loss, and cost efficient devices. Microwave filters are one of the vital elements of any communication system or microwave link. They are usually realized by means waveguide, coaxial, micro-strip or lumped element resonators. The only filter that brings paramount combination of volume and insertion loss are the dielectric resonator filters. The high Quality factor of the dielectric resonators contribute to lowest possible pass band insertion loss and higher selectivity along with compactness and minimum power requirements [1]. This high quality factor is attributed to their inherent low loss material that satisfies vital demands of emerging wireless communication systems and cellular industry. In this paper we are dedicated to design a dual band filter by using a dielectric resonator that can be used for both the Low pass as well as Band pass operations. The said filter is constructed by placing dielectric resonators with high Quality factor on transmission line keeping in mind that there exists a maximum mutual coupling between the resonators. The objective is to achieve a high Quality factor with miniaturized design. The designed Low pass filter has cut-off frequency of 5.6 GHz and stop band at 5.2 GHz. Also the Band pass filter is designed with pass band of 8.6 to 9.8 GHz.

    Download file

    Title: Survey on Association Rule Mining Technique

    Authors: S.Sathish and Dr.K.Saraswathi

    Abstract: Data mining is defined as process of extracting the useful information and hidden patterns from the largest amount of data and this process is performed based on the knowledge discovery process. One of the most widely used techniques in data mining is association rule mining which refers the process of uncovering relationships among large amount of data. In the data analysis process, Association Rules (AR) is an important work. The related links or associations between itemsets in data are discovered by AR mining. Generally, it consists of two processes for determining the frequent itemsets from the transaction database and finding the association rules based on the frequent itemsets in the second stage. There are different methods and techniques have been proposed for association rule mining. Mainly, this survey focuses on an overview of the literature in association rule mining with various techniques and methods implemented in them, their merits and demerits. In addition, comparison between such techniques is also presented based on the different parameters resulting in the efficiency of each technique in association rule mining is observed and the best association rule mining technique among them is identified.

    Download file

    Title: Sd'X' Principles, Current Trends, Future Directions

    Authors: Manas Kumar Yogi and Chinchinada Meghana

    Abstract: A term advocated by IBM for its "software-defined everything" vision. The firm's Software-Defined Environments (SDE) group is the latest development of technology where the Application, Integration and Middleware group works inside the IBM Software group. According to study, IBM declares "a Software-Defined Environment (SDE) optimizes the entire computing infrastructure ? compute, storage and network resources ? so as to adapt to the type of work required. In modern environment, resources are assigned manually to workloads; that happens automatically in a SDE."By dynamic and strategic assignment of workloads to IT resources based on a variety of factors, including the characteristics of specific applications, the best-available resources, and service-level policies, a software-defined environment can give regular, dynamic optimization and recomposition to address infrastructure issues.

    Download file

    Title: A Critical Review on VANET Environment

    Authors: Kavita Srivastava

    Abstract: VANET is an important area of any network system. Network factors play a valuable and appropriate role in performance evaluation process. Adhoc network is affected with more factors as well as protocols. An effort through performance perspective is to identify the involved factors of network and its probable impact on communication parameters to quantify performance. VANET is taken as key network to performance assessment. It is to be identified that qualifications of protocol performance through inspect indemnity, discriminating, vulnerability and attacks in VANET process. We have studied the communication methods between road traffic simulator SUMO (Simulation of Urban Mobility) and network simulator NS3. By establishing a feedback loop between them, we successfully critical review on coordination protocol to combine the traffic simulation power of SUMO and the network simulation capability of NS3

    Download file

    Title: A Review - Performance analysis of various Multipliers for the design of digital processors

    Authors: M.Prasannakumar and Dr. R. Thangavel

    Abstract: The present paper carries a detailed review on the performance of different multipliers. Multiplier is one of the important module in any processor design. The performance of the processor is mostly depends on the performance of the multiplier used, which is also responsible of reducing memory space. The designing of an efficient multiplier becomes a challenging task for the designers. Meanwhile, recent development in multiplier design with different architecture, algorithms and methodology, synthesized and implemented in various families of Field ? Programmable Gate Array (FPGA) IC?s to conclude with those multipliers will provide enhanced result in the performance of the processor. This paper analyse and discusses the advantage of using the multipliers in the designing of high speed processor.

    Download file

    Title: A watermarking scheme to protect copyright and ownership of Digital Images

    Authors: Sapna B.K and K .L. SUDHA

    Abstract: Security has gained a lot of importance with wide use of internet and it has become difficult for the owner to prove his ownership over the data. In this paper, A zero watermarking scheme to protect copyright and ownership of digital images is proposed. Security is provided to the data (digital images) using encryption so that the data is not misused. First level of encryption is provided using zero watermarking technique, which uses SVD. Another level of encryption is provided using Nibble-insertion technique. The paper also aims at copyright protection to prove ownership over data.

    Download file

    Title: An efficient error tolerant design for parallel filters based on shift operation

    Authors: Sandeep S and Shaurav Shah

    Abstract: In signal processing, analysis of signals that conveys information about some phenomenon comes with a great importance on reliability. Filters perform processing of signals and depending on application used, either discrete-time or continuous-time signals will be involved. Digital filters perform signal processing functions on discrete-time sampled signals and have wide usage in signal processing related applications. With the advancement in technology, complexity of signal processing systems will increase and, in such systems, filters that operate in parallel may also be used. In such complex systems, reliability becomes a matter of concern. Complex signal processing systems also involve parallel filters which may have same response performing operations on different input signals. In this paper, an error detection and correction technique is proposed which can detect and correct error in parallel filters with same response and technique comes with minimal introduction of redundancy. As parallel filters with same response is used, system homogeneity of such a parallel filter system is utilized to enhance it as an error tolerant system by introducing efficient error correcting designs.

    Download file

    Title: DEMS Decoding Algorithm for Low Density Parity Check Codes

    Authors: Sai Supriya G K and Dr. Pushpalatha K N

    Abstract: Digital communication is a prime prerequisite of the up to date world. Its advantages allow content to be vibrant as well as launch new features that were not viable over an analog system. Hence the channel coding is to be selected prudently in turn to add controlled redundancy into the transmitted signal to boost the reliability of transmission against the noise interrupted in the channel and lower the transmission power requirements. Hence for this purpose an optimized min-sum algorithm with density evolution for LDPC code is proposed. The proposed algorithm is called Density Evolved Min-Sum (DEMS) algorithm. In this algorithm unlike other decoding methods, two optimization factors are introduced respective to both check node and bit node of the Min-sum algorithm. The optimization factors are obtained before decoding program, and the same factors are multiplied twice in one cycle. So, the increased complexity is comparatively low.

    Download file

    Title: Braille Box : a smart news reader using Raspberry Pi

    Authors: Tarun Jain, Deepa N P and Yathish. A

    Abstract: According to the World Health organization, 253 million people are assessed to be blind worldwide among which 90% live in developing countries and 45 million visually impaired individuals world-wide [1]. In spite of the fact that, there are several existing solutions to the problem of assisting individuals who are blind to read, however none of them provide a reading experience that in any way parallels that of the sighted population. In particular, there is a need for a portable reader that is affordable and readily available to the blind community. Hence we implement a cost effective solution which will not cost no more than five thousand rupees. We address the integration of a cost effective Braille news reader designed for the visually challenged. The output is character to character conversion of the internet fetched news to Braille format.

    Download file

    Title: Requirements Engineering using Social Networking Sites: A Case Study

    Authors: Sadiq Hussain, Najoua Ribata, Aleeza Safdar, Shima Zarei and Betha Nurina Sari

    Abstract: The social networking sites (SNS) are becoming parts of our daily life. The study was carried out to find out whether the requirement engineering process may be utilized by using SNS. We had used Facebook for our study and created four different groups for this purpose. The model used for this purpose was WinWin spiral model. The authors acted as moderators while the students or friends of the author who had joined the groups act as end users. As the software development changes from the traditional to data-driven approach, the role of end users are also crucial. The end users are globally distributed hence are the authors of this study. Therefore, the study reveals that the SNS may be successfully used as RE tool.

    Download file

    Title: Codes and its Impact on the Performance of the CDMA System

    Authors: Akash Prajapati and Prof. Jyostna V. Ogale

    Abstract: One of the most widely used spread spectrum technology is Code Division Multiple Access (CDMA) which is used to transmit radio signals over telecommunication channel. In CDMA, simultaneous transmission of data takes place at the single frequency. A unique code is assigned to each transmission and before transmission each signal is spreaded. There are different codes used for this purpose. Choice of spreading codes largely affects the performance of any CDMA system. However, the selection of spreading code depends upon the system requirement and has been the most important task on which a proper attention is required. Here, different types of codes are generated and code generation algorithms are implemented using MATLAB and LabVIEW. The comparison of different spreading codes based on the autocorrelation, cross-correlation measures and Bit Error Rate (BER) have been done. During transmission of these codes, SNR (Signal to Noise Ratio) varied to calculate BER.

    Download file

    Title: A Square slot Millimeter Wave Antenna for the 5 G Networks

    Authors: Rahul Shukla and Garima Tiwari

    Abstract: In this paper we study 28GHz square slot square microstrip patch antenna for 5G application is proposed to reviews the objective and requirement of 5G antennas. In this design of antenna is modified for the better gain and return loss with the best possible result using a HFSS simulation software version-13. The square slot patch antenna consist a patch, square shape slot, strip line feed and a ground plane, this proposed antenna design is light weighted, small size and low fabrication cost because square slot reduce the use of copper. The performance of proposed antenna was measured and compared to analyze in term of gain, return loss and radiation pattern at 28GHz frequency.

    Download file

    Title: Mining Competitors and Unstructured Datasets

    Authors: V I SEMMALAR and R A Roseline

    Abstract: Data mining is the prevalent region of the exploration which simplifies the commercial development progression such as mining user favourite, mining web information?s to get attitude about the creation or amenities and mining the competitors of a specific occupational. In the recent competitive trade development, there is a need to analyze the competitive structures and influences of an item that supreme mark its competitiveness. The estimation of competitiveness continuously routines the purchaser thoughts in expressions of reviews, scores and profuse source of evidence?s from the web and other bases. In this technology, a proper explanation of the competitive mining is defines with its related works. Surviving investigation on the preceding has determined on mining near articulations from the web or other biography bases. Despite the fact that such articulations can without a doubt be suggestions of asset, they are truant in frequent spaces. By measuring the numerous papers, we establish the conclusion of basic consequence of the competitiveness between two items on the basis of market segments.

    Download file

    Title: Review of Security and Privacy of Internet of Things from Botnet Attack: Challenges and Solutions

    Authors: Arun Kumar Bediya, Rajendra Kumar

    Abstract: The blast of interconnected devices and the Internet of Things has activated new critical difficulties in the territory of internet security, because of the different devices vulnerabilities and expanded possibilities for cyber-attacks. Botnets are noteworthy in light of the fact that they have become a weapon that both attacker and organized crime utilize to perform illegal online activities. Botnet threat incorporates a plenty of probable attacks running towards drive-by-download malware and spam transportation from distributed denial of service (DDoS). While for more than two decades, methods have been recommended for either making enhance accuracy or quick methods of attack detection, huge part of the harm is done when attacks are contained. IoT botnets are not another marvel. It has widely used to instigate DDoS attack, broadcast spam, take part in man-in-the-middle (MitM) accreditations capturing and different pernicious exercises. IoT is fast growing network of devices and IOT unsecured devices are the new is interest of attackers. This paper describes the series of botnets and their effect on IoT network and ways of protecting IoT networks from botnets.

    Download file

    Title: Browser Integrated Web Content Filtering Using Natural Language Processing

    Authors: Sangita S. Modi and Dr. Sudhir B. Jagtap

    Abstract: Today internet is one of the rapid growing ICT technologies which are used in every field like business, marketing, banking, entertainment, transporting and education etc. over the world. E-learning technology is playing a vital role in modern education which facilitates the student to learn anywhere, anytime, with their own speed and technology. So that, Internet filtering and blocking is very important for a couple of reasons. With the flooding of explicit and violent materials on the Web, educators and parents would like to block these offensive materials from their children. In this paper we proposed a browser integrated client side filter using natural language processing. The web content filtering is used on browser integrated extension which helps to keep children away from accessing offensive contents and encourages to safe e-learning. This filter performs web page text content mining to create keyword database of 2000 e-learning web sites which are collected by survey method. Extracted text from web page used as knowledge base to block the non learning sites in the educational organisation.

    Download file

    Title: A Network Selection in Heterogeneous Wireless Networks Based On MADM Methods

    Authors: Dr.K.Prabha and J.Santhi

    Abstract: The integration of various nevertheless corresponding cellular and wireless technologies in the subsequent generation of wireless statement systems involves the design of intellectual. Vertical handoff decision algorithms to support mobile users to seamlessly switch network access and involvement continuous service continuity anywhere and anytime. In this article we consume used two different MADM methods such as Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) and weighted product methods (WPM) methods for handoff decision and three different networks like WIFI, WIMAX, and UMTS. Different parameters such by way of Bandwidth, Delay, Cast and so on.

    Download file