This document summarizes a paper that compares rectangular and circular waveguides through MATLAB simulation. It analyzes key parameters of both waveguides like cutoff frequency, cutoff wavelength, guide wavelength, phase velocity, group velocity, impedance, power, attenuation, and VSWR. The paper aims to simulate and compare these parameters between the two waveguide structures to determine the best guided structure based on the results. It surveys relevant literature on rectangular and circular waveguides. The comparison of waveguide parameters can help identify the best guided structure for a given application.
October 2020: Top Read Articles in Distributed and Parallel systems
1. October 2020: Top Read
Articles in Distributed and
Parallel systems
International Journal of Distributed and
Parallel systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
2. BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY
Nateq Be-Nazir Ibn Minar1
and Mohammed Tarique2
1
Department of Electrical and Electronic Engineering, American International
University, Bangladesh
2
Department of Electronic and Communication, Ajman University of Science and
Technology, United Arab Emirates
ABSTRACT
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones,
game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular
technology for short range wireless communication. However, as the Bluetooth technology becomes
widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the
privacy of a user’s personal information. The security issues of Bluetooth have been an active area of research
for the last few years. This paper presents the vulnerabilities in the security protocols of this technology along
with some past security threats and possible countermeasures as reported in the literatures which have been
surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately
to become more cautious about their private information. Finally, the paper concludes with some
recommendations for future security enhancements that can be implemented in the Bluetooth standard.
KEYWORDS
Bluetooth, encryption, security protocols, security threats, countermeasures, Bluetooth enhancements
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps10.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
3. REFERENCES
[1] “The Bluetooth Blues”, available at http://www.information-
age.com/article/2001/may/the_bluetooth_blues
[2] Bluetooth SIG, Specification of the Bluetooth System: Volume 2, Profile, Version 1.1, Feb. 22, 2001.
available at: https://www.bluetooth.org/About/bluetooth_sig.htm
[3] “The History of Bluetooth”, available at: http://www.bluetomorrow.com/about-
bluetoothtechnology/history-of-bluetooth/bluetoothhistory.html
[4] Monson, Heidi - "Bluetooth Technology and Implications" available at: http://www.sysopt.com/features/
network/article.php/3532506 (1999-12- 14).
[5] “How Bluetooth Works", available at: http://en.kioskea.net/contents/bluetooth/bluetooth-
fonctionnement.php3.
[6] Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, “A light weight protocol to provide
location privacy in wireless body area networks”, International Journal of Network Security and its
Applications (IJNSA), Vol.3, No.2, March 2011
[7] Yasir Arfat Malkani and Lachhman Das Dhomeja, “PSim: A tool for analysis of device pairing methods”,
International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
[8] Kumar, A., et al. Caveat eptor, “A comparative study of secure device pairing methods”, IEEE
International Conference on Pervasive Computing and Communications (PerCom-09). 2009.
[9] Jochen Schiller, “Mobile Communications”, Second Edition, Addison Wesley Publications,
2003, pp. 290-292
[10] Bluetooth Profiles” Bluetooth Resource Center, Palowireless Pty Ltd. available at:
http://www.palowireless.com/ infotooth/tutorial/profiles.asp
[11] SaileshRathi, “Bluetooth Protocol Architecture”, Microware Systems Corporation available at:
http://www.dedicated-systems.com/Magazine/00q4/2000q4_p028.pdf
[12] “Bluetooth Versions”, summary of all the Bluetooth versions released to date, available at:
http://www.bluetomorrow.com/about-bluetooth-technology/general- bluetoothinformation/bluetooth-
versions.html
[13] Bluetooth Version 4.0 Released. Bluetooth SIG, available at: http://www.bluetooth.com/Pages/High-
Speed.aspx
[14] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth Enabled Systems”, Kuopio
University Library, 2009, pp. 55-62
[15] “The BlueBug”, a Bluetooth virus, available at: http://trifinite.org/trifinite_stuff_bluebug.html
[16] John Oates, “Virus attacks mobiles via Bluetooth”, available at:
http://www.theregister.co.uk/2004/06/15/symbian_virus/
[17] F-Secure Article on Lasco.A Worm, available at: http://www.f-secure.com/v-descs/lasco_a.shtml
4. [18] Ford-Long Wong, Frank Stajano, Jolyon Clulow, “Repairing the Bluetooth pairing protocol”. University
of Cambridge Computer Laboratory, available at:
http://www.cl.cam.ac.uk/research/dtg/~fw242/publications/2005-WongStaClu-bluetooth.pdf
[19] Phone pirates in seek and steal mission", Cambridge Evening News, available at: http://www.cambridge-
news.co.uk/news/region_wide/2005 /08/17/
[20] "Going Around with Bluetooth in Full Safety”, available at:
http://www.securenetwork.it/ricerca/whitepaper/download/ bluebag_brochure.pdf
[21] Yaniv Shaked, Avishai Wool, “Cracking the Bluetooth PIN” School of Electrical Engineering Systems,
Tel Aviv University, available at: http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/
[22] Keijo Haataja, “Security Threats and Countermeasures in Bluetooth-Enabled Systems”, Kuopio
University Library, 2009, pp. 68-80
[23] Colleen Rhodes, “Bluetooth Security”, East Carolina University, pp.6-9
[24] Karen Scarfone and John Padgette, (Bluetooth Threats) “Guide to Bluetooth Security”, Computer
Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008, pp.
25-26
[25] Raquel Hill and Billy Falotico, “Bluetooth Wireless Technology Security Threats and Vulnerabilities”,
Indiana University Bloomington, 2008, pp. 7-8
[26] Karen Scarfone and John Padgette, (Bluetooth Vulnerabilities) “Guide to Bluetooth Security”, Computer
Security Division - National Institute of Standards and Technology, US Department of Commerce, 2008,
pp.24-25
AUTHORS
Nateq Be-Nazir Ibn Minar is a Research Scientist currently rendering his expertise
independently to institutions and manufacturing industries. He obtained his
Bachelor of Science degree in Electrical and Electronics Engineering, with a
special interest in Robotics and Industrial Automation, from American International
University - Bangladesh in 2008 and later obtained his Master of Science degree, in
Telecommunication Engineering, focusing on Wireless Networks. His research
interests include satellite communications, network security, low-powered wireless
devices, industrial automation, robotics and green technology. He is the CEO of
EcoWave – a company dedicated to produce green electronic products for the benefit of the environment. He
is an active member of IEEE and does volunteer work for several societies.
Mohammed Tarique is an Assistant Professor in the Department of Electronic and
Communication, Ajman University of Science and Technology, in United Arab
Emirates. His research int erests include Adhoc Networks and wireless network
security, network testing and simulations. His research primarily focuses on the
design of Wireless Adhoc Networks.
5. BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
B.M.Gayathri1
,C.P.Sumathi2
and T.Santhanam3
1
Department of Computer Science, SDNB Vaishnav College for Women, Chennai, India 2
Department of
Computer Science, SDNB Vaishnav College for Women, Chennai, India 3
Department of Computer
Application, D.G.Vaishnav College for Men, Arumbakkam, Chennai, India
ABSTRACT
Breast cancer has become a common factor now-a-days. Despite the fact, not all general hospitals have the
facilities to diagnose breast cancer through mammograms. Waiting for diagnosing a breast cancer for a long
time may increase the possibility of the cancer spreading. Therefore a computerized breast cancer diagnosis
has been developed to reduce the time taken to diagnose the breast cancer and reduce the death rate. This
paper summarizes the survey on breast cancer diagnosis using various machine learning algorithms and
methods, which are used to improve the accuracy of predicting cancer. This survey can also help us to know
about number of papers that are implemented to diagnose the breast cancer.
KEYWORDS
Neural networks, SVM, RVM, ELM
For More Details : http://airccse.org/journal/ijdps/papers/4313ijdps09.pdf
Volume Link : http://airccse.org/journal/ijdps/current2013.html
6. REFERENCES
[1] M.A.H Akhand & M.Murase “Neural network ensemble construction fusing multiple popular Methods.”.
International journal of computer science 2004.
[2] Tuba kiyan, Tulay Yildirim “Breast cancer diagnosis using statistical neural networks”, Journal of
Electrical and Electronic Engineering.
[3] P.K.Chenniappan & N.Anusheela “Early detection of cancer cells to lung cancer survival data by Neural
network testing” International journal of neural network and application.
[4] Chih-Lin Chi, W. Nick Street, and William H. Wolberg ” Application of Artificial Neural networkbased
Survival Analysis on Two Breast Cancer Datasets”- AMIA Annu Symp Proc. 2007; 2007: 130–134.
[5] Val´erie Bourd`es, St´ephane Bonnevay, Paolo Lisboa, R´emy Defrance, David P´erol, Sylvie Chabaud,
Thomas Bachelot, Th´er`ese Gargi,6 and Sylvie N´egrier “Comparison of Artificial Neural Network with
Logistic regression as Classification Models for Variable Selection for Prediction of Breast Cancer Patient
outcomes”
[6] I Guyon, J Weston, S Barnhill “Gene selection for cancer classification using support vector Machines” …
- Machine learning, 2002 – Springer
[7] MF Akay “Support vector machines combined with feature selection for breast cancer diagnosis”- Expert
systems with applications, 2009 – Elsevier.
[8] CL Huang, HC Liao “Prediction model building and feature selection with support vector machines in
Breast cancer diagnosis “Expert Systems with Applications, 2008 – Elsevier.
[9] Ilias Maglogiannis, E Zafiropoulos “An intelligent system for automated breast cancer diagnosis and
Prognosis using SVM based classifiers” Applied Intelligence, 2009 – Springer.
[10] AM Bagirov, B Ferguson, S Ivkovic “New algorithms for multi-class cancer diagnosis using tumor Gene
expression signatures”, 2003 - Oxford Univ Press.
[11] RF Chang, WJ Wu, WK Moon, YH Chou “Support vector machines for diagnosis of breast tumors on
US images” - Academic radiology, 2003 – Elsevier
[12] Y Rejani- “Early detection of breast cancer using SVM”. 2009 –arxiv
[13] L Rong ,”Diagnosis of Breast Tumor Using SVM-KNN Classifier” - 2010 - Intelligent Systems (GCIS).
[14] T Mu “Detection of breast cancer using v-SVM and RBF network.” - 2005 – C Medical Applications Of
Signal.
[15] Dr.C.P.Sumathi, Dr.T.Santhanam, A.Punitha “Combination of genetic algorithm and ART neural
Network for breast cancer diagnosis”, 2007 -- Asian Journal of information technology, Medwell Journals.
[16] F.Paulin, A.Santhakumaran “Classification of Breast cancer by comparing Back propagation training
Algorithms”, 2011-International Journal on Computer Science and Engineering (IJCSE)
[17] Dr. K. Usha Rani” Parallel Approach for Diagnosis of Breast Cancer using Neural Network Technique”
International Journal of Computer Applications, Volume 10– No.3, November 2010.
[18] G. Sophia Reena P. Rajeswari -2011 “A Survey of Human Cancer Classification using Micro Array
Data”- International Journal of Computer Tech. Appl.,
7. [19] Balaji Krishnapuram, Alexander Hartemink, Lawrence Carin “Applying logistic regression and RVM To
achieve accurate probabilistic cancer diagnosis from gene expression profiles” -
Citeseerx.ist.psu.edu/viewdoc/summary?Doi=10.1.1.12.5909
[20] A. Bharathi and A.M. Natarajan “Cancer Classification using Support Vector Machines and
Relevance Vector Machine based on Analysis of Variance Features”- Journal of Computer Science 7 (9):
1393-1399, 2011.
[21] Fatima Eddaoudi , Fakhita Regragui , Abdelhak Mahmoudi , Najib Lamouri “Masses Detection Using
SVM Classifier Based on Textures Analysis”- Applied Mathematical Sciences, Vol. 5, 2011, no. 8, 367 –
379.
[22] Guoqiang Peter Zhang “Neural Networks for Classification: A Survey” IEEE TRANSACTIONS ON
SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 30, NO. 4,
NOVEMBER 2000.
[23] S. Aruna, Dr .S.P. Rajagopalan “ A Novel SVM based CSSFFS Feature Selection Algorithm for
Detecting Breast Cancer” International Journal of Computer Applications (0975 – 8887) Volume 31– No.8,
October 2011.
[24] Xin Yao, Yong Liu “Neural Networks for Breast Cancer Diagnosis” 01999 IEEE [25] Dimitrios Siganos
”Neural Networks in medicine”, Www.doc.ic.ac.uk/~nd/surprise_96/journal/vol2/ds12/article2.html.
[26] David B.Fogel, Eugene C, Wasson, Edward M.Boughton “Evolving neural networks for detecting Breast
cancer”. 1995 Elsevier Science Ireland Ltd.
[27] Dr.Santhosh baboo, S.Sasikala “A Survey on data mining techniques in gene selection and cancer
Classification”-April 2010 International journal of Computer science and information technology.
[28] Afzan Adam1 Khairuddin Omar2 “Computerized Breast Cancer Diagnosis with Genetic Algorithms And
Neural Network”- fitt.mmu.edu.my/caiic/papers/afzanicaiet.pdf.
[29] Zhang Qinli; Wang Shitong; Guo Qi; “A Novel SVM and Its Application to Breast Cancer Diagnosis”
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?Arnumber=4272649.
8. COMPARATIVE ANALYSIS OF RECTANGULAR AND CIRCULAR WAVEGUIDE USING
MATLAB SIMULATION
AZHAR SHADAB1
, LOKESH KUMAR2
, MOHIT KUMAR3
, KAMAL KISHOR4
, AKASH SETHI5
, ILA
SHARMA6
1
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
2
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
3
Department of Computer Science, Jaypee university, Solan, Himachal Pradesh, India
4
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
5
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
6
Department of Electronics & Communication, Jaypee University, Solan, Himachal Pradesh, India
ABSTRACT
Electromagnetic waves is very strong waves which is used for transmission of signals from one place to other
, main concern is medium having some physical structure through which it can propagate their waves. There
are so many ways to guide this electromagnetic waves but main consideration in this paper is rectangular
waveguide and circular waveguide.This paper analyze the different parameters of both the waveguides like
(Cut off frequency, Cut off wavelength,Guide wavelength,Phase velocity, Group velocity, Impedance, power,
Attenuation, VSWR) with the help of simulation in Matlab7.14 .Compare the parameters of the two
waveguides and on the basis of these parameters result it is easy to get the best guided structure.
KEYWORDS:
Rectangular waveguide ,Circular waveguide,Waveguide modes, Matlab simulation.
For More Details : http://airccse.org/journal/ijdps/papers/0712ijdps05.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
9. REFERENCES
[1] D.M.Pozar ,2005, “Microwave Engineering” John Wiley and Sons.
[2] Karle S. Packard “The Origin of Waveguides: A Case of Multiple Rediscovery” IEEE transactions on
Microwave theory and techniques, vol. mtt-32, no.9, september 1984.
[3] Perregrini Y. Cassivi and P.Arcioni,2002 “Dispersion Characteristics of Substrate Integrated Rectangular
Waveguide” IEEE transaction of Microwave and Wireless components,Vol 12,No.- 9,page no.333-335.
[4] A.Munir and Mohammad F.Y.Musthofa,”Rectangular to Circular Waveguide Converter for Microwave
Devices Characterization”,International Journal on Electrical Engineering and Informatics,Vol.3,No.3,2011.
[5] Vivek Yadav , Udaybin Singh and A.K.Sinha, 2010 “Analysis and Design of Broadband Square to
Circular Waveguide Transitions”,International Journal of Microwave and Optical Technology,
Vol.5,No.3,May.
[6] R.Vacek, Dec 1998,”Electromagnetic Wave Propagation in General Multimode Waveguide Structures
Exhibiting Simultaneously Attenuation,Dispersion and Coupling Phenomena”, Journal of Microwave and
Optoelectronics,Vol.1,No.3.
[7] Amos Gilat, Edition-2004, “MATLAB- An Introduction with Applications”, John Wiley & Sons.
[8] Rudra Pratap, 2006 “Getting Started with MATLAB7”. Oxford University Press.
[9] Wikipedia.
[10 Boremann,Amari and Vahldieck Mar 1999 “Analysis and design of circular ridged waveguide
components” ” IEEE transactions on microwave devices,Volume 47,Issue:3,pages :330-335.
10. BIOGRAPHY
Azhar Shadab received his B.E degree in Electronics and communication Engineering
from NRI-IIST BHOPAL in 2010, and his M Tech degree in Electronics and
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh 2012. His research int erests are in the areas of
Microwave , VLSI and Signal Processing. Presently he is working on designing of low
power fast fourier transform in VLSI. International Journal of Distributed and Parallel
Systems (IJDPS) Vol.3, No.4, July 2012 52
Lokesh kumar received the B.E. degree from RITEE,Raipur(C.G).He is currently
pursuing MTECH from Jaypee University of Information Technology, solan. Himachal
Pradesh.His research interests are in t he VLSI design and circuit.
Mohit kumar has done his B.E from D.Y.Patil College of Engineering (Pune university).
He is currently persuing M-Tech(2nd yr) from Jaypee University of Information
Technology,Solan. Himachal Pr adesh
Kamal kishor received his B.E degree in Ele ctronics and communication Engineering
from NRI-IIS T BHOPAL, 2010, and pursuing M Tech degree in Electronics an d
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh. His research interests are in the areas of Microwave &
Antenna.
Akash Sethi received his Bachelor of Engineering degree in Electronics and
Communications Engineering from G.G.I.T.S. Jabalpur(M.P.) 2009, and M.Tech degree in
Electronics and Communications Engineering from the Jaypee University of Information
Technology, Waknaghat(H.P.) 2012. His research interests are in the areas of Wireless
Communication, Electrical Circuit Analysis and VLSI.
Ila Sharma received her B.E degree in Electronics and Telecommunications Engineering
fromG.E.C.Raipur, Chhattisgarh 2009, and her M Tech degree in Electronics and
Communications Engineering from the Jaypee University of Information Technology,
Waknaghat, Himachal Pradesh 2012. Her research interests are in the areas of Wireless
Communication, Analog Electronics and Signal Processing.
11. REMOTE PATIENT MONITORING SYSTEM
Sherin Sebastian, Neethu Rachel Jacob, Yedu Manmadhan, Anand V. R. , M. J. Jayashree
Department of Electronics and Communication Engineering, Mar Baselios College of Engineering &
Technology, Nalanchira, Trivandrum, India- 695015
ABSTRACT
The Telemedicine system comprises of both hardware and software components at both the patient and
doctor ends. A leading field for application of telemedicine is in the field of cardiology where ECG is the
major tool for diagnosis. The proposed project in this paper provides an image based techniques to acquire
and analyse a constant streaming of ECG signal through digital camera for image capturing, information
extraction and analysis performed using MATLAB tools as well as data sending system based on internet
network. The method captures the vital signs and parameters from the ICU monitoring machine using a
webcam and transmits the image through the internet. This original image is then availed to the consulting
doctor via an ANDROID cell phone. In case of anomaly a notification is send to the doctor’s phone. The
paper proposes a method to capture, compare and generate alert regarding the patient’s condition using the
heart rate and make the captured image be available to the physician.
KEYWORDS
Telemedicine, ECG, MATLAB, C2DM, Android
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps09.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
12. REFERENCES
[1] 'International Cardiovascular Disease Statistics, Statistical Fact Sheet-2007 Update', American Heart
Association, Dallas, Texas, 2007.
[2]Lai Khin Wee, Yeo Kee Jiar, Eko Supriyanto “Electrocardiogram Data Capturing System and
Computerized Digitization using Image Processing Techniques” International Journal of Biology and
Biomedical Engineering Issue 3, Volume 3, 2009
[3] Khoór S, Nieberl J, Fügedi K, Kail E ‘Internet based, GPRS, longterm ECG monitoring and nonlinear
heart-rate analysis for cardiovascular telemedicine management’ Computers in Cardiology 2003;28:209-212.
[4] Ljupˇco Hadˇzievski, Boˇsko Bojovic´, Vladan Vukˇcevic´, Petar Beliˇcev, Siniˇsa Pavlovic´, Zorana
Vasiljevic´-Pokrajˇcic´, and Miodrag Ostojic´’A Novel Mobile Transtelephonic System With Synthesized
12-Lead ECG’ IEEE Transaction on Information Technology in Biomedicine,
Volume 8,2004
[5] Dr.R.Sukanesh, S.Palanivel rajan, S.Vijayprasath, S.Janardhana prabhu and P.Subathra ‘gsm based ecg
tele-alert system’, Department of Electronics and Communication Engineering, Dept. of Electron. &
Commun. Eng., Thiagarajar Coll. of Eng., Madurai, India Innovative Computing Technologies (ICICT),
International Conference 2010
[6]Sukanesh R., Gautham P. ; Arunmozhivarman P.T. ; Rajan S.P. ; Vijayprasath S. ‘Cellular phone based
biomedical system for health care’ Dept. of Electron. & Commun. Eng., Thiagarajar coll. of Eng.,Madurai,
India Communication Control and Computing Technologies (ICCCCT),
IEEE International Conference 2010
[7] 1V.Ramya, 2B.Palaniappan,3Anuradha Kumari ‘Embedded Patient Monitoring System’ International
Journal of Embedded Systems and Applications (IJESA) Vol.1, No.2, December 2011
[8] Prof. Dr. Burkhard Stiller ’Mobile Healthcare on Android Devices’ Communication Systems Group,
Diploma Thesis, Dept. of Informatics, November 2010
[9] Alma Secerbegovic∗ , Aljo Mujˇci´c∗ , Nermin Suljanovi´c∗ , Midhat Nurkic†, Jurij Tasic ‘The research
mHealth platform for ECG monitoring’, ConTel Conference, 2011
[10] Elham Dolatabadi∗ , Serguei Primak ’Ubiquitous WBAN-based Electrocardiogram Monitoring
System’ EHealth Networking Applications Conference, 2011
13. EMBEDDED SYSTEM FOR HAZARDOUS GAS DETECTION AND ALERTING
V.Ramya1
, B. Palaniappan2
1
Assistant Professor, Department of CSE, Annamalai University, Chidambaram,India.
2
Dean, FEAT, Head, Department of CSE, Annamalai University, Chidambaram, India.
ABSTRACT
Safety plays a major role in today’s world and it is necessary that good safety systems are to be implemented
in places of education and work. This work modifies the existing safety model installed in industries and this
system also be used in homes and offices. The main objective of the work is designing microcontroller based
toxic gas detecting and alerting system. The hazardous gases like LPG and propane were sensed and
displayed each and every second in the LCD display. If these gases exceed the normal level then an alarm is
generated immediately and also an alert message (SMS) is sent to the authorized person through the GSM.
The advantage of this automated detection and alerting system over the manual method is that it offers quick
response time and accurate detection of an emergency and in turn leading faster diffusion of the critical
situation.
KEYWORDS
Air pollution Monitoring, gas sensors, GSM module, wireless networks.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps24.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
14. REFERENCES
[1]. R. Al-Ali, Member, IEEE, Imran Zualkernan, and FadiAloul, Senior Member, IEEE, “A Mobile GPRS-
sensors array for Air Pollution Monitoring” vol.6, pp.410-422, Oct.2010.
[2]. NihalKularatna, Senior Member, IEEE, and B. H. Sudantha, Member, IEEE “An Environment Air
Pollution Monitoring System Based on the IEEE1451 Standard for Low Cost Requirements” IEEE Sensors
J., Vol. 8, pp.415-422, Apr. 2008.
[3]. M. Abu Jayyab, S. Al Ahdab, M. Taji, Z. Al Hamdani, F. Aloul, “Pollumap: Air Pollution mapper for
cities”, in Proc. IEEE Innovations in Information Technology Conf., Dubai, UAE, Nov.2006,pp.1-5.
[4]. Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, “Air pollution monitoring system based on
geosensor network”, in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp.1370-1373.
[5]. M. Gao, F. Zhang, and J. Tian, “Environmental monitoring system with wireless mesh network based on
Embedded System”, in proc. 5th IEEE Int. Symp. Embedded Computing, 2008, pp. 174-179.
[6]. J. W. Kwon, Y. M. Park, S. J. Koo, and H. Kim, “Design of Air Pollution Monitoring system Using
ZigBee Networks for ubiquitous-city ”, in proceedings of In. Conf. Convergence Information Technology,
2007, pp.1024-1031.
[7]. Geng Juntato, Zhou Xiaotao, Zhang Bingjie, “An Atmosphere Environment Monitor System Based on
Wireless Sensor Network”, Journal of Xihua University, Natural Science, Vol. 26, no.4, pp. 44-46 ,2007.
[8] F. Tsow, E. Forzani, A. Rai, R. Wang, R. Tsui, S. Mastroianni, C. Knobbe, A. J. Gandolf, and N. j.Tao,
“A wearable and wireless sensor system for real-time monitoring of toxic environmental volatile organic
compounds”, IEEE sensors, J., vol. 9, pp. 1734-1740, Dec.2009.
[9] W. Chung and C. H. Yang, “Remote Monitoring System with Wireless Sensor Module for Room
Environment”, Sens. Actuators B, vol. 113, no.1, pp. 35-42, 2009.
[10] Raj Kamal, “Embedded System Architecture Programming and Design” TATA Mc-Graw Hill.
[11] N. Kularantna and B. H. Sudantha, “An environmental air pollution monitoring system based on the
IEEE 1451 standard for low cost re-quirements,”IEEE, sensors J., Vol, 8, pp. 415- 422, Apr, 2008.
[12]Y. J. Jung, Y. K. Lee, D. G. Lee, k. H. Ryu, and S. Nittel, “Air Pollution monitoring system based on
geo sensor network ” in proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol, 3, pp.1370-1373.
15. A CATEGORICAL REVIEW OF RECOMMENDER SYSTEMS RVVSV
Prasad1
and V Valli Kumari2
1
Department of Computer Science & Engineering, Bhimavaram Institute of Engineering & Technology,
Bhimavaram – 534243, India
2
Department. Of Computer Science & Systems Engineering, AU College of Engineering, Andhra University,
Vishakapatnam – 533003,
ABSTRACT
As more and more information became available electronically, the need for effective information retrieval
and implementation of filtering tools have became essential for easy access of relevant information.
Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or
services to be of use to a user. These systems are achieving widespread success in ecommerce applications
now a days, with the advent of internet. This paper presents a categorical review of the field of recommender
systems and describes the state-of-the-art of the recommendation methods that are usually classified into four
categories: Content based Collaborative, Demographic and Hybrid systems. This paper discusses the pro’s
and con’s of the current categories as well as the trustworthiness of the recommender system in a new
dimension as evaluating the evaluator for more appropriate recommendations. In the domain of recommender
system, this work also put forward the use of agents as an enabling technology.
KEYWORDS
Collaboration, Demography, Information Filtering, Recommender System, Agent, Trust
For More Details : http://airccse.org/journal/ijdps/papers/3512ijdps07.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
17. AUTHORS
RVVSV Prasad received his Masters degree in computer applications from Madurai
Kamaraj University and Master of Philosophy in Computer Science from Alagappa
University. He is currently doctoral candidate in the Department of Computer Science
& Engineering, Acharya Nagarjuna University, Nagarjuna Nagar, Guntur, India. He is
working as Associate Professor in the Department of Computer Science & Engineering,
Bhimavaram Institute of Engineering and Technology, Pennada, Bhimavaram, India.
His research interests include recommender systems, security, privacy and trust in
mobile agents and P2P networks.
V.Valli Kumari received her B.E. in Electronics and Communication Engineering and
M.Tech. and PhD in Computer Science and Engineering all from Andhra University,
India and is currently working as Professor in the same department. . She was awarded
a gold medal for best research in 2008 in Andhra University. Her areas of research
interest include Web, Data Engineering, Network Security, e-commerce and has 70
publications in conferences /journals of international and national repute. She is a
member of IEEE, ACM, CRSI and CSI.
18. CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
S. Naisha Sultana1
, Gandikota Ramu2
and Prof. B. Eswara Reddy3
1, 2&3
Dept of Computer Science & Engineering, JNTUA College of Engineering, Ananthapuramu, Andhra
Pradesh, India
ABSTRACT
There is a need of data integration in cloud – based system, we propose an Information Integration and
Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health
Record System need to be smart and connected, so we use informatica for the connection of data from
different database. Traditional Electronic Health Record Systems are based on different technologies,
languages and Electronic Health Record Standards. Electronic Health Record System stores data based on
interaction between patient and provider. There are scalable cloud infrastructures, distributed and
heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This
advance healthcare application will improve the integration of required data and helps in fast interaction
between the patient and the service providers. Thus there is the development of smart and connected data in
healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
KEYWORDS
Cloud Computing, Data Integration, Informatica, Aneka, Electronic Health Records
For More Details : http://airccse.org/journal/ijdps/papers/5614ijdps01.pdf
Volume Link : http://airccse.org/journal/ijdps/current2014.html
19. REFERENCES
[1] A. Bhaga, V. Madisetti, A Cloud-based Approach for Interoperable Electronic Health Records
(EHRs), IEEE Journal of Biomedical and Health Informatics, vol. 17, iss. 5, pp. 894 – 906, 2013.
[2] C. Hajat, An Introduction to Epidemiology, Methods Mol Biol. 2011; 713:27-39.
[3] VistA Monograph [Online]. Available: www.va.gov/vista. monograph, 2012.
[4] OpenEHR. (2012). [Online]. Available: https://www.openehr.org
[5] Mirth Connect. (2012). [Online]. Available: http://www.mirthcorp.com/products/mirth-connect
[6] Medsphere FM Projection. (2012). [Online].
Available:http://medsphere.org/community/project/fmprojection.
[7] A. Bahga and V.K. Madisetti, “Analyzing massive machine maintenance data in a computing cloud,”
IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1831-1843, Oct. 2012.
[8] A. Bahga and V.K. Madisetti, “Synthetic workload generation for cloud computing applications,”
J.Softw.eng.Appl., vol. 4, no7, pp.396-410, 2011.
[9] A. Bahga and V.K. Madisetti, “Performance evaluation approach for multi-tier cloud applications,”
J.Sofw.Eng.Appl., vol. 6, no.2, pp.74-83, 2013.
[10] A. Bahga and V.K. Madisetti, Rapid Prototyping of Advanced Cloud Based Services and Systems, IEEE
Comput., under review, Aug. 2012.
[11] N. Radio, Y. Zhang, M. Tatipamula, and V.K. Madisetti, “Next-generation applications on cellular
networks: Trends, challenges, and solutions,” Proc. IEEE, vol. 100, no.4, pp. 841-85, Apr. 2012.
[12] Aneka[Online]. Available : http://www.manjrasoft.com/
[13] Informatica Powercenter[Online]. Available : http://www.informatica.com/in/ETL/
AUTHORS
Ms. S. Naisha Sultana received the B.E Degree in Information Technology from G.
Pullaiah College of Engineering and Technology affiliated to JNT University
Anantapur, Anantapuramu, India in the year 2012, and pursuing M.Tech Degree in
Software Engineering at Computer Science Department of JNT University Anantapur,
Anantapuramu. Her research area in M.Tech deals with Cloud Computing.
Mr. Gandikota Ramu received B.Tech degree in Information Technology and
M.Tech degree in Computer Science from JNT University Anathapur,
Anathapuramu, India. He is currently working towards Ph.D Degree at JNT
University Anantapur, Ananthapuramu, India. He is working as Assistant Mentor in
Master of Science in Information Technology (MSIT) program, JNTUA (in
collaboration with Consortium of Institutions Higher Learning and Carnegie Mellon
University, USA).
Dr. B. Eswara Reddy Graduated in B.Tech. (CSE) from Sri Krishna Devaraya
University. He received Masters Degree in M.Tech.(Software Engineering), from JNT
University, Hyderabad. He received Ph.D in Computer Science & Engineering from
JNT University, Hyderabad. He is working as Professor in CSE Dept. and
VicePrincipal at JNTUA College of Engineering, Ananthapuramu. He has more than
50 Publications in various International Journals and Conferences.. He has received UGC Major Research
Project (MRP) titled ‘Cloud Computing framework for rural healthcare in Indian Scenario’. His research
interests include Pattern Recognition & Image Analysis, Data Mining and Cloud Computing. He is a Fellow
of IE (India). He is a life member of ISTE, ISCA and member of CSI and IEEE.
20. A STUDY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN WIRELESS SENSOR
NETWORKS
Monica R Mundada1
, Savan Kiran1
, Shivanand Khobanna1
, Raja Nahusha Varsha1
and Seira Ann George1
1
Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bangalore
ABSTRACT
A wireless sensor network (WSN) consists of low cost, low power, small in size and multi functional sensor
nodes. Routing protocols in WSNs emphasize on data dissemination, limited battery power and bandwidth
constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the
network. Routing protocols in WSNs are also application specific which has led to the development of a
variety of protocols. Based on the underlying network structure, routing techniques can be classified into
three categories: data-centric, hierarchical and location based routing. WSN has a design trade-off between
energy and communication overhead which forms the nerve center of the routing techniques. In this paper
we present a survey of state-of-the-art routing techniques in WSNs under all the three categories. We
epitomize these routing techniques and bring out the advantages and disadvantages followed by their
application domain. The paper concludes with issues open for research.
KEYWORDS
Wireless Sensor Networks, Routing Protocols, Energy Efficient Protocols, Data-Centric protocols,
Hierarchical Protocols and Location Based Protocols.
For More Details : http://airccse.org/journal/ijdps/papers/0512ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
21. REFERENCES
[1] I. F. Akyildiz et al,( March 2002), “Wireless sensor networks: a survey”, Computer Networks, V
Vol. 38, pp. 393-422.
[2] K. Sohrabi, et al, (October 2000) "Protocols for self-organization of a wireless sensor network,” I
IEEE Personal Communications, Vol. 7, No. 5, pp. 16-27.
[3] R. Min, et al., (January 2001), “Low Power Wireless Sensor Networks,” Internation Conference o
on VLSI Design, Bangalore, India.
[4] J.M. Rabaey, et al., ( July 2000), "PicoRadio supports ad hoc ultra low power wireless e
networking," IEEE Computer, Vol. 33, pp. 42-48.
[5] R. H. Katz, J. M. Kahn and K. S. J. Pister, ( August 1999), “Mobile Networking for Smart Dust,”
5th Annual ACM/IEEE International Conference on Mobile Computing and Networking
(MobiCom’99), Seattle, WA.
[6] I.F.Akyildiz,W.Su, Y.Sankarasubramaniam,E.Cayirci, (Dec 2002), “Wireless Sensor Networks:A
survey”, Elsevier science B.V.
[7] Shio Kumar Singh, M P Singh and D K Singh, (August 2010), “A Survey of Energy-Efficient
Hierarchical Cluster-Based Routing in wireless Sensor Network,” Int J. of Advanced Networking and
Applications Volume:02, Issue:02, Pages:570-580.
[8] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, (Jan 2000), “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci.
[9] Zuniga, M. Z.; Krishnamachari, B. (2002), "Integrating Future Large-Scale Wireless Sensor
Networks with the Internet," - Department of Electrical Engineering, UNiversity of Southern
California.
[10] Alonso, J., Dunkels, A., Voigt. T, ( March 2004), “Bounds on the energy consumption of routings
in wireless sensor nodes” WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks,” Cambridge, UK.
[11] S. Tilak et al,( June 2002), “A Taxonomy of Wireless Microsensor Network Models,” ACM
Mobile Computing and Communications Review (MC2R).
[12] W. Heinzelman, J. Kulik, and H. Balakrishnan, (Aug. 1999), “Adaptive Protocols for
Information Dissemination in Wireless Sensor Networks,” Proc. 5th ACM/IEEE Mobicom, Seattle,
WA, pp. 174–85.
[13] J. Kulik, W. R. Heinzelman, and H. Balakrishnan, (2002), “Negotiation-Based Protocols for
Disseminating Information in Wireless Sensor Networks,” Wireless Networks, vol. 8, pp. 169–85.
[14] C. Intanagonwiwat, R. Govindan and D. Estrin, (August 2000), "Directed diffusion: A scalable
and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE
International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA.
[15] D. Estrin, et al., (August 1999), “Next century challenges: Scalable Coordination in Sensor
Networks,” 5th annual ACM/IEEE international conference on Mobile Computing and Networking
(MobiCom’99), Seattle, WA.
[16] D. Braginsky and D. Estrin, (October 2002), "Rumor Routing Algorithm for Sensor Networks",
22. Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA.
[17] GRAdient Broadcast: A Robust, Long-lived Large Sensor Network,
http://irl.cs.ucla.edu/papers/grab-techreport.ps
[18] N. Sadagopan et al., (May 2003), “The ACQUIRE mechanism for efficient querying in sensor
networks,” Proceedings of the First International Workshop on Sensor Network Protocol and
Applications, Anchorage, Alaska.
[19] Jabed Faruque & Ahmed Helmy, (2004), “RUGGED: Routing on Fringerprint Gradients in Sensor
Networks,” Pervasive Services, ICPS, IEEE/ACS International Conference on .
[20] D.R. Askeland, (1994), The Science and Engineering of Materials, PWS Publishing Co.
[21] J.F. Shackelford, (2000) Intro to Materials Science For Engineers, 5th Ed., Prentice Hall.
[22] S.Kim, Sang.H.Son, J.A.Stankovic, S.Li & Y.Choi,(2003), “SAFE: A Data Dissemination
Protocol for Periodic Updates in Sensor Networks”, Distributed Computing System Workshop 23rd
International Conference.
[23] Mesut Gunes, Udo Sorges & Imed Bouazizi, (2002), “ACA: The Ant-Colony Based Routing
Algoritm for MANETS”, Proceedings of the International Conference on Parallel Processing
Workshops (ICPPW 02), IEEE.
[24] Tiago Camilo, Carlos Carreto, Jorge Sa Silva and Fernando Boavida, (2006), “ An
EnergyEfficient Ant-Based Routing Algorithm for Wireless Sensor Networks”.
[25] Dorigo, M., Stützle, T.,( march 2004), “Ant Colony Optimization”, ISBN 0262042193, MIT Press.
[26] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (January 2000), “Energy-efficient
communication protocol for wireless sensor networks", Proceeding of the Hawaii International
Conference System Sciences, Hawaii.
[27] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, ( Oct. 2002), “An
ApplicationSpecific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless
Commun., vol. 1, no. 4, pp. 660–70.
[28] S. Lindsey and C. S. Raghavendra, (March 2002), "PEGASIS: Power Efficient GAthering in
Sensor Information Systems," Proceedings of the IEEE Aerospace Conference, Big Sky, Montana.
[29] S. Lindsey, C. S. Raghavendra and K. Sivalingam, (April 2001), "Data Gathering in Sensor
Networks using the Energy*Delay Metric", IPDPS Workshop on Issues in Wireless Networks and
Mobile Computing, San Francisco, C.
[30] A. Manjeshwar and D. P. Agrawal, ( April 2001), “TEEN : A Protocol for Enhanced Efficiency in
Wireless Sensor Networks," Proceedings of the 1st International Workshop on Parallel and Distributed
Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA.
[31] A. Manjeshwar and D. P. Agrawal, (April 2002),"APTEEN: A Hybrid Protocol for Efficient
Routing and Comprehensive Information Retrieval in Wireless Sensor Networks," in the Proceedings
of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks
and Mobile computing, Ft. Lauderdale, FL.
[32] M. Younis, M. Youssef and K. Arisha, (October 2002), “Energy-Aware Routing in ClusterBased
Sensor Networks”, in the Proceedings of the 10th IEEE/ACM International Symposium on Modeling,
Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort
23. Worth, TX.
[33] Siva D. Muruganathan, Damiel C.F.MA, Rolly I.Bhasin and Abraham O.FAPOJUWO, (March
2005), “ A Centralised Energy-Efficient Routing Protocol for Wireless Sensor Networks,” IEEE Radio
Communication.
[34] Guanfeng Li, Taieb Znati & Anandha Gopalan, (2004), “ REAP: ring band-based energy adaptive
protocol for information dissemination and forwarding in wireless sensor networks,” Int.J.Sensor
Network. Vol. X, No. Y, XXXX.
[35] Kemal Akkaya and Mohamed Younis, (2005),“A Survey on Routing Protocol for Wireless Sensor
Network”, Elsevier Ad Hoc Network Journal, Vol 3/3pp. 325-549.
[36] F. Ye et al.,( 2002), “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor
Networks,” Proc. ACM/IEEE MOBICOM.
[37] L. Li, and J. Y. Halpern, (2001), “Minimum-Energy Mobile Wireless Networks Revisited,” IEEE
ICC, vol. 1, pp. 278–83.
[38] Y. Xu, J. Heidemann, and D. Estrin, (2001), “Geography informed Energy Conservation for
Adhoc Routing,” Proc. 7th Annual ACM/IEEE Int’l. Conf. Mobile Comp. and Net., pp. 70–84.
[39] B. Karp and H. T. Kung, (August 2000), “GPSR: Greedy perimeter stateless routing for wireless
sensor networks,” in the Proceedings of the 6th Annual ACM/IEEE International Conference on
Mobile Computing and Networking (MobiCom '00), Boston, MA.
[40] Y. Yu, D. Estrin, and R. Govindan,( May 2001), “Geographical and Energy-Aware Routing: A
Recursive Data Dissemination Protocol for Wireless Sensor Networks,” UCLA Computer Science
Department Technical Report, UCLA-CSD TR-01-0023.
24. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
Divya James1
and Mintu Philip2
1
MTech in Information System Security, Indira Gandhi National Open University, India, 2
Rajagiri
School of Engineering and Technology, Kochi, India
ABSTRACT
Phishing is an attempt by an individual or a group to thieve personal confidential information such as
passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other
fraudulent activities. In this paper we have proposed a new approach named as "A Novel Antiphishing
framework based on visual cryptography" to solve the problem of phishing. Here an image based
authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to
preserve the privacy of image captcha by decomposing the original image captcha into two shares that are
stored in separate database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
KEYWORDS
Phishing, Visual Cryptography, Image Captcha, Shares, Security.
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps17.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
25. REFERENCES
[1] Thiyagarajan, P.; Venkatesan, V.P.; Aghila, G.; "Anti-Phishing Technique using Automated Challenge
Response Method'", in Proceedings of IEEE- International Conference on Communications and
Computational Intelligience, 2010.
[2] Sun Bin.; Wen Qiaoyan.; Liang Xiaoying.; "A DNS based Anti-Phishing Approach," in Proceedings of
IEEE- Second International Conference on Networks Security, Wireless Communications and Trusted
Computing, 2010
[3] Nourian, A.; Ishtiaq, S.; Maheswaran, M.;" CASTLE: A social framework for collaborative
antiphishing databases", in Proceedings of IEEE- 5th International Conference on Collaborative
Computing:Networking, Applications and Worksharing, 2009.
[4] Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS,p495-506, 2007, Information and
Communications Security - 9th International Conference, ICICS 2007, Proceedings.
[5] Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment
Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3, n
4, p301-311, October/December 2006
[6] Wenyin Liu, Xiaotie Deng, Guanglin Huang, and Anthony Y. Fu, "An Antiphishing Strategy Based on
Visual Similarity Assessment", IEEE Internet Computing, v 10, n 2, p 58-65, March/April 2006.
[7] JungMin Kang, DoHoon Lee, "Advanced White List Approach for Preventing Access to Phishing
Sites", 2007 International Conference onConvergence Information Technology, ICCIT 2007, p 491-496,
2007
[8] Nirmal, K.; Ewards, S.E.V.; Geetha, K.; "Maximizing online security by providing a 3 factor
authentication system to counter-attack 'Phishing'", in Proceedings of IEEE- International Conference on
Emerging Trends in Robotics and Communication Technologies, 2010.
[9] Tianyang Li.; Fuye Han.; Shuai Ding and Zhen Chen.; "LARX: Large-scale Anti-phishing by
Retrospective Data-Exploring Based on a Cloud Computing Platform", in Proceedings of IEEE- 20th
International Conference on Computer Communications and Networks, 2011.
[10] Qingxiang Feng.; Kuo-Kun Tseng.; Jeng-Shyang Pan.; Peng Cheng and Charles Chen.; "New
Antiphishing Method with Two Types of Passwords in OpenID System", in Proceedings of IEEE Fifth
International Conference on Genetic and Evolutionary Computing,2011
[11] Maher Aburrous .; M. A. Hossain.; Keshav Dahal.; "Modelling Intelligent Phishing Detection System
for e-Banking using Fuzzy Data Mining", in Proceedings of IEEE Conference
26. on CyberWorlds,2009.
[12]Haijun Zhang , Gang Liu, and Tommy W. S. Chow, “Textual and Visual Content-Based Anti-
Phishing:A Bayesian Approach,” IEEE Trans. Neural Netw., vol. 22, no. 10, pp. 1532– 1546, Oct.2011.
[13] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
[14] B. Borchert, .Segment Based Visual Cryptography,. WSI Press, Germany, 2007.
[15] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan
Applications,.IEEE Transactions, ISCAS-2004, pp. 572-575.
[16] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel
Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
[17] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual Cryptography,. Designs,
Codes,Cryptography, vol. 38, no. 2, 2006, pp. 219-236.
[18] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual Cryptography,. IEEE Transaction on
Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45.
[19] A Text-Graphics Character CAPTCHA for Password Authentication Matthew Dailey Chanathip
Namprempre.
27. MOBILE-ASSISTED LANGUAGE LEARNING
Tayebeh Mosavi Miangah1
and Amin Nezarat2
1
English Language Department, Payame Noor University, Yazd, Iran
2
Information Technology Department, Shiraz University, Shiraz, Iran
ABSTRACT
The main characteristics of mobile learning (m-learning) are recognized as the potential for
learning process to be personalized, spontaneous, informal and ubiquitous. Although learning
through mobile phones may take longer time compared to computers, the learners feel a greater
sense of freedom of time and place, so that they can take the advantage of spare time to learn a
second language when and where they are. Mobile-Assisted Language Learning (MALL) deals
with the use of mobile technology in language learning. In contrast to classroom learning, in
MALL there is no need for the learners to sit in a classroom or at a computer to get learning
materials. In fact, MALL can be considered an ideal solution to language learning barriers in
terms of time and place. In this paper by looking at some applications of m-learning as well as
some examples across various aspects of it, we observe the advantages and disadvantages derived
from using mobile technologies for students as well as professionals. Here, it has been tried to
demonstrate the benefits of using mobile phones in learning English as a second language. Areas
of mobile-based language learning discussed in this paper are vocabulary, listening, grammar,
phonetics, and reading comprehension.
KEYWORDS
e-learning, mobile-assisted language learning, mobile technology, second language learning,
wireless communication
For More Details : http://airccse.org/journal/ijdps/papers/0112ijdps26.pdf
Volume Link : http://airccse.org/journal/ijdps/current2012.html
28. REFERENCES
[1] Chen, N. S. S.-W., Hsieh, & Kinshuk. (2008). “Effects of short-term memory and content
representation type on mobile language learning”. Language Learning & Technology, 12(3), pp.
93–113. Retrieved from http://llt.msu.edu/vol12num3/chenetal.pdf
[2] Chen, C. M. & S.-H. Hsu. (2008). “Personalized Intelligent Mobile Learning System for
Supporting Effective English Learning”. Educational Technology & Society, 11 (3), pp. 153-180.
[3] Gay, G.; M. Stefanone, M. Grace-Martin, & H. Hembrooke. (2001) “The effects of wireless
computing in collaborative learning environments”. International Journal of Human-Computer
Interaction, 13(2), pp. 257-276.
[4] Huang, C. and P. Sun. (2010) “Using mobile technologies to support mobile multimedia
English listening exercises in daily life”. In: The International Conference on Computer and
Network Technologies in Education (CNTE 2010), At: http://cnte2010.cs.nhcue.edu.tw/
[5] Kennedy, C. & M. Levy. (2008). “L’italiano al telefonino: Using SMS to support beginners’
language learning”. ReCALL, 20(3), pp. 315–350.
[6] Klopfer, E.; K. Squire, and H. Jenkins. (2002). "Environmental Detectives: PDAs as a
window into a virtual simulated world." In: Proceedings of IEEE International Workshop on
Wireless and Mobile Technologies in Education. Vaxjo, Sweden: IEEE Computer Society, pp.
95-98
[7] Koole. M. (2009). “A model for framing mobile learning” . In M. Ally (Ed.), Mobile learning:
Transforming the delivery of education & training, pp. 25–47. Athabasca: AU Press.
[8] Kukulska-Hulme A. and L. Shield. (2008). “An Overview of Mobile Assisted Language
Learning: Can Mobile Devices Support Collaborative Practice in Speaking and listening?”
http://portal.acm.org/citation.cfm?id=1520087, accessed Jul. 2009.
[9] Kukulska-Hulme, A. & J.Traxler. (Eds.). “Mobile learning: A handbook for educators and
trainers”. London: Routledge, 2005.
[10] Kukulska-Hulme. A. (2009). “Will mobile learning change language learning?” ReCALL
21(2), pp. 157-165.
[11] Microsoft research program. (2010).
At:http://research.microsoft.com/enus/collaboration/papers/berkeley.pdf, accessed Jul. 2010
[12] Oxford R. and J. Oxford. (2009). “Second Language Teaching and Learning in the Next
Generation”, 2009. http://llt.msu.edu/vol14num1/review1.pdf, accessed Jul. 2010.
[13] Sharples. M. (2000). “The design of personal mobile technologies for lifelong learning”.
Computers & Education, 34(3-4), pp. 177-193.
[14] Stockwell. G. (2008). “Investigating learner preparedness for and usage patterns of mobile
learning”. ReCALL, 20(3), pp. 253–270.
29. [15] Thornton, P. & C.Houser. (2005). “Using mobile phones in English education in Japan.
Journal of Computer Assisted Learning”, 21(3), pp. 217–228.
[16] Yang Soon. G. (2005). “Technology for Foreign Language Learning”.
http://www.readingmatrix.com/conference/pp/proceedings/gohyingsoon.pdf, accessed Dec 2010.
[17] Yamaguchi. T. (2005). “Vocabulary Learning with a Mobile Phone”.
http://llt.msu.edu/vol10num1/emerging/default.html, accessed Jul. 2010.
[18] Yannick. J. (2007). “M-Learning: A pedagogical and technological model for language
learning on mobile phones”. In: Blended Learning, Joseph Fong, Fu Lee Wang (Eds), 2007, pp.
327-339.