International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
1. TOP READ ARTICLES IN APRIL 2020
INTERNATIONAL JOURNAL OF UBICOMP (IJU)
ISSN: 0975 - 8992 (ONLINE) ISSN 0976 - 2213(PRINT)
http://www.airccse.org/journal/iju/index.html
2. PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN
MOBILE AD HOC NETWORKS
Mohamed Elboukhari1
, Mostafa Azizi1
and Abdelmalek Azizi 2,3
1
Department of Applied Engineering, ESTO, Oujda, Morocco
2
Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3
Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers
have elaborated several routing protocols that possess different performance levels. In this paper we
give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in
Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyze these
MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter
influences their performance. In this study, performance is calculated in terms of Packet Delivery
Ratio, Average End to End Delay, Normalized Routing Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Networks (MANETs), Performance Comparaison, AODV, DSR, DSDV, OLSR,
DYMO
FOR MORE DETAILS: http://airccse.org/journal/iju/papers/6215iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol6.html
3. REFERENCES
[1] Rahman A, Islam S, Talevski A., “Performance Measurement Of Various Routing Protocols In
Adhoc Network”, In: Proceedings Of The International Multiconference Of Engineers And Computer
Scientists, Vol. 1. Hong Kong: IMECS; 2009.
[2] Tyagi SS, Chauhan RK., “Performance Analysis Of Proactive And Reactive Routing Protocols For
Ad Hoc Networks”, Int J Comput Appl 2010;1(14).
[3] Basagni S, Conti M, Giordano S, Stojmenovic I., “Mobile Ad Hoc Networking”, A John Wiley
And Sons, Inc., Publication; 2004.
[4] NS -2, The Ns Manual, Available At Http: //Www. Isi.Edu/Nsnam/Ns/Doc.
[5] Akshaiaggarwal, Savitagandhi, Nirbhaychaubey, “Performance Analysis Of AODV, DSDV And
DSR In Manets”, IJDPS, Vol.2, No.6,. November 2011.
[6] P. Manickam T. Guru Baskar, M.Girija, Dr.D.Manimegala, “Performance Comparisons Of Routing
Protocols In Mobile Ad Hoc Networks”, International Journal Of Wireless & Mobile Networks
(IJWMN), Pp. 98-106, February 2011.
[7] Sabina Barakovic, Suad Kasapovic, Jasmina Barakovic, “Comparison Of MANET Routing
Protocols In Different Traffic And Mobility Models”, Telfor Journal, Vol. 2, No. 1, 2010.
[8] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare, “Simulation Based Comparative
Performance Analysis Of Adhoc Routing Protocols”, In Proceedings Of TENCON 2008.
[9] Chenna Reddy, P.; Chandrasekhar Reddy, P., “Performance Analysis Of Adhoc Network Routing
Protocolsˮ, ISAUHC„06, International Symposium On Ad Hoc Andubiquitous Computing, Vol., No.,
Pp.186-187, 20-23 Dec. 2006.
[10] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar, “Comparative Study Of Adhoc Routing
Protocol AODV, DSR And DSDV In Mobile Adhoc Network”, Indian Journal Of Computer Science
And Engineering Vol. 1 No. 4 364-371, 2011.
[11] Ginni Tonk, Indu Kashyap, S.S. Tyagi, “Performance Comparison Of Ad-Hoc Network Routing
Protocols Using NS-2”, International Journal Of Innovative Technology And Exploring Engineering
(IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1, June 2012.
[12] Li Layuan, Li Chunlin, Yaun Peiyan, “Performance Evaluation And Simulation Of Routing
Protocols In Ad Hocnetworks”, Computer Communications 30 (2007) 1890- 1898.
[13] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni, “Qos Parameter Analysis On AODV
And DSDV Protocols In A Wireless Network”, International Journal Of Communication Network And
Security, Volume-1, Issue-1, 2011.
[14] Deepak Kumar, Ashutosh Srivastava, S C Gupta, “Performance Comparison Of DSDV And
AODV Routing Protocols In MANETS”, International Journal Of Electronics Communication And
Computer Technology (IJECCT) Volume 2 Issue 3, May 2012.
4. [15] Jun-Zhao Sun, “Mobile Ad Hoc Networking: An Essential Technology For Pervasive
Computing”, Proceedings Of International Conference On Info-Tech And Info-Net, Vol-3, Pp. 316-
321, 2001.
[16] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand Distance Vector Routing”, Proceeding of 2nd
IEEE Workshop, Mobile Computing System Applications, pp:90-100, 1999
[17] Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,
“draft-ietf-manet-aodv-13.txt, Feb. 2003
[18] S. A. Ade1& P.A.Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing
Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and
Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[19] J. Broch, D. Jhonson, and D. Maltz, “The dynamic source routing protocol for mobile adhoc
networks for IPv4”, IETF RFC 4728, Feb 2007
[20] I. Chakeres and C. Perkins, “Dynamic MANET On-Demand (DYMO) Routing”, IETF
InternetDraft, draft ietf-manet-dymo-23, Oct. 2012
[21] Charles E. Perkins and Pravin Bhagwat, “Highly dynamic destination-sequenced distance-vector
routing (DSDV) for mobile computers”, Technical report, IBM Research and University of Maryland,
USA, 1994.
[22] T. Clausen and P. Jacquet, “Optimized link State Routing protocol (OLSR)”, RFC-3626, IETF
Networking Group, 2003.
[23] Aleksandr Huhtonen, “Comparing AODV and OLSR routing protocols”, Helsinki University of
Technology, Telecommunication software and multimedia laboratory, 2004.
[24] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas (2009), “MANET Routing
Protocols vs. Mobility Models: Performance Analysis and Comparison”, Proceedings of the 9th
WSEAS International Conference on Applied Informatics and Communications (AIC '09).
[25] BonnMotion: A mobility scenario generation and analysis tool, Available at
http://sys.cs.uos.de/bonnmotion/
[26] http://masimum.inf.um.es/fjrm/development/
[27] Robins A.D, “GAWK: an effective AWK programming”, 3rd ed, April 2010.
[28] MATLAB: The language of Technical Computing, Available at http://www.mathworks.com/
[29] S.Corson and J.Macker, “Routing Protocol Performance Issues and Evaluation considerations”,
RFC2501, IETF Network Working Group, January 1999.
[30] The NS-3 reference manual, Available at http://www.nsnam.org/
5. AUTHORS
Mohamed elboukhari received the DESA (diploma of high study) degree in numerical analysis,
computer science and treatment of signal in 2005 from the University of Science, Oujda, Morocco. He
is currently an assistant professor, department of Applied Engineering, ESTO, university Mohamed
First, Oujda, Morocco. His research interests include cryptography, quantum cryptography and
wireless network security, Mobile Ad Hoc Networks (MANETS).
Mostafa azizi received the diploma of engineer in automatic and computer industry in 1993 from
school Mohammadia of engineers, Rabat, Morocco and he received the Ph. D in computer science in
2001 from the university Montreal, Canada. He is currently professor at university of Mohamed first,
Oujda, Morocco. His main interests include aspect of real time, embedded system, security and
communication and management of the computer systems in relation with process industry.
Abdelmalek azizi received the Ph. D in theory of numbers in 1993 from university Laval, Canada. He
is professor at department of mathematics in university Mohamed First, Oujda, Morocco. He is
interesting in history of mathematics in Morocco and in the application of the theory of number in
cryptography
6. A PROPOSED NOVEL APPROACH FOR SENTIMENT ANALYSIS AND
OPINION MINING
Ravendra Ratan Singh Jandail, Galgotias University, India
ABSTRACT
As the people are being dependent on internet the requirement of user view analysis is increasing
Exponentially. Customer posts their experience and opinion about the product policy and services.
But, Because of the massive volume of reviews, customers can’t read all reviews. In order to solve this
problem, a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot
of research is being carried out in Opinion Mining. Through the Opinion Mining, we can know about
contents of whole product reviews, Blogs are websites that allow one or more individuals to write
about things they want to share with other The valuable data contained in posts from a large number of
users across geographic, demographic and cultural boundaries provide a rich data source not only for
commercial exploitation but also for psychological & sociopolitical research. This paper tries to
demonstrate the plausibility of the idea through our clustering and classifying opinion mining
experiment on analysis of blog posts on recent product policy and services reviews. We are proposing
a Nobel approach for analyzing the Review for the customer opinion
FOR MORE DETAILS: http://airccse.org/journal/iju/papers/5214iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol5.html
7. REFERENCES
[1] Khairullah Khan, BaharumB.Baharudin, Aurangzeb Khan, Fazal-e-Malik , Mining Opinion from
text Documents: A Survey, 3rd IEEE International Conference on Digital Ecosystems and
Technologie, 2009
[2] David Alfred Ostrowski, Sentiment Mining within Social Media forTopic Identification ,IEEE
Fourth International Conference on Semantic Computing 2010
[3] ANA SUFIAN ,RANJITH ANANTHARAMAN ,Social Media Data Mining and Inference system
based on Sentiment Analysis 2011
[4] KENNETH BLOOM,Sentiment Analysis Based On Appraisal Theory And Functional Local
Grammar 2011.
[5] ANA SUFIAN ,RANJITH ANANTHARAMAN , Social Media Data Mining and Inference system
based on Sentiment Analysis 2011
[6] Hsinchun Chen and David Zimbra,AI and Opinion Mining ,IeeeInTeLLIGenTSySTeMS 2010
[7] Bo Pang and Lillian Lee Opinion Mining and Sentiment Analysis, Foundations and TrendsR_
inInformation Retrieval 2008
[8] NorlelaSamsudin, MazidahPuteh, Abdul RazakHamdan, MohdZakree Ahmad Nazri , Is Artificial
Immune System Suitable for OpinionMining? 4th Conference on Data Mining and Optimization
(DMO) , Langkawi, Malaysia 02-04 September 2012
[9] rik Cambria, Bj rnSchuller, unqing ia, Catherine Havasi, Published by the IEEE Computer Society
2013
[10] ThanhThung ,evaluation of natural language Processing technique for Sentiment Analysis , 2012
8. SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES
Ahmed Sameh and Abdulla Al-Masri, Prince Sultan University, KSA
ABSTRACT
The postulate of this paper is that current smartphones' power saving modes can be improved towards
saving more power and/or gain more user satisfaction only if they start following “preventive” and/or
user customized power saving plans. We develop a number of preventive power saving modes that
save the battery power without the need of using the power of the same battery for detecting abusage.
It will be supporting the user with a preventive plan that could give him/her an idea about what to run
or don’t run. Another issue of current power saving modes is the “One Size Fits All” philosophy which
does not take into consideration the factors that could distinguish different smartphone users, for
example, the nature of the workspace of the user (Indoor/Outdoor), the age, the gender and/or the
user’s applications categories of interests. The paper develops a strategy to match a smartphone power
saving mode with its perfect smartphone user by classifying smartphones users into classes depending
on a set of different factors and having the user to identify himself/herself to the smartphone before the
first use.
KEYWORDS
Power saving, Preventive, Detective, User Profile
FOR MORE DETAILS: https://aircconline.com/iju/V8N1/8117iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol8.html
9. REFERENCES
[1] A. Almasri, Preventive Customized Strategies for Saving Energy on Smartphones, M.Sc. Thesis,
Prince Sultan University, 2015
[2] W. Yuan and K. Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile
Multimedia Systems’, in Proceedings of the Nineteenth ACM Symposium on Operating Systems
Principles, SOSP ’03, New York, 2003
[3] S.K. Datta, C. Bonnet and N. Nikaein, ‘Power Monitor v2: Novel Power Saving Android
Application’, in 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), 2013
[4] S. Chakraborty and D.K.Y. Yau, ‘Predicting Energy Consumption of MPEG Video Playback on
Handhelds’, in 2002 IEEE International Conference on Multimedia and Expo, 2002. ICME ’02.
Proceedings, 2002
[5] R. Perez-Torres and C. Torres-Huitzil, ‘A Power-Aware Middleware for Location Amp; Context
Aware Mobile Apps with Cloud Computing Interaction’, in 2012 World Congress on Information and
Communication Technologies (WICT), 2012
[6] J. Flinn, ‘Reducing the Energy Usage of Office Applications’, in Middleware 2001, ed. by Rachid
Guerraoui, Lecture Notes in Computer Science, 2218 (2001)
[7] Yuan and Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia
Systems’, Lecture Notes in Computer Science, 2218 (2001)
[8] https://support.google.com/googleplay/answer/6014972?hl=en
[9] Abogharaf and Naik, ‘Client-Centric Data Streaming on Smartphones’, Mobile and Wireless
Networking (MoWNeT), International Conference on Selected Topics, 2013
[10] W. Yuan and others, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile
Multimedia Systems’, 2003, Electronic Imaging 2003
[11] H. Zeng ‘ECOSystem: Managing Energy As a First Class Operating System Resource’, in
Proceedings of the 10th International Conference on Architectural Support for Programming
Languages and Operating Systems, New York, 2002
[12] http://ziyang.eecs.umich.edu/projects/powertutor/
[13] Bonino and Corno, ‘DogOnt - Ontology Modeling for Intelligent Domotic Environments’ 2008
[14] Yuan, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile Multimedia
Systems’ SPIE/ACM Multimedia Computing and Networking Conference (MMCN), 2003