SlideShare a Scribd company logo
1 of 9
Download to read offline
TOP READ ARTICLES IN APRIL 2020
INTERNATIONAL JOURNAL OF UBICOMP (IJU)
ISSN: 0975 - 8992 (ONLINE) ISSN 0976 - 2213(PRINT)
http://www.airccse.org/journal/iju/index.html
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN
MOBILE AD HOC NETWORKS
Mohamed Elboukhari1
, Mostafa Azizi1
and Abdelmalek Azizi 2,3
1
Department of Applied Engineering, ESTO, Oujda, Morocco
2
Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3
Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers
have elaborated several routing protocols that possess different performance levels. In this paper we
give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in
Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyze these
MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter
influences their performance. In this study, performance is calculated in terms of Packet Delivery
Ratio, Average End to End Delay, Normalized Routing Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Networks (MANETs), Performance Comparaison, AODV, DSR, DSDV, OLSR,
DYMO
FOR MORE DETAILS: http://airccse.org/journal/iju/papers/6215iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol6.html
REFERENCES
[1] Rahman A, Islam S, Talevski A., “Performance Measurement Of Various Routing Protocols In
Adhoc Network”, In: Proceedings Of The International Multiconference Of Engineers And Computer
Scientists, Vol. 1. Hong Kong: IMECS; 2009.
[2] Tyagi SS, Chauhan RK., “Performance Analysis Of Proactive And Reactive Routing Protocols For
Ad Hoc Networks”, Int J Comput Appl 2010;1(14).
[3] Basagni S, Conti M, Giordano S, Stojmenovic I., “Mobile Ad Hoc Networking”, A John Wiley
And Sons, Inc., Publication; 2004.
[4] NS -2, The Ns Manual, Available At Http: //Www. Isi.Edu/Nsnam/Ns/Doc.
[5] Akshaiaggarwal, Savitagandhi, Nirbhaychaubey, “Performance Analysis Of AODV, DSDV And
DSR In Manets”, IJDPS, Vol.2, No.6,. November 2011.
[6] P. Manickam T. Guru Baskar, M.Girija, Dr.D.Manimegala, “Performance Comparisons Of Routing
Protocols In Mobile Ad Hoc Networks”, International Journal Of Wireless & Mobile Networks
(IJWMN), Pp. 98-106, February 2011.
[7] Sabina Barakovic, Suad Kasapovic, Jasmina Barakovic, “Comparison Of MANET Routing
Protocols In Different Traffic And Mobility Models”, Telfor Journal, Vol. 2, No. 1, 2010.
[8] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare, “Simulation Based Comparative
Performance Analysis Of Adhoc Routing Protocols”, In Proceedings Of TENCON 2008.
[9] Chenna Reddy, P.; Chandrasekhar Reddy, P., “Performance Analysis Of Adhoc Network Routing
Protocolsˮ, ISAUHC„06, International Symposium On Ad Hoc Andubiquitous Computing, Vol., No.,
Pp.186-187, 20-23 Dec. 2006.
[10] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar, “Comparative Study Of Adhoc Routing
Protocol AODV, DSR And DSDV In Mobile Adhoc Network”, Indian Journal Of Computer Science
And Engineering Vol. 1 No. 4 364-371, 2011.
[11] Ginni Tonk, Indu Kashyap, S.S. Tyagi, “Performance Comparison Of Ad-Hoc Network Routing
Protocols Using NS-2”, International Journal Of Innovative Technology And Exploring Engineering
(IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1, June 2012.
[12] Li Layuan, Li Chunlin, Yaun Peiyan, “Performance Evaluation And Simulation Of Routing
Protocols In Ad Hocnetworks”, Computer Communications 30 (2007) 1890- 1898.
[13] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni, “Qos Parameter Analysis On AODV
And DSDV Protocols In A Wireless Network”, International Journal Of Communication Network And
Security, Volume-1, Issue-1, 2011.
[14] Deepak Kumar, Ashutosh Srivastava, S C Gupta, “Performance Comparison Of DSDV And
AODV Routing Protocols In MANETS”, International Journal Of Electronics Communication And
Computer Technology (IJECCT) Volume 2 Issue 3, May 2012.
[15] Jun-Zhao Sun, “Mobile Ad Hoc Networking: An Essential Technology For Pervasive
Computing”, Proceedings Of International Conference On Info-Tech And Info-Net, Vol-3, Pp. 316-
321, 2001.
[16] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand Distance Vector Routing”, Proceeding of 2nd
IEEE Workshop, Mobile Computing System Applications, pp:90-100, 1999
[17] Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,
“draft-ietf-manet-aodv-13.txt, Feb. 2003
[18] S. A. Ade1& P.A.Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing
Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and
Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[19] J. Broch, D. Jhonson, and D. Maltz, “The dynamic source routing protocol for mobile adhoc
networks for IPv4”, IETF RFC 4728, Feb 2007
[20] I. Chakeres and C. Perkins, “Dynamic MANET On-Demand (DYMO) Routing”, IETF
InternetDraft, draft ietf-manet-dymo-23, Oct. 2012
[21] Charles E. Perkins and Pravin Bhagwat, “Highly dynamic destination-sequenced distance-vector
routing (DSDV) for mobile computers”, Technical report, IBM Research and University of Maryland,
USA, 1994.
[22] T. Clausen and P. Jacquet, “Optimized link State Routing protocol (OLSR)”, RFC-3626, IETF
Networking Group, 2003.
[23] Aleksandr Huhtonen, “Comparing AODV and OLSR routing protocols”, Helsinki University of
Technology, Telecommunication software and multimedia laboratory, 2004.
[24] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas (2009), “MANET Routing
Protocols vs. Mobility Models: Performance Analysis and Comparison”, Proceedings of the 9th
WSEAS International Conference on Applied Informatics and Communications (AIC '09).
[25] BonnMotion: A mobility scenario generation and analysis tool, Available at
http://sys.cs.uos.de/bonnmotion/
[26] http://masimum.inf.um.es/fjrm/development/
[27] Robins A.D, “GAWK: an effective AWK programming”, 3rd ed, April 2010.
[28] MATLAB: The language of Technical Computing, Available at http://www.mathworks.com/
[29] S.Corson and J.Macker, “Routing Protocol Performance Issues and Evaluation considerations”,
RFC2501, IETF Network Working Group, January 1999.
[30] The NS-3 reference manual, Available at http://www.nsnam.org/
AUTHORS
Mohamed elboukhari received the DESA (diploma of high study) degree in numerical analysis,
computer science and treatment of signal in 2005 from the University of Science, Oujda, Morocco. He
is currently an assistant professor, department of Applied Engineering, ESTO, university Mohamed
First, Oujda, Morocco. His research interests include cryptography, quantum cryptography and
wireless network security, Mobile Ad Hoc Networks (MANETS).
Mostafa azizi received the diploma of engineer in automatic and computer industry in 1993 from
school Mohammadia of engineers, Rabat, Morocco and he received the Ph. D in computer science in
2001 from the university Montreal, Canada. He is currently professor at university of Mohamed first,
Oujda, Morocco. His main interests include aspect of real time, embedded system, security and
communication and management of the computer systems in relation with process industry.
Abdelmalek azizi received the Ph. D in theory of numbers in 1993 from university Laval, Canada. He
is professor at department of mathematics in university Mohamed First, Oujda, Morocco. He is
interesting in history of mathematics in Morocco and in the application of the theory of number in
cryptography
A PROPOSED NOVEL APPROACH FOR SENTIMENT ANALYSIS AND
OPINION MINING
Ravendra Ratan Singh Jandail, Galgotias University, India
ABSTRACT
As the people are being dependent on internet the requirement of user view analysis is increasing
Exponentially. Customer posts their experience and opinion about the product policy and services.
But, Because of the massive volume of reviews, customers can’t read all reviews. In order to solve this
problem, a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot
of research is being carried out in Opinion Mining. Through the Opinion Mining, we can know about
contents of whole product reviews, Blogs are websites that allow one or more individuals to write
about things they want to share with other The valuable data contained in posts from a large number of
users across geographic, demographic and cultural boundaries provide a rich data source not only for
commercial exploitation but also for psychological & sociopolitical research. This paper tries to
demonstrate the plausibility of the idea through our clustering and classifying opinion mining
experiment on analysis of blog posts on recent product policy and services reviews. We are proposing
a Nobel approach for analyzing the Review for the customer opinion
FOR MORE DETAILS: http://airccse.org/journal/iju/papers/5214iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol5.html
REFERENCES
[1] Khairullah Khan, BaharumB.Baharudin, Aurangzeb Khan, Fazal-e-Malik , Mining Opinion from
text Documents: A Survey, 3rd IEEE International Conference on Digital Ecosystems and
Technologie, 2009
[2] David Alfred Ostrowski, Sentiment Mining within Social Media forTopic Identification ,IEEE
Fourth International Conference on Semantic Computing 2010
[3] ANA SUFIAN ,RANJITH ANANTHARAMAN ,Social Media Data Mining and Inference system
based on Sentiment Analysis 2011
[4] KENNETH BLOOM,Sentiment Analysis Based On Appraisal Theory And Functional Local
Grammar 2011.
[5] ANA SUFIAN ,RANJITH ANANTHARAMAN , Social Media Data Mining and Inference system
based on Sentiment Analysis 2011
[6] Hsinchun Chen and David Zimbra,AI and Opinion Mining ,IeeeInTeLLIGenTSySTeMS 2010
[7] Bo Pang and Lillian Lee Opinion Mining and Sentiment Analysis, Foundations and TrendsR_
inInformation Retrieval 2008
[8] NorlelaSamsudin, MazidahPuteh, Abdul RazakHamdan, MohdZakree Ahmad Nazri , Is Artificial
Immune System Suitable for OpinionMining? 4th Conference on Data Mining and Optimization
(DMO) , Langkawi, Malaysia 02-04 September 2012
[9] rik Cambria, Bj rnSchuller, unqing ia, Catherine Havasi, Published by the IEEE Computer Society
2013
[10] ThanhThung ,evaluation of natural language Processing technique for Sentiment Analysis , 2012
SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES
Ahmed Sameh and Abdulla Al-Masri, Prince Sultan University, KSA
ABSTRACT
The postulate of this paper is that current smartphones' power saving modes can be improved towards
saving more power and/or gain more user satisfaction only if they start following “preventive” and/or
user customized power saving plans. We develop a number of preventive power saving modes that
save the battery power without the need of using the power of the same battery for detecting abusage.
It will be supporting the user with a preventive plan that could give him/her an idea about what to run
or don’t run. Another issue of current power saving modes is the “One Size Fits All” philosophy which
does not take into consideration the factors that could distinguish different smartphone users, for
example, the nature of the workspace of the user (Indoor/Outdoor), the age, the gender and/or the
user’s applications categories of interests. The paper develops a strategy to match a smartphone power
saving mode with its perfect smartphone user by classifying smartphones users into classes depending
on a set of different factors and having the user to identify himself/herself to the smartphone before the
first use.
KEYWORDS
Power saving, Preventive, Detective, User Profile
FOR MORE DETAILS: https://aircconline.com/iju/V8N1/8117iju01.pdf
VOLUME LINK: http://www.airccse.org/journal/iju/vol8.html
REFERENCES
[1] A. Almasri, Preventive Customized Strategies for Saving Energy on Smartphones, M.Sc. Thesis,
Prince Sultan University, 2015
[2] W. Yuan and K. Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile
Multimedia Systems’, in Proceedings of the Nineteenth ACM Symposium on Operating Systems
Principles, SOSP ’03, New York, 2003
[3] S.K. Datta, C. Bonnet and N. Nikaein, ‘Power Monitor v2: Novel Power Saving Android
Application’, in 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), 2013
[4] S. Chakraborty and D.K.Y. Yau, ‘Predicting Energy Consumption of MPEG Video Playback on
Handhelds’, in 2002 IEEE International Conference on Multimedia and Expo, 2002. ICME ’02.
Proceedings, 2002
[5] R. Perez-Torres and C. Torres-Huitzil, ‘A Power-Aware Middleware for Location Amp; Context
Aware Mobile Apps with Cloud Computing Interaction’, in 2012 World Congress on Information and
Communication Technologies (WICT), 2012
[6] J. Flinn, ‘Reducing the Energy Usage of Office Applications’, in Middleware 2001, ed. by Rachid
Guerraoui, Lecture Notes in Computer Science, 2218 (2001)
[7] Yuan and Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia
Systems’, Lecture Notes in Computer Science, 2218 (2001)
[8] https://support.google.com/googleplay/answer/6014972?hl=en
[9] Abogharaf and Naik, ‘Client-Centric Data Streaming on Smartphones’, Mobile and Wireless
Networking (MoWNeT), International Conference on Selected Topics, 2013
[10] W. Yuan and others, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile
Multimedia Systems’, 2003, Electronic Imaging 2003
[11] H. Zeng ‘ECOSystem: Managing Energy As a First Class Operating System Resource’, in
Proceedings of the 10th International Conference on Architectural Support for Programming
Languages and Operating Systems, New York, 2002
[12] http://ziyang.eecs.umich.edu/projects/powertutor/
[13] Bonino and Corno, ‘DogOnt - Ontology Modeling for Intelligent Domotic Environments’ 2008
[14] Yuan, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile Multimedia
Systems’ SPIE/ACM Multimedia Computing and Networking Conference (MMCN), 2003

More Related Content

What's hot

New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...AIRCC Publishing Corporation
 
IRJET- Use of Artificial Neural Network in Construction Management
IRJET- Use of Artificial Neural Network in Construction ManagementIRJET- Use of Artificial Neural Network in Construction Management
IRJET- Use of Artificial Neural Network in Construction ManagementIRJET Journal
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
FDW on wireless technologies information brochure may 2012
FDW on wireless technologies information brochure may 2012FDW on wireless technologies information brochure may 2012
FDW on wireless technologies information brochure may 2012T. L. Singal
 
=Acs07 tania experim= copy
=Acs07 tania experim= copy=Acs07 tania experim= copy
=Acs07 tania experim= copyLaura Cruz Reyes
 
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...csandit
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Fahmi Yasser
 
Top research articles in 2020 in the area of Computer Science & Engineering
Top research articles in 2020 in the area of Computer Science &  EngineeringTop research articles in 2020 in the area of Computer Science &  Engineering
Top research articles in 2020 in the area of Computer Science & Engineeringgerogepatton
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education IJECEIAES
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
 
IRJET- Improvement of Labour Productivity in Construction Industry- Review
IRJET- Improvement of Labour Productivity in Construction Industry- ReviewIRJET- Improvement of Labour Productivity in Construction Industry- Review
IRJET- Improvement of Labour Productivity in Construction Industry- ReviewIRJET Journal
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)CSCJournals
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
 

What's hot (20)

New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
IRJET- Use of Artificial Neural Network in Construction Management
IRJET- Use of Artificial Neural Network in Construction ManagementIRJET- Use of Artificial Neural Network in Construction Management
IRJET- Use of Artificial Neural Network in Construction Management
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
Artificial Neural Networks for Construction Management: A Review
Artificial Neural Networks for Construction Management: A ReviewArtificial Neural Networks for Construction Management: A Review
Artificial Neural Networks for Construction Management: A Review
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
FDW on wireless technologies information brochure may 2012
FDW on wireless technologies information brochure may 2012FDW on wireless technologies information brochure may 2012
FDW on wireless technologies information brochure may 2012
 
Prasanna Raut CV
Prasanna Raut CVPrasanna Raut CV
Prasanna Raut CV
 
=Acs07 tania experim= copy
=Acs07 tania experim= copy=Acs07 tania experim= copy
=Acs07 tania experim= copy
 
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGOR...
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)
 
Top research articles in 2020 in the area of Computer Science & Engineering
Top research articles in 2020 in the area of Computer Science &  EngineeringTop research articles in 2020 in the area of Computer Science &  Engineering
Top research articles in 2020 in the area of Computer Science & Engineering
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
IRJET- Improvement of Labour Productivity in Construction Industry- Review
IRJET- Improvement of Labour Productivity in Construction Industry- ReviewIRJET- Improvement of Labour Productivity in Construction Industry- Review
IRJET- Improvement of Labour Productivity in Construction Industry- Review
 
Pramod2016 Mumbai
Pramod2016 MumbaiPramod2016 Mumbai
Pramod2016 Mumbai
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
 

Similar to Top Read Articles in April 2020 - IJU

April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to Top Read Articles in April 2020 - IJU (20)

April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

Top Read Articles in April 2020 - IJU

  • 1. TOP READ ARTICLES IN APRIL 2020 INTERNATIONAL JOURNAL OF UBICOMP (IJU) ISSN: 0975 - 8992 (ONLINE) ISSN 0976 - 2213(PRINT) http://www.airccse.org/journal/iju/index.html
  • 2. PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Mohamed Elboukhari1 , Mostafa Azizi1 and Abdelmalek Azizi 2,3 1 Department of Applied Engineering, ESTO, Oujda, Morocco 2 Departement Mathematics & Computer Science, FSO, Oujda, Morocco 3 Academy Hassan II of Sciences & Technology, Rabat, Morocco ABSTRACT Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc Networks (MANETS) to determine the best in different scenarios. We analyze these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalized Routing Load and Average Throughput. KEYWORDS Mobile Ad Hoc Networks (MANETs), Performance Comparaison, AODV, DSR, DSDV, OLSR, DYMO FOR MORE DETAILS: http://airccse.org/journal/iju/papers/6215iju01.pdf VOLUME LINK: http://www.airccse.org/journal/iju/vol6.html
  • 3. REFERENCES [1] Rahman A, Islam S, Talevski A., “Performance Measurement Of Various Routing Protocols In Adhoc Network”, In: Proceedings Of The International Multiconference Of Engineers And Computer Scientists, Vol. 1. Hong Kong: IMECS; 2009. [2] Tyagi SS, Chauhan RK., “Performance Analysis Of Proactive And Reactive Routing Protocols For Ad Hoc Networks”, Int J Comput Appl 2010;1(14). [3] Basagni S, Conti M, Giordano S, Stojmenovic I., “Mobile Ad Hoc Networking”, A John Wiley And Sons, Inc., Publication; 2004. [4] NS -2, The Ns Manual, Available At Http: //Www. Isi.Edu/Nsnam/Ns/Doc. [5] Akshaiaggarwal, Savitagandhi, Nirbhaychaubey, “Performance Analysis Of AODV, DSDV And DSR In Manets”, IJDPS, Vol.2, No.6,. November 2011. [6] P. Manickam T. Guru Baskar, M.Girija, Dr.D.Manimegala, “Performance Comparisons Of Routing Protocols In Mobile Ad Hoc Networks”, International Journal Of Wireless & Mobile Networks (IJWMN), Pp. 98-106, February 2011. [7] Sabina Barakovic, Suad Kasapovic, Jasmina Barakovic, “Comparison Of MANET Routing Protocols In Different Traffic And Mobility Models”, Telfor Journal, Vol. 2, No. 1, 2010. [8] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare, “Simulation Based Comparative Performance Analysis Of Adhoc Routing Protocols”, In Proceedings Of TENCON 2008. [9] Chenna Reddy, P.; Chandrasekhar Reddy, P., “Performance Analysis Of Adhoc Network Routing Protocolsˮ, ISAUHC„06, International Symposium On Ad Hoc Andubiquitous Computing, Vol., No., Pp.186-187, 20-23 Dec. 2006. [10] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar, “Comparative Study Of Adhoc Routing Protocol AODV, DSR And DSDV In Mobile Adhoc Network”, Indian Journal Of Computer Science And Engineering Vol. 1 No. 4 364-371, 2011. [11] Ginni Tonk, Indu Kashyap, S.S. Tyagi, “Performance Comparison Of Ad-Hoc Network Routing Protocols Using NS-2”, International Journal Of Innovative Technology And Exploring Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1, June 2012. [12] Li Layuan, Li Chunlin, Yaun Peiyan, “Performance Evaluation And Simulation Of Routing Protocols In Ad Hocnetworks”, Computer Communications 30 (2007) 1890- 1898. [13] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni, “Qos Parameter Analysis On AODV And DSDV Protocols In A Wireless Network”, International Journal Of Communication Network And Security, Volume-1, Issue-1, 2011. [14] Deepak Kumar, Ashutosh Srivastava, S C Gupta, “Performance Comparison Of DSDV And AODV Routing Protocols In MANETS”, International Journal Of Electronics Communication And Computer Technology (IJECCT) Volume 2 Issue 3, May 2012.
  • 4. [15] Jun-Zhao Sun, “Mobile Ad Hoc Networking: An Essential Technology For Pervasive Computing”, Proceedings Of International Conference On Info-Tech And Info-Net, Vol-3, Pp. 316- 321, 2001. [16] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand Distance Vector Routing”, Proceeding of 2nd IEEE Workshop, Mobile Computing System Applications, pp:90-100, 1999 [17] Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing, “draft-ietf-manet-aodv-13.txt, Feb. 2003 [18] S. A. Ade1& P.A.Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548. [19] J. Broch, D. Jhonson, and D. Maltz, “The dynamic source routing protocol for mobile adhoc networks for IPv4”, IETF RFC 4728, Feb 2007 [20] I. Chakeres and C. Perkins, “Dynamic MANET On-Demand (DYMO) Routing”, IETF InternetDraft, draft ietf-manet-dymo-23, Oct. 2012 [21] Charles E. Perkins and Pravin Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers”, Technical report, IBM Research and University of Maryland, USA, 1994. [22] T. Clausen and P. Jacquet, “Optimized link State Routing protocol (OLSR)”, RFC-3626, IETF Networking Group, 2003. [23] Aleksandr Huhtonen, “Comparing AODV and OLSR routing protocols”, Helsinki University of Technology, Telecommunication software and multimedia laboratory, 2004. [24] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas (2009), “MANET Routing Protocols vs. Mobility Models: Performance Analysis and Comparison”, Proceedings of the 9th WSEAS International Conference on Applied Informatics and Communications (AIC '09). [25] BonnMotion: A mobility scenario generation and analysis tool, Available at http://sys.cs.uos.de/bonnmotion/ [26] http://masimum.inf.um.es/fjrm/development/ [27] Robins A.D, “GAWK: an effective AWK programming”, 3rd ed, April 2010. [28] MATLAB: The language of Technical Computing, Available at http://www.mathworks.com/ [29] S.Corson and J.Macker, “Routing Protocol Performance Issues and Evaluation considerations”, RFC2501, IETF Network Working Group, January 1999. [30] The NS-3 reference manual, Available at http://www.nsnam.org/
  • 5. AUTHORS Mohamed elboukhari received the DESA (diploma of high study) degree in numerical analysis, computer science and treatment of signal in 2005 from the University of Science, Oujda, Morocco. He is currently an assistant professor, department of Applied Engineering, ESTO, university Mohamed First, Oujda, Morocco. His research interests include cryptography, quantum cryptography and wireless network security, Mobile Ad Hoc Networks (MANETS). Mostafa azizi received the diploma of engineer in automatic and computer industry in 1993 from school Mohammadia of engineers, Rabat, Morocco and he received the Ph. D in computer science in 2001 from the university Montreal, Canada. He is currently professor at university of Mohamed first, Oujda, Morocco. His main interests include aspect of real time, embedded system, security and communication and management of the computer systems in relation with process industry. Abdelmalek azizi received the Ph. D in theory of numbers in 1993 from university Laval, Canada. He is professor at department of mathematics in university Mohamed First, Oujda, Morocco. He is interesting in history of mathematics in Morocco and in the application of the theory of number in cryptography
  • 6. A PROPOSED NOVEL APPROACH FOR SENTIMENT ANALYSIS AND OPINION MINING Ravendra Ratan Singh Jandail, Galgotias University, India ABSTRACT As the people are being dependent on internet the requirement of user view analysis is increasing Exponentially. Customer posts their experience and opinion about the product policy and services. But, Because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem, a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole product reviews, Blogs are websites that allow one or more individuals to write about things they want to share with other The valuable data contained in posts from a large number of users across geographic, demographic and cultural boundaries provide a rich data source not only for commercial exploitation but also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea through our clustering and classifying opinion mining experiment on analysis of blog posts on recent product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the customer opinion FOR MORE DETAILS: http://airccse.org/journal/iju/papers/5214iju01.pdf VOLUME LINK: http://www.airccse.org/journal/iju/vol5.html
  • 7. REFERENCES [1] Khairullah Khan, BaharumB.Baharudin, Aurangzeb Khan, Fazal-e-Malik , Mining Opinion from text Documents: A Survey, 3rd IEEE International Conference on Digital Ecosystems and Technologie, 2009 [2] David Alfred Ostrowski, Sentiment Mining within Social Media forTopic Identification ,IEEE Fourth International Conference on Semantic Computing 2010 [3] ANA SUFIAN ,RANJITH ANANTHARAMAN ,Social Media Data Mining and Inference system based on Sentiment Analysis 2011 [4] KENNETH BLOOM,Sentiment Analysis Based On Appraisal Theory And Functional Local Grammar 2011. [5] ANA SUFIAN ,RANJITH ANANTHARAMAN , Social Media Data Mining and Inference system based on Sentiment Analysis 2011 [6] Hsinchun Chen and David Zimbra,AI and Opinion Mining ,IeeeInTeLLIGenTSySTeMS 2010 [7] Bo Pang and Lillian Lee Opinion Mining and Sentiment Analysis, Foundations and TrendsR_ inInformation Retrieval 2008 [8] NorlelaSamsudin, MazidahPuteh, Abdul RazakHamdan, MohdZakree Ahmad Nazri , Is Artificial Immune System Suitable for OpinionMining? 4th Conference on Data Mining and Optimization (DMO) , Langkawi, Malaysia 02-04 September 2012 [9] rik Cambria, Bj rnSchuller, unqing ia, Catherine Havasi, Published by the IEEE Computer Society 2013 [10] ThanhThung ,evaluation of natural language Processing technique for Sentiment Analysis , 2012
  • 8. SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES Ahmed Sameh and Abdulla Al-Masri, Prince Sultan University, KSA ABSTRACT The postulate of this paper is that current smartphones' power saving modes can be improved towards saving more power and/or gain more user satisfaction only if they start following “preventive” and/or user customized power saving plans. We develop a number of preventive power saving modes that save the battery power without the need of using the power of the same battery for detecting abusage. It will be supporting the user with a preventive plan that could give him/her an idea about what to run or don’t run. Another issue of current power saving modes is the “One Size Fits All” philosophy which does not take into consideration the factors that could distinguish different smartphone users, for example, the nature of the workspace of the user (Indoor/Outdoor), the age, the gender and/or the user’s applications categories of interests. The paper develops a strategy to match a smartphone power saving mode with its perfect smartphone user by classifying smartphones users into classes depending on a set of different factors and having the user to identify himself/herself to the smartphone before the first use. KEYWORDS Power saving, Preventive, Detective, User Profile FOR MORE DETAILS: https://aircconline.com/iju/V8N1/8117iju01.pdf VOLUME LINK: http://www.airccse.org/journal/iju/vol8.html
  • 9. REFERENCES [1] A. Almasri, Preventive Customized Strategies for Saving Energy on Smartphones, M.Sc. Thesis, Prince Sultan University, 2015 [2] W. Yuan and K. Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia Systems’, in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ’03, New York, 2003 [3] S.K. Datta, C. Bonnet and N. Nikaein, ‘Power Monitor v2: Novel Power Saving Android Application’, in 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), 2013 [4] S. Chakraborty and D.K.Y. Yau, ‘Predicting Energy Consumption of MPEG Video Playback on Handhelds’, in 2002 IEEE International Conference on Multimedia and Expo, 2002. ICME ’02. Proceedings, 2002 [5] R. Perez-Torres and C. Torres-Huitzil, ‘A Power-Aware Middleware for Location Amp; Context Aware Mobile Apps with Cloud Computing Interaction’, in 2012 World Congress on Information and Communication Technologies (WICT), 2012 [6] J. Flinn, ‘Reducing the Energy Usage of Office Applications’, in Middleware 2001, ed. by Rachid Guerraoui, Lecture Notes in Computer Science, 2218 (2001) [7] Yuan and Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia Systems’, Lecture Notes in Computer Science, 2218 (2001) [8] https://support.google.com/googleplay/answer/6014972?hl=en [9] Abogharaf and Naik, ‘Client-Centric Data Streaming on Smartphones’, Mobile and Wireless Networking (MoWNeT), International Conference on Selected Topics, 2013 [10] W. Yuan and others, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile Multimedia Systems’, 2003, Electronic Imaging 2003 [11] H. Zeng ‘ECOSystem: Managing Energy As a First Class Operating System Resource’, in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems, New York, 2002 [12] http://ziyang.eecs.umich.edu/projects/powertutor/ [13] Bonino and Corno, ‘DogOnt - Ontology Modeling for Intelligent Domotic Environments’ 2008 [14] Yuan, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile Multimedia Systems’ SPIE/ACM Multimedia Computing and Networking Conference (MMCN), 2003