IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
Routing Protocol AODV of MANET Using NS-, K.Vanaja, Dr. R. Umarani
Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India
Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India.
Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India.
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
1kumarsanjaysonkar@gmail.com, 2rahulsingh.tech@gmail.com, 3ritu.chauhan.94@gmail.com, 4apsingh3289@gmail.com
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Department of Electrical and computer engineering, Islamic Azad University, Iran
Department of Computer Science, University of Tabriz, Tabriz, Iran
Sama Technical and Vocational Training College, Islamic Azad University, Iran
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
Routing Protocol AODV of MANET Using NS-, K.Vanaja, Dr. R. Umarani
Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India
Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India.
Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India.
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
1kumarsanjaysonkar@gmail.com, 2rahulsingh.tech@gmail.com, 3ritu.chauhan.94@gmail.com, 4apsingh3289@gmail.com
M.Deepa, P.Revathy PG Student, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India Assistant Professor, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Department of Electrical and computer engineering, Islamic Azad University, Iran
Department of Computer Science, University of Tabriz, Tabriz, Iran
Sama Technical and Vocational Training College, Islamic Azad University, Iran
|
Abstract
All Aspects of Database Management Systems and Data Mining
Lijo John
Lecturer In Computer Engineering, Thiagarajar Polytechnic College, Alagappanagar, Thrissur, Kerala.
Abstract: With technological advancement, particularly in the last three decades or so, a massive amount of information has been converted to digital form, resulting in the formation of massive data repositories. With the accumulation of information in these repositories, the question of how to extract meaningful knowledge from it remained. Data mining is the process of discovering useful patterns in large amounts of data. The paper discusses a few data mining techniques, algorithms, and organisations that have successfully used data mining technology to improve their businesses. To deal with the situation, data mining was used as a tool. Data mining is a procedure for extracting hidden information from massive sets of databases in order to excavate eloquent patterns and rules, and it is regarded as a stepping stone to the procedure of knowledge discovery in databases. Data mining is now an essential component in almost every aspect of human life.
Keyword: Data mining, Knowledge discovery in database, Knowledge base, Database Management System.
Mrs. Preeti N. Baheti, Prof. N. N. Kasat, Prof. S. Kasturiwala
Dept.of EXTC, SIPNA’s COET, Maharashtra, India
Dept.of EXTC, SIPNA’s COET. Maharashtra, India
Dept.of EXTC, SIPNA’s COET. Maharashtra, India
Abstract: The paper aims at clearing the out of focus blur. Lens defocus introduces uniform blurring, Restoring these kinds of images is an interesting research field .The low resolution cameras manufactured at lower end like mobile phone and web camera mostly suffers through out-of-focus blur. Current auto focus solutions used in commercial cameras are design to ensure that captured images are in focus by adjusting the lens position and aperture opening. This needs an auto focusing hardware. The assembly is bulky and costly, cannot employed at handheld application where cameras are rigid (fixed lens &aperture). Moreover it has fundamental limitations that when the scene contains multiple objects with largely varying depths , a single image cannot capture all the objects in focus simultaneously in that case camera captures multiple images with variable depth. We present a novel method for virtually focusing the defocused video captured by camera. Virtual Focusing stands for the technique of providing an image processing solution to recover focused image sequences from videos taken by an out-of-focus camera with fixed physical parameters (cell phone cameras and webcams).
Segmentation and Feature Extraction of Ultrasound Images by Modified Level Set Method and Chain-VESE Methods Using SRAD Filter
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
Abstract: Cancer is one of the most dreaded disease for mankind, if tumour are detected at initial stages then this disease can be completely cured, there are so many models in diagnosis of cancer one of these model is diagnosis through Ultrasound Images. So this paper proposes a model to segment the abnormality present in the Ultrasound image such as tumour or the lesion or the calculi. This model can be proposed for diagnosing and segmenting kidney calculi, lesions in ultrasound images. Compared to other methods of diagnosing tumours Ultrasound is more effective and easy to implement, less complicated and less in cost compared to CT scan and other methods. Segmentation of ultrasound images presents a unique challenge because these images contain strong speckle noise. There are many models for segmenting lesions from Ultrasound images but they are specified only to some organs like only to breast cancer or to prostrate cancer or only to the liver images but proposed model can be used to segment all Ultrasound B-mode images. So proposed model is tried on five different sets of Ultrasound images like kidney, liver and uterus to check the robustness of the model. The proposed model first the ultrasound image is developed from an organ then it is applied to SRAD filter to reduce the speckle and retain the edges of the images along with lesion part then we perform Automatic Thresholding is performed by Otsu algorithm followed by initializing Active contours by level set method and at last we segment the lesion by using Chan Vese model. Results are compared with various theoretical threshold values with the experimental values are closely approximated by the mean of zeroth and first order cumulative methods for texture features like area, solidity, perimeter. This method is simple compared to other methods and can be used for any B – mode Ultrasound images.
Department of Computer Science and Engineering, Amity School of engineering & Technology, Amity University, Noida
Abstract: Defect Handling is one of the major and important activity involved in the software various software projects. Defect Handling basically includes identification and taking actions for defect prevention for improving the software quality. Earlier defect identification in software projects will make defect removal and prevention much easier. Software engineers generally take experiences from the past and prevent the defects from re-occurring. In this research paper our first section is the introduction of software defects, second section is the introduction of defect handling life cycle models, third section is use of Cost Constructive COQUALMO model for defect handling, fourth section is conclusions and last section is future scope.
A Simulated Behavioural Study of Prominent Reactive Routing Protocol AODV of MANET Using NS-2
Routing Protocol AODV of MANET Using NS-, K.Vanaja, Dr. R. Umarani
Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India
Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Abstract: The dynamic development in communication technology plays a vital role in wireless network .Communication takes place by routing protocols in effective and efficient manner. Efficient protocols are used to forward data packets without much packet loss. Mobile Adhoc Network (MANET) is a collection of mobile devices, a self configured, multi-hop network. Simulating Tool NS-2 is an outstanding network simulating tool among all the others. Adhoc On Demand Distance Vector Routing Protocol (AODV) is one among the prominent Reactive Routing Protocol in MANET. The main causes for link break are mobility between nodes such as node failure and node power off. The objective of this paper is to explore AODV, when frequent link failure in network due to mobility of the nodes in the network. The paper examines and results the mobility of source node, intermediate node and destination node under link failure due to mobility. The performance analysis and simulation are carried out to evaluate network performance using Network Simulator (NS-2), based on the quantitative metrics packet delivery ratio, throughput and average end to end delay. The simulated result helps to understand the behavior of the protocol AODV in the distributed network environment under mobility and to show its ability to adapt in real world networks.
A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India.
Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India.
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
1kumarsanjaysonkar@gmail.com, 2rahulsingh.tech@gmail.com, 3ritu.chauhan.94@gmail.com, 4apsingh3289@gmail.com
Abstract: Voice over Internet protocol (VoIP), there is an existing way of communication over any network. The Users can make the telephone calls over an IP network using this technology. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. There are two kinds of spoofing attacks are possible, first one is IP spoofing attack and another is URI spoofing attack, which are described in this review paper. The Implementation of VoIP concerned by businesses, components of a VoIP system, and relevant security issues. The business concerns will be those which are used to affect the Quality of Service (QoS). The network components call processors, gateways and two of the more common architectures are held by VoIP.
Validation of Document Clustering based on Purity and Entropy measures
M.Deepa, P. Revathy
PG Student1, Assistant Professor
Rajalakshmi Engineering College, Thandalam
Abstract: Document clustering aims to automatically group related document into clusters. If two documents are close to each other in the original document space, they are grouped into the same cluster. If the two documents are far away from each other in the original document space, they tend to be grouped into different cluster. The classical clustering algorithms assign each data to exactly one cluster, but fuzzy c-means allow data belong to different clusters. Fuzzy clustering is a powerful unsupervised method for the analysis of data. Cluster validity measure is useful in estimating the optimal number of clusters. Purity and Entropy are the validity measures used in this clustering.
Keywords: Document clustering, fuzzy c-means, validation, purity and entropy measures.
Challenges of Security, Protection and Trust on E-Commerce: A Case of Online Purchasing in LIBYA
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Abstract: E-commerce is a successful business-based innovation via internet. This form of business transaction strategy offers many opportunities for growth in business and marketing services in various aspects. Online shopping is an intermediary mode between marketers or sellers to the end user or the consumers. Nature of online transaction in Libya is constrained by instability resulting from insecurity, unprotected transaction as well as trust. Online shopping could become predominant source of shopping method, if the barriers associated with insecurity, trust and customer’s protection are tackled. Owing to the significance of e-commerce towards Libyan economic growth, this paper highlights the limitations associated with e-commerce transaction in Libya and proposes relevant steps towards overcoming these constrains. Relevance of integrating e-commerce in Libyan economic system is discussed with.
Vegetation Extraction from Free Google Earth Images of Deserts Using a Robust BPNN Approach in HSV Space
Mohamed H. Almeer
Computer Science & Engineering Department
Qatar University
Doha, QATAR
almeer@qu.edu.qa, almeerqatar@gmail.com
Abstract: The high resolution and span diversity of colored Google Earth images are the main reasons for developing a vegetation extraction mechanism based on BPNN (Back Propagation Neural Networks)that can work efficientlywith poor color images. This paper introduces a method based on neural networks that can efficiently recognize vegetation and discriminate its zone from the desert, urban, and road-street zones that surround it. Our method utilizes a large number of training images extracted from 10’s of images containing random samples from the same area of Google Earth. We then use the multi-layer perceptron, a type of supervised learning algorithm, to learn the relation between vegetation and desert areas based only on color. The proposed method was verified by experimentation on a real Google Images sequence taken for Qatar. Finally justified results were produced.
Keywords: Remote sensing, neural networks, BPNN, digital image processing, classification, HSV color space
Department of Electrical and computer engineering, Islamic Azad University, Iran
Department of Computer Science, University of Tabriz, Tabriz, Iran
Sama Technical and Vocational Training College, Islamic Azad University, Iran
Abstract: Most of scientific applications need high speed and powerful computations. Using the computational potential of multiple processors enables us to achieve this goal. This factor as well as the story of former sequential programs that were so costly in generation, culminated at the invention of a tool named as “super-compiler” to automatically convert sequential code into parallel code. Super compilers identify the hidden parallelism inside programs and convert sequential programs into parallel ones. As most of computational programs incorporate nested loops, the parallel execution of these loops increases the running speed of programs. So the parallelization of nested loops is crucial for increasing the execution speed of programs. One of the conversion stages of sequential nested loops into parallel ones is to schedule the tiled iteration space. Regarding the fact that, so far the block and cyclic approaches have been introduced , in this paper the wave-front approach and wave-angle shifts have been incorporated in the block and cyclic approaches in order to reduce the execution time of two-level nested loops.
All Aspects of Database Management Systems and Data Mining
Lijo John
Lecturer In Computer Engineering, Thiagarajar Polytechnic College, Alagappanagar, Thrissur, Kerala.
Abstract: With technological advancement, particularly in the last three decades or so, a massive amount of information has been converted to digital form, resulting in the formation of massive data repositories. With the accumulation of information in these repositories, the question of how to extract meaningful knowledge from it remained. Data mining is the process of discovering useful patterns in large amounts of data. The paper discusses a few data mining techniques, algorithms, and organisations that have successfully used data mining technology to improve their businesses. To deal with the situation, data mining was used as a tool. Data mining is a procedure for extracting hidden information from massive sets of databases in order to excavate eloquent patterns and rules, and it is regarded as a stepping stone to the procedure of knowledge discovery in databases. Data mining is now an essential component in almost every aspect of human life.
Keyword: Data mining, Knowledge discovery in database, Knowledge base, Database Management System.
Mrs. Preeti N. Baheti, Prof. N. N. Kasat, Prof. S. Kasturiwala
Dept.of EXTC, SIPNA’s COET, Maharashtra, India
Dept.of EXTC, SIPNA’s COET. Maharashtra, India
Dept.of EXTC, SIPNA’s COET. Maharashtra, India
Abstract: The paper aims at clearing the out of focus blur. Lens defocus introduces uniform blurring, Restoring these kinds of images is an interesting research field .The low resolution cameras manufactured at lower end like mobile phone and web camera mostly suffers through out-of-focus blur. Current auto focus solutions used in commercial cameras are design to ensure that captured images are in focus by adjusting the lens position and aperture opening. This needs an auto focusing hardware. The assembly is bulky and costly, cannot employed at handheld application where cameras are rigid (fixed lens &aperture). Moreover it has fundamental limitations that when the scene contains multiple objects with largely varying depths , a single image cannot capture all the objects in focus simultaneously in that case camera captures multiple images with variable depth. We present a novel method for virtually focusing the defocused video captured by camera. Virtual Focusing stands for the technique of providing an image processing solution to recover focused image sequences from videos taken by an out-of-focus camera with fixed physical parameters (cell phone cameras and webcams).
Segmentation and Feature Extraction of Ultrasound Images by Modified Level Set Method and Chain-VESE Methods Using SRAD Filter
Hemanth Kumar, Prathibha AM P, Stafford Michahial Assistant Professor, AMC Engineering College, Bangalore, India Assistant Professor, AMC Engineering College, Bangalore, India PG student, AMC Engineering College, Bangalore, India
Abstract: Cancer is one of the most dreaded disease for mankind, if tumour are detected at initial stages then this disease can be completely cured, there are so many models in diagnosis of cancer one of these model is diagnosis through Ultrasound Images. So this paper proposes a model to segment the abnormality present in the Ultrasound image such as tumour or the lesion or the calculi. This model can be proposed for diagnosing and segmenting kidney calculi, lesions in ultrasound images. Compared to other methods of diagnosing tumours Ultrasound is more effective and easy to implement, less complicated and less in cost compared to CT scan and other methods. Segmentation of ultrasound images presents a unique challenge because these images contain strong speckle noise. There are many models for segmenting lesions from Ultrasound images but they are specified only to some organs like only to breast cancer or to prostrate cancer or only to the liver images but proposed model can be used to segment all Ultrasound B-mode images. So proposed model is tried on five different sets of Ultrasound images like kidney, liver and uterus to check the robustness of the model. The proposed model first the ultrasound image is developed from an organ then it is applied to SRAD filter to reduce the speckle and retain the edges of the images along with lesion part then we perform Automatic Thresholding is performed by Otsu algorithm followed by initializing Active contours by level set method and at last we segment the lesion by using Chan Vese model. Results are compared with various theoretical threshold values with the experimental values are closely approximated by the mean of zeroth and first order cumulative methods for texture features like area, solidity, perimeter. This method is simple compared to other methods and can be used for any B – mode Ultrasound images.
Department of Computer Science and Engineering, Amity School of engineering & Technology, Amity University, Noida
Abstract: Defect Handling is one of the major and important activity involved in the software various software projects. Defect Handling basically includes identification and taking actions for defect prevention for improving the software quality. Earlier defect identification in software projects will make defect removal and prevention much easier. Software engineers generally take experiences from the past and prevent the defects from re-occurring. In this research paper our first section is the introduction of software defects, second section is the introduction of defect handling life cycle models, third section is use of Cost Constructive COQUALMO model for defect handling, fourth section is conclusions and last section is future scope.
A Simulated Behavioural Study of Prominent Reactive Routing Protocol AODV of MANET Using NS-2
Routing Protocol AODV of MANET Using NS-, K.Vanaja, Dr. R. Umarani
Assistant Professor, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, India
Associate Professor, Sri Sarada College for Women, Salem, Tamil Nadu, India
Abstract: The dynamic development in communication technology plays a vital role in wireless network .Communication takes place by routing protocols in effective and efficient manner. Efficient protocols are used to forward data packets without much packet loss. Mobile Adhoc Network (MANET) is a collection of mobile devices, a self configured, multi-hop network. Simulating Tool NS-2 is an outstanding network simulating tool among all the others. Adhoc On Demand Distance Vector Routing Protocol (AODV) is one among the prominent Reactive Routing Protocol in MANET. The main causes for link break are mobility between nodes such as node failure and node power off. The objective of this paper is to explore AODV, when frequent link failure in network due to mobility of the nodes in the network. The paper examines and results the mobility of source node, intermediate node and destination node under link failure due to mobility. The performance analysis and simulation are carried out to evaluate network performance using Network Simulator (NS-2), based on the quantitative metrics packet delivery ratio, throughput and average end to end delay. The simulated result helps to understand the behavior of the protocol AODV in the distributed network environment under mobility and to show its ability to adapt in real world networks.
A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks
Sanjay Kumar Sonkar, Rahul Singh, Ritu Chauhan, Ajay Pal Singh
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
Dept. of Computer Science and Engineering, Sharda University, UttarPradesh, India.
Dept. of Electronics and Communication Engineering, Sharda University, UttarPradesh, India.
Dept. of Computer Science and Engineering, Kamla Nehru Institute of Technology, UttarPradesh, India.
1kumarsanjaysonkar@gmail.com, 2rahulsingh.tech@gmail.com, 3ritu.chauhan.94@gmail.com, 4apsingh3289@gmail.com
Abstract: Voice over Internet protocol (VoIP), there is an existing way of communication over any network. The Users can make the telephone calls over an IP network using this technology. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. There are two kinds of spoofing attacks are possible, first one is IP spoofing attack and another is URI spoofing attack, which are described in this review paper. The Implementation of VoIP concerned by businesses, components of a VoIP system, and relevant security issues. The business concerns will be those which are used to affect the Quality of Service (QoS). The network components call processors, gateways and two of the more common architectures are held by VoIP.
Validation of Document Clustering based on Purity and Entropy measures
M.Deepa, P.Revathy PG Student, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India Assistant Professor, Dept. of CSE, Rajalakshmi Engineering College, Chennai, India
Abstract: Document clustering aims to automatically group related document into clusters. If two documents are close to each other in the original document space, they are grouped into the same cluster. If the two documents are far away from each other in the original document space, they tend to be grouped into different cluster. The classical clustering algorithms assign each data to exactly one cluster, but fuzzy c-means allow data belong to different clusters. Fuzzy clustering is a powerful unsupervised method for the analysis of data. Cluster validity measure is useful in estimating the optimal number of clusters. Purity and Entropy are the validity measures used in this clustering.
Keywords: Document clustering, fuzzy c-means, validation, purity and entropy measures.
Challenges of Security, Protection and Trust on E-Commerce: A Case of Online Purchasing in LIBYA
Abdulghader.A.Ahmed.Moftah, Siti Norul Huda Sheikh Abdullah, Hadya.S.Hawedi Center of Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Department of Electronics & communication, Dehradun Institute of Technology, Dehradun, India
Abstract: E-commerce is a successful business-based innovation via internet. This form of business transaction strategy offers many opportunities for growth in business and marketing services in various aspects. Online shopping is an intermediary mode between marketers or sellers to the end user or the consumers. Nature of online transaction in Libya is constrained by instability resulting from insecurity, unprotected transaction as well as trust. Online shopping could become predominant source of shopping method, if the barriers associated with insecurity, trust and customer’s protection are tackled. Owing to the significance of e-commerce towards Libyan economic growth, this paper highlights the limitations associated with e-commerce transaction in Libya and proposes relevant steps towards overcoming these constrains. Relevance of integrating e-commerce in Libyan economic system is discussed with.
Vegetation Extraction from Free Google Earth Images of Deserts Using a Robust BPNN Approach in HSV Space
Mohamed H. Almeer
Computer Science & Engineering Department
Qatar University
Doha, QATAR
almeer@qu.edu.qa, almeerqatar@gmail.com
Abstract: The high resolution and span diversity of colored Google Earth images are the main reasons for developing a vegetation extraction mechanism based on BPNN (Back Propagation Neural Networks)that can work efficientlywith poor color images. This paper introduces a method based on neural networks that can efficiently recognize vegetation and discriminate its zone from the desert, urban, and road-street zones that surround it. Our method utilizes a large number of training images extracted from 10’s of images containing random samples from the same area of Google Earth. We then use the multi-layer perceptron, a type of supervised learning algorithm, to learn the relation between vegetation and desert areas based only on color. The proposed method was verified by experimentation on a real Google Images sequence taken for Qatar. Finally justified results were produced.
Keywords: Remote sensing, neural networks, BPNN, digital image processing, classification, HSV color space
Department of Electrical and computer engineering, Islamic Azad University, Iran
Department of Computer Science, University of Tabriz, Tabriz, Iran
Sama Technical and Vocational Training College, Islamic Azad University, Iran
Abstract: Most of scientific applications need high speed and powerful computations. Using the computational potential of multiple processors enables us to achieve this goal. This factor as well as the story of former sequential programs that were so costly in generation, culminated at the invention of a tool named as “super-compiler” to automatically convert sequential code into parallel code. Super compilers identify the hidden parallelism inside programs and convert sequential programs into parallel ones. As most of computational programs incorporate nested loops, the parallel execution of these loops increases the running speed of programs. So the parallelization of nested loops is crucial for increasing the execution speed of programs. One of the conversion stages of sequential nested loops into parallel ones is to schedule the tiled iteration space. Regarding the fact that, so far the block and cyclic approaches have been introduced , in this paper the wave-front approach and wave-angle shifts have been incorporated in the block and cyclic approaches in order to reduce the execution time of two-level nested loops.