International Journal Of Engineering And Computer Science 2018-03-17T07:32:51+00:00 R. Lohar Open Journal Systems <p style="font-weight: 400;"><strong>International Journal Of Engineering And Computer Science </strong></p> <p style="font-weight: 400;">IJECS is a leading international journals for publication of new ideas, the state of the art research results and fundamental advances in all aspects of computer science and engineering. IJECS is a scholarly open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications related to Computer Science and Engineering</p> <p style="font-weight: 400;">It is an international journal intended for professionals and researchers in all fields of computer science and electronics. The IJECS publishes research articles and reviews within the whole field computer science &amp; engineering, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject.</p> <p style="font-weight: 400;">IJECS welcomes the submission of documents relating to any branch of the Theory of Computing and Engineering and its applications in business, industry and other topics. The topics covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, industrial engineering, internet computing, networking, operations research scientific computing, software engineering and its applications</p> <p style="font-weight: 400;"><strong>Editorial Policy&nbsp;</strong></p> <p style="font-weight: 400;">Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal</p> <p style="font-weight: 400;"><strong>Why IJECS&nbsp;</strong></p> <ul> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS is an International, Peer reviewed, Open Access Journal</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Paper will publish immediately in current issue after registration</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS accepts original and high quality research and technical papers</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Authors can download their full length paper at any time</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;frequency of publication Monthly</li> </ul> <p>Articles of IJECS are subjected to peer reviewing and these are included in the standard indexing databases like Cross Ref DOI, Index Copernicus (IC Value), Scientific Indexing Services SIS, Directory&nbsp;of&nbsp;Open Access Journals DOAJ, Directory&nbsp;of&nbsp;Research Journals Indexing DRJI, Google Scholar, Research Bible, New Jour, Jour Informatics, Science&nbsp;Center.</p> <p style="font-weight: 400;"><strong>Important notice</strong></p> <p>Authors can now directly send their manuscript as an email attachment to;</p> <p>All manuscripts are subject to rapid peer review. Those of high quality (not previously published and not under consideration for publication in another journal) will be published without delay. First-time users are required to register themselves as an author before making submissions by signing up the author registration form at journals website</p> <p>www.</p> <p>With the online journal management system that we are using, authors will be able to track manuscripts progress through the editorial process by logging in as author in authors Dashboard.</p> <p><strong>Top Reasons for publication with us</strong></p> <p><strong>Quick Quality Review:</strong>&nbsp;The journal has strong international team of editors and reviewers, Rapid Decision and Publication</p> <p><strong>Very Low Publication Fees:</strong>&nbsp;Comparable journals charge a huge sum for each accepted manuscript. IJEECS only charge the fees necessary to recoup cost associated with running the journal</p> <p>IJECS would take much care in making your article published without much delay with your kind cooperation.</p> <p>IJECS hopes that Researchers, Research scholars, Academician, Industrialists, Consultancy etc. would make use of this journal publication for the development of science and technology</p> Survey on Finding of Admissible Information and Influential Users 2018-03-17T07:06:16+00:00 Sharik Ahmad Dr. M. Mazhar Afzal Dr. Umesh Chandra <p>Influential users perform a crucial aspect in online media since users serve to have a strike to each other. In this paper, Influential's originate relevant information which satisfies the information needs of a compelling dissemination information and further how specific behaviour information may grant the recognization about influence communications in an online media. Understanding information dissemination processes that existing in online media, is an elementary mark approaching to the construction of powerful information dissemination system, support system, and growing marketing skills in the digital environment. Moreover, there are couple of major approaches of information dissemination are influence and relevance. Strength of popularise information in a social media is the influence</p> 2018-03-03T00:00:00+00:00 ##submission.copyrightStatement## Severity Analysis of Macular Edema using Random Tree Classifier 2018-03-17T07:06:15+00:00 Deepthi K Prasad Vibha L Venugopal K R <p>Macular edema ensues when there is abnormal pile-up of fluid and results in swelling of the macula part of the retina. It is commonly associated with diabetes. It can be diagnosed by identifying exudates in the retinal images. In the proposed work, macular the retinal image is pre-processed, enhanced and segmented using morphological operations. The optic disc and macula are segmented. Various statistical features are extracted. Optimal features are selected using Haar wavelets. The selected features are classified using Random tree classifier to detect the severity of the disease in to three stages namely, normal, mild and critical. The accuracy obtained is 98.4%.</p> 2018-03-03T00:00:00+00:00 ##submission.copyrightStatement## Two-Wheeler Safety System for Accident Prevention, Detection and Reporting 2018-03-17T07:06:14+00:00 Priyanka C Priya Darshini C Vinayak G Shavi Sarvar Begum <p>The objective of this paper is to build a safety system which is integrated with the smart helmet and intelligent bike to reduce the probability of two-wheeler accidents and drunk and drive cases. The pressure sensor and the accelerometer sensor checks if the person is wearing the helmet or not. Alcohol sensors detects the alcoholic content in the rider’s breath. If the rider is not wearing the helmet or there is alcohol content found in rider’s breath, the bike remains off. The bike will not start until the rider wears the helmet and there is no alcoholic content present stating that rider did not consume alcohol. When the rider crashes, helmet hits the ground and sensors detect the motion and tilts of helmet and reports the occurrence of an accident and sends information of the location of accident to the family members of the rider and the emergency contact numbers.</p> 2018-03-03T00:00:00+00:00 ##submission.copyrightStatement## Agriculture Robotics 2018-03-17T07:06:12+00:00 G. Tejaswani Afroz. B Shruthi. Y Sunitha .S <p>In this paper we are going to present about Agriculture Robot how farmer can perform plowing, seeding and grass cutting in fields. To perform this operation by using the agriculture robot we can reduce the labor work. We are using the android application to provide the input to the robot. By using GSM we are going to communicate with the robot. This system has three main sections like seeding, plowing and waste plant cutting. As per the user instruction the robot will perform the operation without human presence. It automatically stops when there is any abstracal comes in between and it sends the message regarding the abstracal to the user. By using, ultrasonic sensor it detects the abstract which comes in front of the robot.</p> 2018-03-03T00:00:00+00:00 ##submission.copyrightStatement## Pattern Identification and Predictions in Data Analysis 2018-03-17T07:06:10+00:00 Mrs.M. Sasikala Ms.D. Deepika Mr.S.Shiva Shankar <p>Data Mining is an analytic process to explore data in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new sets of data. The main target of data mining application is prediction. Predictive data mining is important and it has the most direct business applications in world. The paper briefly explains the process of data mining which consists of three stages: (1) the Initial exploration, (2) Pattern identification with validation, and (3) Deployment (application of the model to new data in order to generate predictions). Data Mining is being done for Patterns and Relationships recognitions in Data analysis, with an emphasis on large Observational data bases. From a statistical perspective Data Mining is viewed as computer automated exploratory data analytical system for large sets of data and it has huge Research challenges in India and abroad as well. Machine learning methods form the core of Data Mining and Decision tree learning. Data mining work is integrated within an existing user environment, including the works that already make use of data warehousing and Online Analytical Processing (OLAP). The paper describes how data mining tools predict future trends and behavior which allows in making proactive knowledge-driven decisions.</p> 2018-03-05T00:00:00+00:00 ##submission.copyrightStatement## Scope and Challenges of Internet of Things (IoT) in Kashmir 2018-03-17T07:06:11+00:00 Pala, M. Maqbool <p>Internet of things is a fast growing technology that shall be shaping overall living standards of human beings all over the world. It, however like all other technological advancements, is dependent on certain factors. This paper tries to evaluate the scope, chances of growth and challenges that can hinder its survival in Kashmir.</p> 2018-03-03T00:00:00+00:00 ##submission.copyrightStatement## A Text Recognizing Device For Visually Impaired 2018-03-17T07:06:09+00:00 G. Tejaswani Afroz. B Sunitha. S <p>In the present world visually impaired people use Braille&nbsp;lipi language to read the books, but those books are available only in particular places like library etc. It has become very difficult for the visually impaired peoples to come out into the real world. Braille cannot be used in every place like in the mobiles, supermarket, and news papers. Due to this it has become difficult for the visually impaired people to read the text. To overcome this difficulties faced by the visually impaired, finger reader with speech assistance is used to read any printed text from the mobiles, news papers etc. we are using the assistive technology in this device to provide the assistance for the visually impaired people</p> 2018-03-07T00:00:00+00:00 ##submission.copyrightStatement## Survey on Effect of Multimodal Interface on Senior Citizen 2018-03-17T07:06:08+00:00 Aleena Susan Mathew Vidya . N <p>Multimodal interface is designed within CAMI in which an Artificial Intelligent ecosystem integrates the main functionalities of AAL (Ambient Assisted Living) systems for senior citizen, which are its target users to fulfill their needs. It supports numerous languages. It can process both gesture and speech commands. It must work on different devices and adapt to any screen size. The interface is developed using HTML5, JavaScript, CSS3 and integrates Google Speech Service along with other services</p> 2018-03-07T00:00:00+00:00 ##submission.copyrightStatement## Review on Logic Encryption Strategy Ensuring Key Interdependency 2018-03-17T07:06:07+00:00 M. Padmaa S. Divyadarshini M. Keerthana T.S. Mohana Parameswari K. Mohana Priya <p>With the globalization of IC outline flow, numerous fables organizations outsource the creation of their plan to off-site foundries. As these foundries may not generally be believed, it brings about security vulnerabilities and dangers, for example, forging, IP theft, figuring out, overbuilding and Hardware Trojans. Logic encryption has developed to be a potential answer for secure the plan against these dangers. It presents some additional equipment (key-gates) into the plan to conceal the usefulness from unapproved clients, utilizing security keys. The areas of addition of key-gates decide the nature of the security gave by the subsequent plan. In this paper, we examined pros and cons of few papers and propose a productive technique to defeat the IP theft</p> 2018-03-11T00:00:00+00:00 ##submission.copyrightStatement## Survey on Cloud Based IP Traceback Authentication Framework 2018-03-17T07:06:06+00:00 Aswathy T Misha Ravi <p>IP traceback is used to find network traffic attack. Origin of IP packet is not authenticated. So source of&nbsp; IP&nbsp; address is not trusted. A time limited token based authentication framework for authenticating traceback service queries is implemented. The design objective of the framework is preventing the illegal users for accessing traceback information.Thus to prevent network traffic attack</p> 2018-03-11T00:00:00+00:00 ##submission.copyrightStatement## Recommender Framework for Sentimental Analysis using l-injection 2018-03-17T07:06:03+00:00 P. Deepa D.Eva Roshini V.Dhivya Bharathi S. Bhuvaneswari <p>We build up a novel structure, named as l-injection, to address the sparsity issue of recommender frameworks. Via precisely infusing low esteems to a chose set of unrated client thing sets in a client thing framework, we show that best N proposal correctness’s of different community oriented separating (CF) systems can be altogether and reliably moved forward. We initially embrace the thought of pre-utilize inclinations of clients toward a tremendous measure of unrated things. Utilizing this thought, we distinguish uninteresting things that have not been evaluated yet but rather are probably going to get low appraisals from clients, and specifically ascribe them as low esteems. As our proposed approach is technique rationalist, it can be effectively connected to an assortment of CF calculations. Through extensive investigations with three genuine datasets (e.g., Movielens, Ciao, and Watcha), we show that our answer reliably and generally upgrades the exactnesses of existing CF calculations (e.g., thing based CF, SVD-based CF, and SVD++) by 2.5 to 5 times overall. Besides, our answer enhances the running time of those CF techniques by 1.2 to 2.3 times when its setting produces the best precision</p> 2018-03-16T00:00:00+00:00 ##submission.copyrightStatement## Military Based Security System Using Raspberry Pi 2018-03-17T07:06:05+00:00 S. Kavitha S.R.Kamali Varshini Mrs.P. Vijayalakshmi <p><strong></strong>In today’s world Indian border military force is facing a huge destruction. Hence, most of the military organizations&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;take the help of military robots to carry out risky jobs which cannot be handled by humans. In this proposal, we design and implement in such a way that the robotic vehicle can enter into an area of higher risks, move and place wherever the object wants to go and captures intruder’s image. It has human detection Pi camera and temperature and gas detecting sensor that can provide precaution to potential crimes, fire and leakage of any gases. The credit card sized Raspberry Pi with Open Source Computer Vision (OpenCV) software controls the face detection algorithm and sends captured pictures to the user’s email via WI-FI. The pi-camera serves as the eye of the robot and provides us live video streaming. The biggest advantage of the system is that the user can get the picture of the intruder from anywhere in the world and can respond according to the risks in the situations.</p> <p><strong>&nbsp;</strong></p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The prime objectives of this paper are:</p> <ul> <li>To find the presence of an intruder - if detects, captures images and sends it to the given email address.</li> <li>Enables control of the robotic vehicle –i.e. The robot can be moved in any directions from the user present in any location.</li> <li>To find the presence of any gases present in the surrounding other than the normal air and warns the nearby person with its buzzing.</li> <li>Can monitor the location at any remote distance via live surveillance.</li> <li>To find the temperature of the environment</li> </ul> 2018-03-15T00:00:00+00:00 ##submission.copyrightStatement## Simulation of Quasi Cascaded H-Bridge Five-Level Boost Inverter 2018-03-17T07:32:51+00:00 M. Devika M. Sundaraperumal M.Valan Rajkumar <p>Multilevel inverters have become more attractive for researchers due to low total harmonic distortion in the output voltage and low electromagnetic interference. This paper proposes a novel single-stage quasi-cascaded H-bridge five-level boost inverter. The proposed quasi cascaded h-bridge five-level boost inverter has the advantages over the cascaded H-bridge quasi-Z-source inverter in cutting down passive components. Consequently, size, cost, and weight of the proposed inverter are reduced. A capacitor with low voltage rating is added to the proposed topology to remove an offset voltage of the output AC voltage when the input voltages of two modules are unbalanced. Besides, sinusoidal pulse width modulation techniques used here. PID controller is used to control the capacitor voltage of each module. This paper presents circuit analysis, the operating principles, and simulation results of the proposed system</p> 2018-03-16T00:00:00+00:00 ##submission.copyrightStatement## Survey of Routing Protocols under Realistic Mobility and Traffic 2018-03-17T07:06:02+00:00 Suman Kumar Shriramoju Dr.N. Satyanarayana <p>Mobile ad hoc networks are a dynamic and unpredictable community topology. There are numerous routing protocols that have been proposed for MANETs. Maximum pervious research centered on improving the present routing protocols or designing new routing algorithms. In our work, we investigated and compared the effect of mobility models on routing protocols for various site visitors instructions in MANETs. There have been many factors that affected the overall performance of routing protocols which include mobility and visitors styles. We designed several simulation models that added these factors together and measured the software performance in terms of end -to-end throughput (bit rate), latency, and jitter. three instructions of MANET routing algorithms (Proactive, Reactive, and Hybrid),&nbsp; mobility models (Random Waypoint and group), and three instructions of visitors styles (constant bit rate, variable bit rate, and random) have been used.</p> 2018-03-16T00:00:00+00:00 ##submission.copyrightStatement## Survey of new attack models on Cloud Infrastructure 2018-03-17T07:06:01+00:00 Har Preet Singh <p>Cloud Computing is currently most useful technol- ogy around the globe which offers an innovative business models for infrastructure to the enterprise , software services to the end users and the easy to deploy platform to the developer on Internet using virtual machine , for the quick and easy accessibility. It&nbsp;&nbsp;&nbsp;&nbsp; is Internet driven technology, which gives pool of resources such as Storage , Network , Application on demand basis. As the technology is driven over the Internet and virtual machine and allow resource pooling their are various kind of security problem arise relate to the model architecture, multi-tenancy, elasticity, data confidentiality, authentication and authorization. Various kind of attack could happen in cloud infrastructure ,as there&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is no exact definition about the attack and attack&nbsp; model&nbsp; but here we try to group into a various levels eg. Network level, host level and application level and few other attacks and the solution to prevent the attacks. In this paper we will discuss about the different kind of attacks and solution on cloud services</p> 2018-03-16T00:00:00+00:00 ##submission.copyrightStatement##