International Journal of Engineering and Computer Science 2018-09-25T13:11:55+00:00 P. Lohar Open Journal Systems <p style="font-weight: 400;"><strong>International Journal Of Engineering And Computer Science </strong></p> <p style="font-weight: 400;">IJECS is a leading international journals for publication of new ideas, the state of the art research results and fundamental advances in all aspects of computer science and engineering. IJECS is a scholarly open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications related to Computer Science and Engineering</p> <p style="font-weight: 400;">It is an international journal intended for professionals and researchers in all fields of computer science and electronics. The IJECS publishes research articles and reviews within the whole field computer science &amp; engineering, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject.</p> <p style="font-weight: 400;">IJECS welcomes the submission of documents relating to any branch of the Theory of Computing and Engineering and its applications in business, industry and other topics. The topics covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, industrial engineering, internet computing, networking, operations research scientific computing, software engineering and its applications</p> <p style="font-weight: 400;"><strong>Editorial Policy&nbsp;</strong></p> <p style="font-weight: 400;">Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal</p> <p style="font-weight: 400;"><strong>Why IJECS&nbsp;</strong></p> <ul> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS is an International, Peer reviewed, Open Access Journal</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Paper will publish immediately in current issue after registration</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS accepts original and high quality research and technical papers</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Authors can download their full length paper at any time</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;frequency of publication Monthly</li> </ul> <p>Articles of IJECS are subjected to peer reviewing and these are included in the standard indexing databases like Cross Ref DOI, Index Copernicus (IC Value), Scientific Indexing Services SIS, Directory&nbsp;of&nbsp;Open Access Journals DOAJ, Directory&nbsp;of&nbsp;Research Journals Indexing DRJI, Google Scholar, Research Bible, New Jour, Jour Informatics, Science&nbsp;Center.</p> <p style="font-weight: 400;"><strong>Important notice</strong></p> <p>Authors can now directly send their manuscript as an email attachment to;</p> <p>All manuscripts are subject to rapid peer review. Those of high quality (not previously published and not under consideration for publication in another journal) will be published without delay. First-time users are required to register themselves as an author before making submissions by signing up the author registration form at journals website</p> <p>www.</p> <p>With the online journal management system that we are using, authors will be able to track manuscripts progress through the editorial process by logging in as author in authors Dashboard.</p> <p><strong>Top Reasons for publication with us</strong></p> <p><strong>Quick Quality Review:</strong>&nbsp;The journal has strong international team of editors and reviewers, Rapid Decision and Publication</p> <p><strong>Very Low Publication Fees:</strong>&nbsp;Comparable journals charge a huge sum for each accepted manuscript. IJEECS only charge the fees necessary to recoup cost associated with running the journal</p> <p>IJECS would take much care in making your article published without much delay with your kind cooperation.</p> <p>IJECS hopes that Researchers, Research scholars, Academician, Industrialists, Consultancy etc. would make use of this journal publication for the development of science and technology</p> NFC communication protocol 2018-09-15T07:39:33+00:00 LN Harnaningrum <p><em>Near Field Communication (NFC) is a short-range communication technology. Because of its popularity, NFC is widely applied in the field of Internet of Things (IoT). NFC technology reduces the use of many other devices, so that only smartphones, which have NFC embedded in them, are then widely used for various purposes. Smartphones are becoming quite popular equipment today, because smartphone users are increasing from time to time. With this development, NFC is embeded in smartphones widely used and quite popular. </em></p> <p><em>Implementation of NFC has been done in various fields, such as health, business, transportation and others. NFC applications in the Service Domain include healthcare, location, finance, social networking, entertainment, education etc. In the field of healthcare applications, NFC can facilitate communication between patients and paramedics, such as doctors, nurses, pharmacists, and other sections. In other fields there are social networking applications, entertainment applications, education applications, NFC miscellaneous applications. </em></p> <p><em>In terms of the development of the tag itself, NFC can be discussed with 2 kinds of approach. Firstly is from the side of tag, and secondly is in terms of communication technology. There are 4 types of NFC tags, type 1, type 2, type 3 and type 4. Each type has its own specifications. </em><em>F</em><em>rames, data and payload formats have </em><em>their own </em><em>different specifications. </em><em>In its </em><em>technolog</em><em>ical side </em><em>&nbsp;there are 3 types</em><em> of</em><em> NFC A, B and F. Each type </em><em>has its different way </em><em>in signals and the data </em><em>format </em><em>sent. NFC type A</em><em> is used in this testing</em></p> <p><em>Such rapid development, however, gives&nbsp; positive and negative impacts. One of the effects is that with the use of NFC cards that there will be more possibilities for multiple cards to be read simultaneously. For this reason, a reader is required to read more than one card. Trials show that some cards can be read by a reader sequentially and can write or read.</em></p> 2018-09-02T00:00:00+00:00 ##submission.copyrightStatement## Software effort prediction with algorithm based frameworks 2018-09-15T07:39:33+00:00 Shrikant Pawar Aditya Stanam <p>The need for accurate effort predictions for projects is one of the most critical and complex issues in the software industry. Effort estimation is an essential activity in planning and monitoring software project development to deliver the product on time and within budget. The competitiveness of software organizations depends on their ability to predict the effort required for developing software systems accurately. Several algorithmic approaches have been proposed in the literature to support software engineers in improving the accuracy of their estimations. The decision of how to select different techniques considering the characteristics of a specific dataset through genetic algorithms could be viewed as a search-based problem for software engineering. Some groups use well known evolutionary learning algorithms (MMRE, PRED (25), PRED (50) and PRED (75), while others use machine learning methods like artificial neural network and fuzzy logic. Analogy estimation is also being utilized for estimating software effort, which has been shown to predict accurate results consistently. Genetic frameworks are becoming famous for selecting best learning schemes for effort prediction using the elitism techniques, utilizing some well-known parameters like Spearman's rank correlation, the median of the magnitude of relative error (MdMRE), and mean of the absolute residuals (MMAR). The technique of using fuzzy rough sets for the analysis is also becoming popular. This article aims to compare various algorithm based frameworks for predicting software development effort which 
can generate the best-optimized software product.</p> 2018-09-02T14:21:52+00:00 ##submission.copyrightStatement## A New Approach to Automesh Generation of all β graded triangular and quadrilateral Finite Elements over Analytical Surfaces by using the Parabolic Arcs passing through four points on the Boundary Curve 2018-09-15T07:39:33+00:00 H.T. Rathod Bharath Rathod <p>This paper presents a new mesh generation method for a&nbsp; simply connected curved&nbsp; domain of a planar region which has&nbsp; curved boundary described by one or more analytical equations. We first decompose this curved domain&nbsp; into simple sub regions in the shape of curved triangles. These simple regions are then triangulated to generate a fine mesh of&nbsp;&nbsp; linear triangles in the interior and curved triangles near to the boundary of curved domain.&nbsp; These simple regions are then triangulated &nbsp;to create 6-node triangles&nbsp; by inserting midside nodes to these triangles. Each isolated 6-node triangle is then split into four triangles according to the usual scheme, that is, by using straight lines to join the midside nodes. To preserve the mesh conformity a similar procedure is also applied to every triangle of the domain to fully discretize the given convex curved&nbsp; or cracked convex &nbsp;curved&nbsp; domains&nbsp;&nbsp; into all triangles, thus propagating&nbsp;refinements and .The quadrangulation of &nbsp; graded 3-node linear triangles is done by inserting three midside nodes and a centroidal node.Then each graded triangle is split into three quadrilaterals by using straight lines to join the centroid to the&nbsp; midside nodes. This simple method generates a high quality mesh whose elements confirm well to the requested shape by refining the problem domain.</p> <p>&nbsp;&nbsp;&nbsp; We have&nbsp; approximated the curved boundary arcs by&nbsp; equivalent <strong>parabolic arcs.</strong>To preserve the mesh conformity, &nbsp;a similar procedure is also applied to every triangle of the domain to fully discretize the given curved&nbsp; domain&nbsp;&nbsp; into all triangles and quadrilaterals, thus propagating &nbsp;a &nbsp;uniform&nbsp; refinement. This simple method generates a high quality mesh whose elements confirm well to the requested shape by refining the problem domain. Examples of a <strong>circular disk</strong>&nbsp; and a <strong>cracked circular disk</strong>&nbsp; are presented to illustrate the simplicity and efficiency of the new mesh generation method. We have appended the&nbsp; MATLAB programs which incorporate the mesh generation scheme developed in this paper. These programs provide valuable&nbsp; output on the nodal coordinates ,element connectivity&nbsp; and graphic display of the all triangular and quadrilateral mesh for application to finite element analysis.</p> 2018-09-09T14:17:59+00:00 ##submission.copyrightStatement## Analysis of Encryption Techniques to Enhance Secure Data Transmission 2018-09-25T13:11:55+00:00 Rajesh Kannan Dr. R. Mala <p>with the rapid increase of technology, the data stored and transmitted among the client and server has been increased tremendously. In order to provide high security for the confidential data, there is a need for proper encryption techniques that are to be followed by the concerns. This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption. Document oriented databases such as MongoDB, Cassandra, CouchDB, Redis and Hypertable are compared on the basis of their security aspects since they manipulate the huge amount of unstructured data in their databases. It is proposed that each database has its own security breaches and emphasises the need for proper encryption methods to secure the data stored in them.&nbsp;</p> 2018-09-15T16:45:17+00:00 ##submission.copyrightStatement##