International Journal Of Engineering And Computer Science http://ijecs.in/index.php/ijecs <p style="font-weight: 400;"><strong>International Journal Of Engineering And Computer Science </strong></p> <p style="font-weight: 400;">IJECS is a leading international journals for publication of new ideas, the state of the art research results and fundamental advances in all aspects of computer science and engineering. IJECS is a scholarly open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications related to Computer Science and Engineering</p> <p style="font-weight: 400;">It is an international journal intended for professionals and researchers in all fields of computer science and electronics. The IJECS publishes research articles and reviews within the whole field computer science &amp; engineering, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject.</p> <p style="font-weight: 400;">IJECS welcomes the submission of documents relating to any branch of the Theory of Computing and Engineering and its applications in business, industry and other topics. The topics covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, industrial engineering, internet computing, networking, operations research scientific computing, software engineering and its applications</p> <p style="font-weight: 400;"><strong>Editorial Policy&nbsp;</strong></p> <p style="font-weight: 400;">Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal</p> <p style="font-weight: 400;"><strong>Why IJECS&nbsp;</strong></p> <ul> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS is an International, Peer reviewed, Open Access Journal</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Paper will publish immediately in current issue after registration</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;IJECS accepts original and high quality research and technical papers</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;Authors can download their full length paper at any time</li> <li class="show" style="font-weight: 400;">&nbsp; &nbsp;frequency of publication Monthly</li> </ul> <p>Articles of IJECS are subjected to peer reviewing and these are included in the standard indexing databases like Cross Ref DOI, Index Copernicus (IC Value), Scientific Indexing Services SIS, Directory&nbsp;of&nbsp;Open Access Journals DOAJ, Directory&nbsp;of&nbsp;Research Journals Indexing DRJI, Google Scholar, Research Bible, New Jour, Jour Informatics, Science&nbsp;Center.</p> <p style="font-weight: 400;"><strong>Important notice</strong></p> <p>Authors can now directly send their manuscript as an email attachment to editor@ijecs.in&nbsp;</p> <p>All manuscripts are subject to rapid peer review. Those of high quality (not previously published and not under consideration for publication in another journal) will be published without delay. First-time users are required to register themselves as an author before making submissions by signing up the author registration form at journals website</p> <p>www. http://ijecs.in</p> <p>With the online journal management system that we are using, authors will be able to track manuscripts progress through the editorial process by logging in as author in authors Dashboard.</p> <p><strong>Top Reasons for publication with us</strong></p> <p><strong>Quick Quality Review:</strong>&nbsp;The journal has strong international team of editors and reviewers, Rapid Decision and Publication</p> <p><strong>Very Low Publication Fees:</strong>&nbsp;Comparable journals charge a huge sum for each accepted manuscript. IJEECS only charge the fees necessary to recoup cost associated with running the journal</p> <p>IJECS would take much care in making your article published without much delay with your kind cooperation.</p> <p>IJECS hopes that Researchers, Research scholars, Academician, Industrialists, Consultancy etc. would make use of this journal publication for the development of science and technology</p> en-US editor@ijecs.in (R. Lohar) editor@ijecs.in (P. Lohar) Tue, 01 May 2018 00:00:00 +0000 OJS 3.1.0.1 http://blogs.law.harvard.edu/tech/rss 60 The Video Analytics Based Data Warehousing Using IoT http://ijecs.in/index.php/ijecs/article/view/4044 <p>Video accumulations fundamentally have vast information volume. Video investigation attempts to normally discover illustrations and connections present in the substantial volume of video information, which can assist the end-customer with taking educated and savvy decisions and anticipate the future in light of the cases discovered transversely finished space and time. Video investigation help recognize protests in distribution centers. The measure of information is well rich in videos. To decipher and break down the video is troublesome Video examination expect a fundamental part for find cases and partner the recordings which can help end customers to get information and savvy decisions. Video examination perceives inquiries in warehousing. At the center of the item is a propelled question following motor that constantly tracks moving and stationary targets. A lightweight scattered video coding design is shown for video observation applications. Foundation casings and forefront maps are created utilizing a video examination module on the decoder side. A decoded outline is incorporated with the reproduced sub-outlines and the foundation outline. Through a reproduction, the proposed plot is seemed to accomplish better than anything cutting edge coding profitability while diminishing coding multifaceted nature enormously both at the encoder and the decoder. Every tracking method requires an object detection mechanism either in every frame or when the object first appears in the video. Object tracking is the process of locating an object or multiple objects over time using a camera. Once the object is tracked all the collected data’s are maintained in a database which is known as data warehousing. Then the collected data’s a placed in IoT.</p> T. Swetha, S.Neethu Shaji, J. Vanishree, A.R. Sunita, V. Swetha ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4044 Tue, 01 May 2018 16:52:31 +0000 A A Review on E-Ball Technology http://ijecs.in/index.php/ijecs/article/view/4036 <p>We all are familiar with the word computer, and we all know that earlier computer was huge in size. Day by day the size of computer reduces and &nbsp;&nbsp;now a new concept of PC is introduced that is E-Ball Concept pc. The E-Ball concept PC is the smallest design among all the laptops and desktops<em>. E</em><em>-</em><em>ball</em> is design by <strong>“Apostol Tnokovski”,</strong> a 31 year old Macedonian product designer. He has replaced the old PC from the squares and rectangular shape with his newly designed wonder in a spherical shape. According to Apostol it is the best shape in nature and it draws everybody’s attention. It is the smallest PC ever made. The size of E-ball is just like a ball, we can keep in our pocket and move from one place to another. This PC contain everything in-built like keyboard, mouse etc. This PC concept features all the traditional elements like mouse, keyboard, large screen display, DVD recorder; speaker etc. It is yet to be launched in market. The research in this field is still going on.</p> Mrs. Abhilasha Khare ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4036 Tue, 01 May 2018 17:00:53 +0000 Analysis of Machine Learning Techniques for Breast Cancer Prediction http://ijecs.in/index.php/ijecs/article/view/4071 <p>Of all the deaths worldwide, the second most common cause of death is breast cancer. In 2011, the number of deaths was estimated to be 5.8 millions because of breast cancer. So, early diagnosis of cancer is very important.&nbsp; In this paper, machine learning techniques are explored in order to increase the accuracy of diagnosis. Methods such as CART, Random Forest, K-Nearest Neighbors are compared. The dataset used is obtained from UC Irvine Machine Learning Repository. The obtained accuracy prediction performances are proportionate to existing methods. However it is found that KNN algorithm has much better performance than the other techniques used in comparison.</p> Priyanka Gupta, Prof. Shalini L ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4071 Mon, 07 May 2018 10:08:06 +0000 Message Validation in Wireless Sensor Network http://ijecs.in/index.php/ijecs/article/view/4017 <p>&nbsp;Message authentication is one of the most efficient way to keep the data safe from unauthorized access and corrupted messages which is being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Many schemes have the restrictions of high computational and communication transparency and&nbsp; deficient in&nbsp; the&nbsp; scalability to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of higher processing time determined by the degree of the polynomial when the number of messages transmitted is larger, the adversary can fully recover the polynomial.</p> <p>This system allows&nbsp; the intermediate nodes authentication to&nbsp; transmit a larger number of messages without suffering with the time complexity problem. It is basically design to authenticate the message in network while transferring. Here we will utilize the elliptic curve polynomial y2 = (x3 + ax + b) mod p and comparison will be done between transmission with and without security mechanism of signatures. To prove that our approach is better than Polynomial based scheme we compare result between Elgamal signature analyses with ECC polynomial signature analysis.</p> Shruti Amburle, Vaishali Khairnar ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4017 Mon, 07 May 2018 10:16:55 +0000 Survey on Intrusion Detection System using Machine – Learning approaches http://ijecs.in/index.php/ijecs/article/view/4047 <p>Intrusion Detection Systems (IDSs) are a noteworthy line of guard for shielding system assets from illicit infiltrations. A lot of research is being done on the development of effective Network Intrusion Detection Systems. Anomaly based Network Intrusion Detection Systems are preferred over Signature based Network Intrusion Detection Systems because of their better significance in detecting novel attacks. The research on the datasets being used for training and testing purpose in the detection model is equally concerned as better dataset quality can advance offline Intrusion Detection. Recently, Machine Learning (ML) approaches have been implemented in the Network Intrusion Detection Systems (NIDS) to protect computer networks and to overcome network security issues. This survey paper aims at disclosing different strategies followed in Intrusion Detection Systems (IDSs) using machine learning over the years and because of the headway in advancements, our lucid view is just on the most recent patterns.</p> Blessing Solomon B.C, Jesu Jayarin. P ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4047 Wed, 09 May 2018 06:16:22 +0000 Quality assessment of mangoes using computer vision and machine learning http://ijecs.in/index.php/ijecs/article/view/4048 <p style="margin-bottom: 0.35cm; line-height: 100%; orphans: 2; widows: 2;" align="justify" lang="en-US"><span style="font-family: Times\ New\ Roman, serif;"><span style="font-size: small;"><strong>Food processing industry requires precise and accurate quality assessment of products. This assessment effects the price of product and also the storage and transport decisions. This paper intends to address the automation of quality assessment in mangoes using computer vision. The paper addresses two issues, namely the number of surface injuries and the time-to-maturity of the fruit. A visible spectrum image of the fruits is considered to extract the Region of Interest(RoI), which contain the fruit with minimal background. Each RoI is further subjected to segmentation techniques so as to identify the injured patches as well as the portion of immature(green) area on the fruit surface. The percentage of these areas is used to determine the grade and the time-to-maturity respectively for each product.</strong></span></span></p> Sidharth Jail, Mosami Chinawalkar, Rahul Khedkar, Yash Rathi, Pujashree Vidap ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4048 Wed, 09 May 2018 06:24:10 +0000 Driver Drowsiness Detection Based On Novel Eye Openness Recognition Method Using Image Processing http://ijecs.in/index.php/ijecs/article/view/4064 <p><strong><em>In</em></strong><em> <strong>this paper, we proposed a driver drowsiness detection method for which only eyelid movement information was required. The proposed method consists of two major parts. 1) In order to obtain accurate eye openness estimation, a vision based eye openness recognition method was proposed to obtain an regression model that directly gave degree of eye openness from a low-resolution eye image without complex geometry modeling, which is efficient and robust to degraded image quality. 2) A novel feature extraction method based on unsupervised learning was also proposed to reveal hidden pattern from eyelid movements as well as reduce the feature dimension.</strong></em> <strong><em>To develop such a system we need to install some hardware components like camera inside the vehicle, which can capture the image of the driver at a fixed interval, and an alarm system, which will alert the driver after detecting his/her level of drowsiness and in the next level it will stop the vehicle automatically. Now apart from these hardware components, we need a software part also, which can detect the level of drowsiness of the driver and is the main concern of our paper. In this paper, we develop a drowsiness detection system that will accurately monitor the open or closed state of the driver’s eyes in real-time. The proposed method was evaluated and shown good performance.</em></strong></p> M.Valan Rajkumar, R.Sasi kala, S. Suresh, J.Chandra mohan ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4064 Sun, 13 May 2018 06:09:40 +0000 Bot Net of Things – A Survey http://ijecs.in/index.php/ijecs/article/view/4034 <p>Internet of things is talk of the town now a days but the potential threat IoT has over the cyber safety is less emphasized. The possibility for attackers with all systems interconnected with no or less security measures installed in them, makes them vulnerable to all kinds of security attacks. Botnet consists of collection of private computers interconnected together and affected by malicious software, which can be controlled as a group without the owner’s knowledge. BotNet is roBot and Network combination, the bot here is the compromised device. Denial of service, spyware, email spam, click fraud, bit coin etc., and are some of the well-known attacks by botnet. Botnet control itself has become a community, which focuses on prevention, control and repair services. This paper focuses on detailed survey of botnet and it’s regarding features.</p> M. Shanmughapriya, G. Sumathi, K.C. Aarthi ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4034 Sun, 13 May 2018 06:15:47 +0000 Identification and Detection of Missing RFID Tags using RUN Protocol http://ijecs.in/index.php/ijecs/article/view/4027 <p>As human race or human society is growing, the wildlife/domestic animals are in danger. But as per natures rule, every living creature on this earth is important and has important role in ecosystem. The animals get misplaced sometimes and finding them is a tedious task. RFID and sensors have been deployed to detect and identify missing animals by affixing them with cheap passive RFID tag and monitoring them with RFID readers. In our project, system will help us to detect and find the missing animals using RUN protocol, using this the missing animals will get detected and the location will get generated automatically through google maps. RUN protocol uses slotted aloha for communication between tags and readers. It executes multiple frames for different seeds to reduce the effect of unexpected tags and also it reduces the time of missing tag detection and identification. RUN identifies 100% missing tags in the presence of unexpected tags where as other protocol only identifies 60% of missing tags.</p> Parth Sagar, Ankita Jade, Nikita Bhirud, Gauri Patwari, Ankita Vaste ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4027 Tue, 22 May 2018 03:47:43 +0000 Surveillance Robot for Military Application http://ijecs.in/index.php/ijecs/article/view/4066 <p>This project presents a modern approach for surveillance at remote and border areas using multifunctional robot based on current IOT&nbsp; used in defense and military applications. This robotic vehicle has ability to substitute the solider at border &nbsp;area &nbsp;t provide surveillance. The &nbsp;robotic&nbsp; vehicle&nbsp; works&nbsp; both&nbsp;&nbsp; as autonomous and manually controlled vehicle using internet communication&nbsp; medium.This multisensory&nbsp;&nbsp; robot used to detect presence of enemy capture it in camera and &nbsp;give &nbsp;the &nbsp;live&nbsp; streaming&nbsp; to&nbsp; the&nbsp; authorized&nbsp; person Surveillance is major role while we workin on &nbsp;border &nbsp;area &nbsp;for &nbsp;&nbsp;this &nbsp;there &nbsp;is &nbsp;robot &nbsp;for surveillance &nbsp;purpose.This paper presents a smart &nbsp;surveillance&nbsp; robot &nbsp;for&nbsp; military application by using &nbsp;Raspberry &nbsp;Pi &nbsp;for &nbsp;security purpose. An field Raspberr pi sends a wireless &nbsp;command &nbsp;which &nbsp;is received &nbsp;by Authorized &nbsp;person on web &nbsp;Page &nbsp;and &nbsp;accordingly &nbsp;robot &nbsp;moves. The Video &nbsp;Streaming is &nbsp;done using &nbsp;Raspberry pi camera. The Raspberry pi programming is done in python language. The experimental result shows that the video streamed up to 15 frames per second.</p> <p>&nbsp;</p> S. A Joshi, Aparna Tondarkar, Krishna Solanke, Rohit Jagtap ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4066 Tue, 22 May 2018 04:03:48 +0000 Estimation of age groups using facial recognition features http://ijecs.in/index.php/ijecs/article/view/4049 <p>Facial recognition has been used to detect emotions, gender, expressions and identity. These topics have been extensively studied. But, automatic Age Estimation is a topic that has not been researched much. The basis of our topic is that there are features on the human face that change as our age increases and in our research we utilize these features for age group classification. We classify the images into 6 age groups- (0-6, 8-12, 15-20, 25-32, 38-53, 60-100). The process involves 3 stages: -Pre-processing, Feature Extraction, Classification. Preprocessing includes commotion decreasing, standardization and change of the crude information into structure that is suitable for the pattern recognition. A small set of good features is selected from the available features, in order to provide best matching information. This process discovers important features to obtain an effective and improved answer for a given problem which is the next step. At last the classification or clustering stage is performed. Classification comprises of allotting a class mark to a given pattern while clustering discoveries homogeneous small groups in information. We also deal with comparison study of various feature extraction techniques (Haar feature extraction, HOG feature extraction) and classification techniques (Naïve Bayes, SVM, KNN, Neural Network-Back propagation algorithm) and finally try to determine the best possible combination for age group classification. Convolutional Neural Networks is also applied to estimate the age groups.</p> suman mann, bhuvnesh mehra, anshul mangla, shubham runwal, prateek singhal ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-sa/4.0 http://ijecs.in/index.php/ijecs/article/view/4049 Tue, 22 May 2018 08:13:55 +0000