Pub Date : 2022-07-05DOI: 10.53759/181x/jcns202202012
A. Haldorai, Shrinand Anandakumar
This article focusses on a rapidly evolving networking architecture known as Software Defined Networking (SDN) and the possibilities of hazards in the network. This architecture introduces decoupled infrastructure, which establishes customization in the networking system hence making it easy to manage, troubleshoot and configure. This paper focusses on the different aspects of the architecture leaving it an intermediate working in between scholarly application, adding on the elements such as security lapses, security behaviors, general security, programmability and design. In this paper, different points of weakness of the architecture have been evaluates, including the attack vector in every plane. This paper ends with a presentation for futuristic studies on the implications of attacks and potential solutions.
{"title":"An Design of Software Defined Networks and Possibilities of Network Attacks","authors":"A. Haldorai, Shrinand Anandakumar","doi":"10.53759/181x/jcns202202012","DOIUrl":"https://doi.org/10.53759/181x/jcns202202012","url":null,"abstract":"This article focusses on a rapidly evolving networking architecture known as Software Defined Networking (SDN) and the possibilities of hazards in the network. This architecture introduces decoupled infrastructure, which establishes customization in the networking system hence making it easy to manage, troubleshoot and configure. This paper focusses on the different aspects of the architecture leaving it an intermediate working in between scholarly application, adding on the elements such as security lapses, security behaviors, general security, programmability and design. In this paper, different points of weakness of the architecture have been evaluates, including the attack vector in every plane. This paper ends with a presentation for futuristic studies on the implications of attacks and potential solutions.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132502112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-05DOI: 10.53759/181x/jcns202202006
T. Lekhaa, R. Ashok kumar
Face recognition systems are utilised in a variety of situations. In this digital age, every industry is affected. One of the most well-known Face recognition is one of the most widely used biometrics. It can be used for a variety of things. Among other things, security, authentication, and identification are all important. Considering its limited accuracy when compared to retina and thumbprint recognition, and because it is a popular method of identification, it is widely used. Recognition of people's faces for Attendance tracking systems can also be utilised in Educational Institutions, Organizations. Because the Current manual is outdated, It takes a long time to set up and maintain an attendance system. Fundamentally, this approach aims to establish a class attendance system Face recognition technology is used in this system. There's also the option of having a proxy attend. As a result, As a result, demand for this system is increasing. Database development, face detection, face recognition, and attendance updating are the four steps of this system.The photos of the kids in class are used to generate the database.
{"title":"Face Recognition Attendance Management System Based on Data Analytics","authors":"T. Lekhaa, R. Ashok kumar","doi":"10.53759/181x/jcns202202006","DOIUrl":"https://doi.org/10.53759/181x/jcns202202006","url":null,"abstract":"Face recognition systems are utilised in a variety of situations. In this digital age, every industry is affected. One of the most well-known Face recognition is one of the most widely used biometrics. It can be used for a variety of things. Among other things, security, authentication, and identification are all important. Considering its limited accuracy when compared to retina and thumbprint recognition, and because it is a popular method of identification, it is widely used. Recognition of people's faces for Attendance tracking systems can also be utilised in Educational Institutions, Organizations. Because the Current manual is outdated, It takes a long time to set up and maintain an attendance system. Fundamentally, this approach aims to establish a class attendance system Face recognition technology is used in this system. There's also the option of having a proxy attend. As a result, As a result, demand for this system is increasing. Database development, face detection, face recognition, and attendance updating are the four steps of this system.The photos of the kids in class are used to generate the database.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-05DOI: 10.53759/181x/jcns202202007
R. Sivaguru, G. Abdulkalamazad, G. Babu, K. R. Leakashri, R. Sathya Priya, N. Subha
We currently live in a time of data innovation, where everybody, regardless of whether intentionally or coincidentally, is relied upon to turn into an IT master. Since the past couple of many years, innovation has assumed an undeniably significant part in our regular routines, and we are generally progressively dependent on it to accomplish greatest benefit and solace. This new period is furnished with the latest innovative headways, edifying the globe as the Internet of Things. This is an obvious and good area that prompts certifiable situations wherein every gadget might execute a particular action while conversing with different articles. The world will be loaded up with sensors, gadgets, and different articles that will lead into and make human existence far well and loose than it has been 100% of the time previously. This paper gives a significant level rundown of ebb and flow IoT research as far as design, innovation, and applications. Following the writing appraisal of study exertion, it likewise diagrams each of the difficulties related to IoT innovations. The essential objective of this overview is to assemble a far reaching rundown of the latest advances, just as their related developments and specifics, in the field of web of things. It will be advantageous in future review.
{"title":"A Composed Work on Internet of Things And Its Applications","authors":"R. Sivaguru, G. Abdulkalamazad, G. Babu, K. R. Leakashri, R. Sathya Priya, N. Subha","doi":"10.53759/181x/jcns202202007","DOIUrl":"https://doi.org/10.53759/181x/jcns202202007","url":null,"abstract":"We currently live in a time of data innovation, where everybody, regardless of whether intentionally or coincidentally, is relied upon to turn into an IT master. Since the past couple of many years, innovation has assumed an undeniably significant part in our regular routines, and we are generally progressively dependent on it to accomplish greatest benefit and solace. This new period is furnished with the latest innovative headways, edifying the globe as the Internet of Things. This is an obvious and good area that prompts certifiable situations wherein every gadget might execute a particular action while conversing with different articles. The world will be loaded up with sensors, gadgets, and different articles that will lead into and make human existence far well and loose than it has been 100% of the time previously. This paper gives a significant level rundown of ebb and flow IoT research as far as design, innovation, and applications. Following the writing appraisal of study exertion, it likewise diagrams each of the difficulties related to IoT innovations. The essential objective of this overview is to assemble a far reaching rundown of the latest advances, just as their related developments and specifics, in the field of web of things. It will be advantageous in future review.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-05DOI: 10.53759/181x/jcns202202008
Prameetha Pai, Abhinav Bakshi, Ayush Kumar, Brijesh Anand, Devesh Bhartiya, Ramesh Babu D R
The distinguishing proof and location of sicknesses of plants is one of the essential concerns which decide the deficiency of the yield of harvest creation and agribusiness. The examinations of plant sickness are the investigation of any noticeable places in any piece of the plant which assists us with separating between two plants, actually any spots or shading conceals. The manageability of the plant is one of the central issues that are for agrarian turn of events. The ID of plant illnesses is extremely challenging to get right. The recognizable proof of the affliction requires bunches of work and ability, loads of information in the field of plants and the examinations of the acknowledgment of those illnesses. Hence, picture taking care of is used for the location of plant ailments. The Detection of illnesses follows the techniques for picture obtaining, picture extraction, picture division, and picture pre-handling.
{"title":"Plant Disease Detection Using CNN – A Review","authors":"Prameetha Pai, Abhinav Bakshi, Ayush Kumar, Brijesh Anand, Devesh Bhartiya, Ramesh Babu D R","doi":"10.53759/181x/jcns202202008","DOIUrl":"https://doi.org/10.53759/181x/jcns202202008","url":null,"abstract":"The distinguishing proof and location of sicknesses of plants is one of the essential concerns which decide the deficiency of the yield of harvest creation and agribusiness. The examinations of plant sickness are the investigation of any noticeable places in any piece of the plant which assists us with separating between two plants, actually any spots or shading conceals. The manageability of the plant is one of the central issues that are for agrarian turn of events. The ID of plant illnesses is extremely challenging to get right. The recognizable proof of the affliction requires bunches of work and ability, loads of information in the field of plants and the examinations of the acknowledgment of those illnesses. Hence, picture taking care of is used for the location of plant ailments. The Detection of illnesses follows the techniques for picture obtaining, picture extraction, picture division, and picture pre-handling.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-05DOI: 10.53759/181x/jcns202202009
Gregory Wang, D. Steeg
It is indeed possible to bring analysis and information storage closer to where the information is generated by implementing an edge computing model. Response times should improve while bandwidth use is reduced as a result." A common misconception is that "edge" and "IoT" are synonymous. Using edge computing in the Internet of Things (IoT) is an example of this type of distributed computing, which is sensitive to configuration and location." Instead, then alluding to a specific piece of technology, the word refers to an overall architecture. In order to discover novel study opportunities and aid users in selecting more suitable edge computing advancements, this paper provides an analysis of existing open-source computing projects. Also, a comparison of the project’s applicability will be defined.
{"title":"Open Source Network Optimization Tools for Edge Intelligence","authors":"Gregory Wang, D. Steeg","doi":"10.53759/181x/jcns202202009","DOIUrl":"https://doi.org/10.53759/181x/jcns202202009","url":null,"abstract":"It is indeed possible to bring analysis and information storage closer to where the information is generated by implementing an edge computing model. Response times should improve while bandwidth use is reduced as a result.\" A common misconception is that \"edge\" and \"IoT\" are synonymous. Using edge computing in the Internet of Things (IoT) is an example of this type of distributed computing, which is sensitive to configuration and location.\" Instead, then alluding to a specific piece of technology, the word refers to an overall architecture. In order to discover novel study opportunities and aid users in selecting more suitable edge computing advancements, this paper provides an analysis of existing open-source computing projects. Also, a comparison of the project’s applicability will be defined.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116356831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.53759/181x/jcns202202004
M. Scotini, H. Abdullah
With a central focus on the research question: “What must be done to encourage people to become more E+STEM educated?” this research is based on a Systematic review on ecological knowledge, which is linked to teachers' career growth as well as Environmental Science, Technology, Engineering, and Mathematics (E+STEM) pedagogy. The aim is to identify what instructors must do to improve their experience and credentials as E+STEM-educated people in light of expert views. To disclose expert views, a "mixed method" research approach is utilized in this study, which includes both qualitative and quantitative techniques. The technique employed is exploratory study sequencing, which is a kind of mixed-method study. The Delphi study's initial stage is to gather qualitative data on teachers' professional growth. The quantitative methodology is featured for the phase two of the Delphi research once the data has been analyzed in the first step. Lastly, the ultimate quantitative formulation (third phase) is produced following the data evaluation in the second phase.
{"title":"Integration of Environment and Content Knowledge into STEM Education","authors":"M. Scotini, H. Abdullah","doi":"10.53759/181x/jcns202202004","DOIUrl":"https://doi.org/10.53759/181x/jcns202202004","url":null,"abstract":"With a central focus on the research question: “What must be done to encourage people to become more E+STEM educated?” this research is based on a Systematic review on ecological knowledge, which is linked to teachers' career growth as well as Environmental Science, Technology, Engineering, and Mathematics (E+STEM) pedagogy. The aim is to identify what instructors must do to improve their experience and credentials as E+STEM-educated people in light of expert views. To disclose expert views, a \"mixed method\" research approach is utilized in this study, which includes both qualitative and quantitative techniques. The technique employed is exploratory study sequencing, which is a kind of mixed-method study. The Delphi study's initial stage is to gather qualitative data on teachers' professional growth. The quantitative methodology is featured for the phase two of the Delphi research once the data has been analyzed in the first step. Lastly, the ultimate quantitative formulation (third phase) is produced following the data evaluation in the second phase.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129423119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.53759/181x/jcns202202001
Amir Antonie, Andrew Mathus
As a result of the parallel element setting, performance assessment and model construction are constrained. Component functions should be observable without direct connections to programming language, for example. As a result of this, solutions that are constituted interactively at program execution necessitate recyclable performance-monitoring interactions. As a result of these restrictions, a quasi, coarse-grained Performance Evaluation (PE) approach is described in this paper. A performance framework for the application system can be polymerized from these data. To validate the evaluation and model construction techniques included in the validation framework, simplistic elements with well-known optimization models are employed.
{"title":"A Model for Performance Evaluation","authors":"Amir Antonie, Andrew Mathus","doi":"10.53759/181x/jcns202202001","DOIUrl":"https://doi.org/10.53759/181x/jcns202202001","url":null,"abstract":"As a result of the parallel element setting, performance assessment and model construction are constrained. Component functions should be observable without direct connections to programming language, for example. As a result of this, solutions that are constituted interactively at program execution necessitate recyclable performance-monitoring interactions. As a result of these restrictions, a quasi, coarse-grained Performance Evaluation (PE) approach is described in this paper. A performance framework for the application system can be polymerized from these data. To validate the evaluation and model construction techniques included in the validation framework, simplistic elements with well-known optimization models are employed.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131540141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.53759/181x/jcns202202002
M. Biglarbegian
The primary goal of this article in the research area of Advanced Engineering Informatics (AEIs) is to depict and formalize engineering knowledge that is multidimensional. This paper introduces conceptual framework and rationality as implicit methodologies to regularize knowledge. The objective of professionals, as well as the circumstances in which they work, should be considered when depicting and standardizing knowledge. The constructs of epistemology, rationality, and context are used to communicate various alternative data analysis techniques and practices that expert can use to institutionalize intricate engineering expertise and to substantiate whether a specialized conceptual model can support engineers with their challenging operations. A bottom-up method of research in advanced engineering, encompassing engineers, is suggested in this article. A social scientific approach to engendering knowledge for formalization and validating it is also recommended by us for scientists.
{"title":"Formalization and Knowledge Representation in Advanced Engineering Informatics","authors":"M. Biglarbegian","doi":"10.53759/181x/jcns202202002","DOIUrl":"https://doi.org/10.53759/181x/jcns202202002","url":null,"abstract":"The primary goal of this article in the research area of Advanced Engineering Informatics (AEIs) is to depict and formalize engineering knowledge that is multidimensional. This paper introduces conceptual framework and rationality as implicit methodologies to regularize knowledge. The objective of professionals, as well as the circumstances in which they work, should be considered when depicting and standardizing knowledge. The constructs of epistemology, rationality, and context are used to communicate various alternative data analysis techniques and practices that expert can use to institutionalize intricate engineering expertise and to substantiate whether a specialized conceptual model can support engineers with their challenging operations. A bottom-up method of research in advanced engineering, encompassing engineers, is suggested in this article. A social scientific approach to engendering knowledge for formalization and validating it is also recommended by us for scientists.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121206584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.53759/181x/jcns202202003
D. Ashlock
Human knowledge was regarded as a transfer process into an applied knowledge base in the early 1980s as the creation of a Knowledge-Based Systems (KBS). The premise behind this transfer was that the KBS-required information already existed and only needed to be gathered and applied. Most of the time, the necessary information was gleaned through talking to professionals about how they handle particular problems. This knowledge was usually put to use in production rules, which were then carried out by a rule interpreter linked to them. Here, we demonstrate a number of new ideas and approaches that have emerged during the last few years. This paper presents MIKE, PROTÉGÉ-II, and Common KADS as three different modeling frameworks that may be used together or separately.
{"title":"Modeling Frameworks for Knowledge Engineering Approaches","authors":"D. Ashlock","doi":"10.53759/181x/jcns202202003","DOIUrl":"https://doi.org/10.53759/181x/jcns202202003","url":null,"abstract":"Human knowledge was regarded as a transfer process into an applied knowledge base in the early 1980s as the creation of a Knowledge-Based Systems (KBS). The premise behind this transfer was that the KBS-required information already existed and only needed to be gathered and applied. Most of the time, the necessary information was gleaned through talking to professionals about how they handle particular problems. This knowledge was usually put to use in production rules, which were then carried out by a rule interpreter linked to them. Here, we demonstrate a number of new ideas and approaches that have emerged during the last few years. This paper presents MIKE, PROTÉGÉ-II, and Common KADS as three different modeling frameworks that may be used together or separately.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130054287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.53759/181x/jcns202202005
Yu Ming, Lily Yuan
Machine Learning (ML) and Artificial Intelligence (AI) methods are transforming many commercial and academic areas, including feature extraction, autonomous driving, computational linguistics, and voice recognition. These new technologies are now having a significant effect in radiography, forensics, and many other areas where the accessibility of automated systems may improve the precision and repeatability of essential job performance. In this systematic review, we begin by providing a short overview of the different methods that are currently being developed, with a particular emphasis on those utilized in biomedical studies.
{"title":"Supervised Learning Methods and Applications in Medical Research","authors":"Yu Ming, Lily Yuan","doi":"10.53759/181x/jcns202202005","DOIUrl":"https://doi.org/10.53759/181x/jcns202202005","url":null,"abstract":"Machine Learning (ML) and Artificial Intelligence (AI) methods are transforming many commercial and academic areas, including feature extraction, autonomous driving, computational linguistics, and voice recognition. These new technologies are now having a significant effect in radiography, forensics, and many other areas where the accessibility of automated systems may improve the precision and repeatability of essential job performance. In this systematic review, we begin by providing a short overview of the different methods that are currently being developed, with a particular emphasis on those utilized in biomedical studies.","PeriodicalId":170349,"journal":{"name":"Journal of Computing and Natural Science","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}