International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 5 issue 4                            

 

Design and Simulation of Extended PC/104 For Housekeeping Data Sensors Based On Arduino Mega 2560

Ahmad Fauzi, Muhammad Taufik

AbstractPC/104 Standard is widely used in satellite spacecraft because of its rugged and robust. On Board Data Handling (OBDH) in our design uses PC/104 standard. To
fulfill the OBDH requirement in gathering the housekeeping data, extended PC/104 is needed to be designed. To design the extended PC/104, Proteus software was used initially to simulate the electronic circuit application. Inthe Proteus Design, electronic circuit and components was created. The temperature sensor and voltage sensor was included to produce a precision data. To know the data value, Liquid Crystal Display (LCD) component was used to display the data value. It showed that the temperature, current and voltage sensors can be displayed for read the data sensors. The final result in this research is extended PC/104 has been designed and ready to be implemented in to the real device.

 

Developing an E-Chain of Custody and Inventory System for the Zambia Police Force

Peter Nosfwa, Jackson Phiri

Abstract Crime solving comprises methodical law enforcement, an exhaustive investigation and collection of facts, and extensive evidence testing performed by criminalists and forensic experts. The process starts from the crime scene. Evidence items collected from the crime scene must be handled in a manner which adheres to the rules of evidence, if it has to be used as evidence in Court. Zambia Police currently has gaps in the evidence chain of custody and tracking. This study proposed the automation of processes and procedures associated with management of crime scene evidence from the time it is collected from the scene to the time it is presented in Court. The baseline study findings were used to design
an E-Chain of Custody and Inventory System (ECCIS)

 


Implementation of SEZRP in MANET using Secure Code Technique

Karishma Kottarwar, Nilima Jichkar

Abstract - Mobile ad-hoc network (MANET) become popular because it gives access anywhere anytime. These networks are self organizing, infrastructure-less, decentralized, dynamic topology. Routing plays an important role for construction of ad hoc networks. Security is one of the main issues in MANET. In the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. Therefore a
system is required for securely routing the packets. This system will include Secure Enhanced Zone Routing Protocol (SEZRP). It requires key is generated and provided as input to the secure hash algorithm (SHA-2) to calculate the secure hash code. This
secure hash code is distributed among each node in ad-hoc network before it starts transmission of information. The secure routing protocol routes packets from source to destination by providing authentication, non-repudiation, integrity to the system. Result states the performance analysis of SEZRP against the non-secure version of ZRP in the presence of malicious nodes.



Multiple K Means++ Clustering of Satellite Image Using Hadoop Map Reduce and Spark

Tapan Sharma, Vinod Shokeen, Sunil Mathur

AbstractClustering of image is one of the important steps of mining satellite images. In our experiment we have simultaneously run multiple K-means algorithms with different initial centroids and values of k in the same iteration of MapReduce jobs. For initialization of initial centroids we have implemented Scalable K-Means++
MapReduce (MR) job [1]. We have also run a validation algorithm of Simplified Silhouette Index [2] for multiple clustering outputs, again in the same iteration of MR jobs. This paper explored the behavior of above mentioned clustering algorithms when run on big data platforms like MapReduce and Spark jobs. Spark has been chosen as it is popular for fast processing particularly where iterations are involved.

Keywords – OBDH, PC/104, microcontroller,  satellite,  sensor.


Keywords— evidence, investigators, court, crime scene, chain of
custody

Keywords—Zone Routing Protocol, MANET, Secure Enhanced Zone Routing Protocol

Keywords - Satellite images, Clustering, Scalable Kmeans++, Distributed Processing, Hadoop, MapReduce, Spark

on_board_data_handlingobdh
To download Click on PDF logo
e_chain_of_custody
To download Click on PDF logo
zone_routing_protocol
To download Click on PDF logo
satellite_image_multiple_scalable.pdf
To download Click on PDF logo