International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

March 2019

  Submission         March 10

  Acceptance         March 20

  Publication          March 31

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 

The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

February  2019

     Submission            February 10

      Notification             February 20

      Publication             February 28

Bookmark and Share

Open Access Database

IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.


 IJASCSE volume 5 issue 5 (Theme: Communications, Computers and Information Technology)                            

Analysis and Design of an Efficient Search Technique Using Visual Classification

Nikhila T Bhuvan, Sudheep Elayidom

AbstractSearch engines and their ranking algorithms play a vital role in Information Retrieval from World Wide Web. Each search engine has got their own ranking algorithms with which they rank the pages and display it to the users. But the user’s
expectations are outpacing the experiences with Search engines. Traditional Web search engines mainly exploit the text and the in-link or out-link in the web pages to do the ranking of the web pages. They do not consider the multimedia in the HTML pages to find relevancy of the web pages against a given user query. The idea
behind the new approach is, if a webpage is judged to be relevant to a query considering multiple factors other than text, there would be a better chance of a page to be really relevant. 

Evaluating the various CPU scheduling algorithms on the basis of Simulation made in C++

Vaibhav Kant Singh

Abstract One goal of Operating System is to use the Computer Hardware/Resource in an efficient manner. Since CPU is a resource it should be utilized efficiently. To achieve high degree of CPU utilization Scheduling algorithms are implemented by operating system. In this paper we will see comparison between the various CPU scheduling algorithms on the basis of the simulation made in C++. The performance was tested on same workload. The paper also gives a brief introduction of the basic evaluation techniques used for the CPU scheduling algorithms. Simulation is made of First Come First Serve (FCFS), Shortest Job First (SJF), Priority Scheduling and Round Robin (RR) Scheduling in C++ 

Integration of Deffie Hellman Key Exchange Encryption and Advanced Encryption Standard Algorithm for Securing SMS based One-time Password from Man in the Middle (MITM) Attacks

Aboho D Moses, Karim Usman, Awuhe T Richard, Ikerave A Fredrick

Abstract - This paper aims at improving the security feature of One Time Password (OTP). Since all transactions are conducted in an open network, there is a high risk of confidential data attack by Man in the Middle or unauthorized users. Online service providers such as banks have developed a new security framework called One Time Password (OTP) to prevent sensitive information attack by MITM and other unauthorized users. OTP provides additional online protection for users. However, this approach can be hacked by MITM if the OTP is not properly protected. In this paper, a new security model is proposed to enhance the existing OTP approach using Deffie Hellman Key Exchange (DHKE) encryption and Advanced Encryption Standard (AES) algorithm. The proposed security model ensures that the OPT is encrypted using DHKE and AES before it is sent to the user's registered mobile number.

Investigation of Thinning Techniques for Arabic Document Binary Images Acquired via Handheld Cameras

Musab Kasim Alqudah, Mohammad F. Nasrudin, Arwa Mahmoud Alkhatatneh

Abstract - Notably, all subsequent stages of document images analysis and recognition (DIAR) are influenced by the result of pre-processing stage in which the thinning technique of document pre-processing stage is employed to extract the text topology using in the feature extraction and recognition stages. This technique is a critical step to recognize the scripts, font, characters and symbols marks in various document applications. The objectives of this survey to explore the best thinning method based on Arabic document images, and investigate the effect of thinning technique on Arabic diacritics marks. The experiments are conducted on 20 Arabic document images based on Zhang-Susen, Huang, K3M and Abu-Ain thinning techniques. The results revealed that Abu-Ain technique outperforms the other techniques in terms of extracting the minimal pixels values.

Keywords – web page re-ranking, one click user feedback, visual classifier

Keywords—CPU scheduling, First Come First Serve(FCFS), Shortest Job First(SJF), Priority, Round Robin(RR),

KeywordsOTP, MITM, DHKE, Transactions, Encryption

Keywords - Thinning; Binarization; Phone camera; Arabic font

To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo