International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

January 2019

  Submission         January 10

  Acceptance         January 20

  Publication          January 30

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 


The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

December  2018

     Submission            December 10

      Notification            December 20

      Publication            December 31

Bookmark and Share

Open Access Database


IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.

 

 IJASCSE volume 6 issue 08                           

 

A Study on 3D Interaction System using Arduino Glove Design and Glasses-Free 3D Display Technology

Juin-Ling Tseng

Abstract- With the rapid development of 3D virtual reality and game design techniques, significant efforts are being devoted to the study of somatosensory interactions and wearable devices. In this study, we have combined 3D stereo images with a wearable hand device for facilitating the display of 3D virtual scenes in a realistic manner and allowing users to interact with virtual scenes in an immersive setting to maximize the realism of virtual environments. For this purpose, the Unity 3D game development platform was used, and our system was developed through the integration of an Arduino-based system with a glasses-free 3D platform.  

 

DESIGN OF EMOTION DETECTOR FOR STUDENTS BASED ON QUESTIONNAIRE TEXT USING VECTOR SPACE MODEL METHOD 
Sitorus, Ranap; Dachlan, Harry. S; Wijono

AbstractText based communication does not merely contain informative substances, but also the information of attitude and emotional state of its writter. This research has a purpose to categorize Indonesian text into several classes of emotional expression. The data was acquired from three categories of basic emotion as training and test references. Such references were gathered from about 264 student questionnaires. Case folding, tokenizing, and filtering are the preprocessing step performed. The word weighting method used is Term Frequency-Inverse Document Frequency (Tf-IDF). The result of Tf-IDF became the variable to calculate the cosine similarity using Vector Space Model (VSM) in order to determine the keywords.

Development of Knowledge Based System for Wheat Disease Diagnosis: A Rule Based Approach 

Desalegn Aweke Wako, Tesfaye Fufa Gedefa

Abstract—Wheat production in Ethiopia is widely affected by diseases and attacked by a number of insect pests. Wheat disease diagnosis needs sufficient and knowledgeable agricultural experts to identify the diseases and describe the methods of treatment and protection at early stage of infestation. But, agricultural specialist assistance may not always available and accessible to every farmer when the need arises for their help. Hence, this study presents a rule based knowledge based system for wheat disease diagnosis in order to identify wheat disease timely and apply the control measures effectively.


Enhancing Trust Results Accuracy using R&R Trust Management Techniques in Cloud Computing

N. Gowthami, C. Shoba Bindu, P. Dileep Kumar Reddy

Abstract— In Cloud Computing, data is stored at   remote servers and handled by service providers. This leads to several privacy attacks and trust issues. Through, Service-Level Agreements we can  establish trust between cloud consumers and providers, but the agreements between the consumers and providers are not sufficient to establish the trust because the rules are not clear enough. So, trusting the cloud service providers is the main issue in the era of cloud computing. So, inorder to know the trustworthiness of cloud this paper combines two techniques called Reputation and Recommendation techniques.


Handwriting Recognition for under 5 year-old Children using Artificial Neural Network

Wulansari, Zunita; Muslim, M. Aziz; Setyowati, Onny

Abstract— The linguistic ability components consist of speaking, observing, reading, and writing. For 4 to 5 year-old children, it is easier to learn the ability of reading and writing using multimedia, e.g. pictures, stories, songs, and voices, rather than using textbooks. They need good teachers in learning process. The early capability to write is a main requirement for children to understand subjects given in elementary school. One choice to help improve children’s interest and capability in reading and writing could be by utilizing software as the learning media. 

 

Security Analysis of Constrained Application Protocol (CoAP): IoT Protocol

Dr. Digvijaysinh Rathod, Sunit Patil

Abstract—Security and privacy are the top priority for Internet of Things (IoT) followed by performance, reliability and management.  Majorly used application protocols in IoT are MQTT, CoAP, XMPP, DDS and AMQP. Protocol such as 6LoWPAN and CoAP provides feature through which smart objects can integrate into the IP-driven Internet of Things.  The CoAP is a specialized web transfer protocol offering simplicity, low overhead, Machine-to-Machine communications (M2M) and Machine-to-Customer (M2C). The CoAP protocol uses interactive model between application endpoints which is nothing but a request and response model.


Virtual Interface Framework For Cloud Based Education System 

Dharmveer Yadav, Bright Keswani

AbstractCloud computing is the velocious developing technology in the IT field. It is the internet based computing which is useful in providing shared resources according to users demand. Cloud computing provides easy access to the educational sector and provides them high performance computing and storage infrastructure through web services. Cloud computing provides services on virtual machines whereby any user can store and upload the data and also share resources, infrastructure, software and other services as their requirement. In this paper we study that the cloud storage is used to store and upload the data for faculty members as study material like subject notes, Assignments, lab manuals and other stuff. 

Keywords-Arduino, wearable devices, glasses-free 3D display techniques, hand gestures, Unity 3D

Keywords-Emotion detection, tokenization, Tf-idf, VSM

KeywordsAI; agriculture; KBS; rule based reasoning; wheat disease 

KeywordsRecommendation; Reputation; Trust management; Cloud Computing; Trust feedbacks

Keywords- handwriting, pattern recognition, children under five, artificial neural network, back propagation

Keywords- IoT, CoAP, IETF, CoAP proxy, Vulnerability, HTTP 

Keywords- Cloud Computing, Cloud services,Cloud Storage, Virtual Machine, Virtual Campus

3d-display-technology.pdf
To download Click on PDF logo
emotion-detection.pdf
To download Click on PDF logo
wheat-disease-diagnosis.pdf
To download Click on PDF logo
rr-trust-management.pdf
To download Click on PDF logo
back-propagation.pdf
To download Click on PDF logo
coap-secuirty.pdf
To download Click on PDF logo
virtual-interface-framework.pdf
To download Click on PDF logo