i-manager's Journal on Computer Science (JCOM)


Volume 7 Issue 4 December - February 2020

Research Paper

Efficient Database Design and Implementation of Students Academic Results Processing System (SARPS)

Taiwo Olusegun Ojeyinka* , Matthew Olusegun Afolabi **
* Department of Computer Science, Adekunle Ajasin University, Akungba-Akoko, Ondo, Nigeria.
** Department of Physics & Electronics, Adekunle Ajasin University, Akungba-Akoko, Ondo, Nigeria.
Ojeyinka, T. O., & Afolabi, M. O. (2020). Efficient Database Design and Implementation of Students Academic Results Processing System (SARPS). i-manager's Journal on Computer Science, 7(4), 1-23. https://doi.org/10.26634/jcom.7.4.16849

Abstract

A huge amount of time is spent on manual vetting of processed results to resolve errors in the output generated from the computerization of students academic results for higher institutions in Nigeria. This is not only for salient errors that can be discovered during the verification of results, but also for inconspicuous errors that pass through computed results unnoticed. Such errors can be attributed to errors associated with technical designs of the database and non- compliance of results processing with the institution's rules and study requirements, especially when such rules and requirements are violated. Currently, such errors, in most cases, are often resolved by manual vetting after processing. Some technical issues need to be resolved for reliable computerization of student results. This study provides design solutions that guarantee the correctness and responsiveness of result outputs without manual intervention in computerizing the academic results of the students. The results show that such design approaches save the time spent on manual vetting of computerized results and ensure the reliability of the processing system. Some technical issues are identified and corrected in the development of the system, in addition to the computations of the semester and cumulative GPAs.

Research Paper

Raid Storage Technology: A Survey

Ali Farman* , Muhammad Hasnain**
*-** Department of Computer Science, Bahria University, Karachi, Pakistan.
Farman, A., & Hasnain, M. (2020). Raid Storage Technology: A Survey. i-manager's Journal on Computer Science, 7(4), 24-33. https://doi.org/10.26634/jcom.7.4.17269

Abstract

In order to improve the performance of I/O and reliability, 1980's disk arrays were introduced, in which we have used multiple disks in parallel. Today, it is used by most of the companies as a product. In this paper, we provide the complete overview of disk arrays and propose a framework for which we can organize current and future work of RAID (Redundant Arrays of Inexpensive Disks). There are two architectural techniques used in disk array, to improve the performance striping across multiple disks, and redundancy is used to improve reliability. This paper describes seven disk array architecture called RAID with levels 0-6 and also equates the cost, performance and their reliability. At last we discuss the advanced topic, such as how to improve performance by purifying the RAID levels and maintain the consistency by designing algorithm.

Research Paper

Anfis Based Model for Predicting a Credible Candidate in Elections

Omomule Taiwo Gabriel*
Department of Computer Science, Adekunle Ajasin University, Akungba-Akoko, Ondo, Nigeria.
Gabriel, O. T. (2020). Anfis Based Model for Predicting a Credible Candidate in Elections. i-manager's Journal on Computer Science, 7(4), 34-45. https://doi.org/10.26634/jcom.7.4.17072

Abstract

The effect of poor governance in developing countries can lead to problems as to who is best to vote in elections. This is further affirmed by various political, social, economic and religious segregation, cultural bias and corruption. In quest for good governance and elections within the government without bias, there is a need to consider candidate's credibility. Therefore, this paper proposes a model for predicting credible candidates contesting in an electoral process. Moreover, the rationale of the paper is to assess candidate's credibility and the potential to win elections. Data are extracted from the opinion of elite Nigerians on Twitter and it was used to train the proposed model and to determine a reliable output from the opinions of personal credibility criteria of political leaders in Nigeria. In the proposed system, six (6) political candidates are sampled and the most credible candidate is selected. The data collected are subjected to Adaptive Neuro-Fuzzy Inference System (ANFIS) technique for training and the Gaussian Membership Function (GMF) technique is adopted to calculate the membership grade for each input parameter implemented on MATLAB R2018a. The results obtained are the Average Testing Error (AVE) of 0.17 and the prediction accuracy of 92.85%, respectively. Comparative analysis of the current results shows the prediction of the electoral systems with significant contributions.

Research Paper

Customer Churn prediction for FinTech Companies using Artificial Neural Networks

Pooja Malhotra* , Punit Patel**, Neel Shah***, Raj Veera****, Raj Sanghavi*****
*-** Department of Information Technology, K. J. Somaiya College of Engineering, Mumbai, India.
*** Ernst & Young Global Limited, Mumbai, Maharashtra, India.
**** Larsen & Toubro Infotech Limited, Mumbai, Maharashtra, India.
***** AllinCall Research and Solutions, Mumbai, Maharashtra, India.
Malhotra, P., Patel, P., Shah, N., Veera, R., & Sanghavi, R. (2020). Customer Churn Prediction for Fintech Companies using Artificial Neural Networks. i-manager's Journal on Computer Science, 7(4), 46-54. https://doi.org/10.26634/jcom.7.4.17373

Abstract

Over the years it has been observed that, market expansion in any sector has led to a huge customer base for service providers. This huge base comes with a variety of expectations. When these expectations are not met, it leads to dissatisfaction which ultimately leads to churn. Thus, in competitive markets, Customer Churn is a big problem for any company, causing huge loss of revenue. Our work contributes to developing a model that can predict potential customer for churn. We have used machine learning algorithm like SVM, Random Forest, Linear Regression to predict churn. We have compared different algorithms and speculated to use a method that could provide better accuracy. However, these algorithms do not provide the expected accuracy, so Artificial Neural Networks are applied in the dataset, which provides us with excellent accuracy.

Review Paper

Comparison Performance of Machine Learning Techniques for Intrusion Detection System: A Review

Ch. Sekhar* , K. Venkata Rao**, M. H. M. Krishna Prasad***
*,*** Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Kakinada, Andhra Pradesh, India.
** Department of Computer Science and Engineering, Vignan's Institute of Information Technology, Kakinada, Andhra Pradesh, India.
Sekhar, Ch., Rao, K. V., & Prasad, M. H. M. K. (2020). Comparison Performance of Machine Learning Techniques for Intrusion Detection System: A Review. i-manager's Journal on Computer Science, 7(4), 55-61. https://doi.org/10.26634/jcom.7.4.17108

Abstract

With the advancement of networking applications, the need for security to resolve malicious activity in the network has increased. Network intrusion detection has evolved as a significant security system in networks, enabling it to detect unauthorized access to any network traffic. Through network intrusion systems, a warning message was attained to take necessary action to avoid malicious attacks. However, there is still the need for improvement in network intrusion system since the advancement in technology has created complexity over the detection system, making the current detection system is not effective. Intrusion Detection System (IDS) usually operates based on a trained network traffic pattern. It is defined in such a way that if there exist any variant on the traffic pattern, intrusion will be detected. We need a solution to avoid network attacks, which can be achieved with IDS. Machine Learning (ML) algorithms play a key role in all sectors and domains. In this paper, we investigated the various supervised machine learning algorithms such as Naive Bayes, Random Forest, SVM and XGBoost, and the performance of each algorithm concerning accuracy. This study helps in finding a suitable algorithm to identify the attacks with more accuracy. We used the standard intrusion dataset, i.e. NSLKDD from Canadian Institute for Cyber Security.