i-manager's Journal on Computer Science (JCOM)


Volume 8 Issue 3 September - November 2020

Research Paper

Comparative Analysis of Various Machine Learning Algorithms for Biological Age Prediction

Chandu Vaidya * , Sajan Rangari **, Tanmay Walke ***, Tanmay Phadnis ****, Yash Deshmukh *****, Yash Kunte ******
*-****** Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India.
Vaidya, C., Rangari, S., Walke, T., Phadnis, T., Deshmukh, Y., and Kunte, Y. (2020). Comparative Analysis of Various Machine Learning Algorithms for Biological Age Prediction. i-manager's Journal on Computer Science, 8(3), 1-11. https://doi.org/10.26634/jcom.8.3.18048

Abstract

While ageing has a major impact on human health and the economy, little is known about its molecular basis: control and mechanism. More than 300 genes have been linked to human ageing to date (almost all of them function as protein-coding genes). Individual genes or small subsets of these genes linked to ageing have been extensively studied, but overall study of these genes has been restricted. To fill this gap, we looked at different applications of modern artificial intelligence (AI) algorithms in the field of ageing science. Biological Age (BA), also known as the hypothetical underlying age of an organism, has been calculated using a number of machine learning algorithms. Different circulating and non-circulating biomarkers can be used to calculate BA. Based on our study, we expect modern machine learning (ML) models to contribute to the reputation and prominence of healthcare and pharmaceutical longevity biotechnology, as well as the convergence of numerous fields of research. In this paper, we used a variety of machine learning algorithms on the skin fibroblasts cells dataset because it is ideal for age prediction studies for several reasons. These skin fibroblasts contain age-related disruption, contain age-dependent phenotypic, epigenomic, and transcriptomic changes, and it is easy to collect using non-invasive techniques. By using various machine learning models like elastic net, random forest regressor, support vector regressor and artificial neural network for calculating the accuracy of these models on the dataset, we obtain an accuracy of 72 percent with elastic net.

Research Paper

Verification for Online Signature Biometrics Using Deep Learning

Samatha Juluri* , Voladri Prashanth Reddy **, Dhanunjay Sagar ***, Gattu Sai Koundinya ****
*-**** Department of Computer Science and Engineering, Matrusri Engineering College, Hyderabad, Telangana, India.
Juluri, S., Reddy, V. P., Sagar, D., and Koundinya, G. S. (2020). Verification for Online Signature Biometrics Using Deep Learning. i-manager's Journal on Computer Science, 8(3), 12-18. https://doi.org/10.26634/jcom.8.3.18074

Abstract

Nowadays, human identification is required for daily routine activities such as entering secured locations in addition to many other applications. To achieve biometric verification, higher security levels with easier user interaction is needed. Biometric verification help identifying people based on their extracted physical or behavioural features. These features should have certain properties such as uniqueness, permanence, acceptability, collectability, and affordable cost to employ any biometric system. Handwritten signatures are treated as the most natural method of verifying a person's identity as compared to other biometric and cryptographic forms of verification. The learning process inherent in Neural Networks (NN) can be applied to the process of verifying handwritten signatures. This paper presents a method for verifying handwritten signatures by using a Neural Network architecture. Various static (e.g., height, slant, etc.) and dynamic (e.g., velocity, pen tip pressure, etc.) signature features are extracted and used to train the NN. The normal Handwritten Signature Verification (HSV) uses image processing technique to verify the signatures. This takes much processing and time to differentiate the genuine and forged signatures. Keeping this in mind, we refurbished the existing system and made necessary improvements to modernize the processes. Such as through Deep Learning techniques, we can deal with signature verification more accurately as it has many algorithms to check the accuracy of the results.

Research Paper

Design and Implementation of Monolithic Architecture based Hybrid Application for End-to-End Automated Management of Various College Events

Raghul Karthik N.* , Rathina Karthi T. **, Kumaresan G. ***, Vishal Aakash A. ****
*-**** Department of Computer Science and Engineering, SRM Valliammai Engineering College, Kancheepuram, Tamilnadu, India.
Karthik, N. R., Karthi, T. R., Kumaresan, G., and Aakash, A. V. (2020). Design and Implementation of Monolithic Architecture based Hybrid Application for End-to-End Automated Management of Various College Events. i-manager's Journal on Computer Science, 8(3), 19-24. https://doi.org/10.26634/jcom.8.3.18119

Abstract

In recent times, various academic or non-academic events are conducted virtually by most of the colleges/institutions/ organizations/schools, to disseminate new concepts and ideas where the participating individuals can gain knowledge in respective disciplines. A software which does the functions done by an event manager is said to be an online event management system. The idea behind this proposed work is to make the participants, student coordinator, event organizing staff/faculty coordinators and head of the department to access the event, effortlessly. The aim of the project is to automate all event activities right from event registration to certificate distribution. Manual exertion will be automated and no workload will exist among the organizers and participants, so that the college management could plan the events online and student volunteers could be assigned tasks transparently. Students will be able to register for multiple events from various colleges and book themselves for the event through this application. Furthermore, students will be able to track their past events and to attend quiz competitions from their app itself. The authenticity of students for their registration and payment status can be verified through QR Scanner and also the students can attend the event using the QR Code. Real time communication between the students and the event organizers can be achieved through this proposed work.

Review Paper

Evolution of OS Architectures: A Survey on Parallel Computing based OS Kernels

Rohma Najam * , Ebrahim Deen **
*-** Bahria University, Karachi, Pakistan.
Najam, R., and Deen, E. (2020). Evolution of OS Architectures: A Survey on Parallel Computing based OS Kernels. i-manager's Journal on Computer Science, 8(3), 25-43. https://doi.org/10.26634/jcom.8.3.18252

Abstract

Parallel and multiprocessor computing has always been considered as the pioneer machines for speed, performance and optimization. Of course, to run such hardcore machines, sophisticated software, known as Operating Systems (OS) are required. In this paper some well known operating system which are specifically developed and used for parallel and multiprocessor computing have been reviewed. Specific functionalities of the OS kernels such as interprocess communication, architectures and memory management have been discussed in this survey paper.

Review Paper

A Survey of Security Threats in Distributed Operating System

Sumra Khan * , Syed Muhammad Waqas **, Arbaz Ahmed***
*-*** Department of Computer Science, Bahria University, Karachi, Pakistan.
Khan, S., Waqas, S. M., and Ahmed, A. (2020). A Survey of Security Threats in Distributed Operating System. i-manager's Journal on Computer Science, 8(3), 44-60. https://doi.org/10.26634/jcom.8.3.18262

Abstract

Recently, security in software is becoming complex, especially in distributed computing. A secured and trusted environment is critically important for distributed computing. Different services and resources in the distributed system have to be secure at different levels; therefore, in this paper, we have analyzed in detail the flaws of the distributed systems, common security threats, common scenarios at which the system faces risk, and the best possible solutions to secure the distributed system. Globus security mechanism is discussed in detail as how the authentication can be done and how message confidentiality and integrity can be achieved. Every idea that radiates all sorts of solutions to this matter is verified and analyzed. This paper provides necessary knowledge to help one understand the meaning of a secure system, the security policies, and the security mechanism.