i-manager's Journal on Computer Science (JCOM)


Volume 5 Issue 2 June - August 2017

Article

A Classification of DDoS Attacks and its Approach for Attack Prevention

M. Chaitanya Kishore Reddi* , Sunil Kumawath**, T. Gowtham Sai Krishna***, T.M. Sneha****
* Assistant Professor, Department of Computer Science and Engineering, St. Peter’s Engineering College, Hyderabad, India.
**-**** Scholar, Department of Computer Science and Engineering, St. Peter’s Engineering College, Hyderabad, India.
Reddy, M.C.K., Kumawath, S., Krishna, T.G.S., and Sneha, T.M. (2017). A Classification of DDoS Attacks and its Approach for Attack Prevention. i-manager’s Journal on Computer Science, 5(2), 1-7. https://doi.org/10.26634/jcom.5.2.13903

Abstract

Currently, distributed denial of service attack (DDoS) is a very serious threat in the internet. Large number of packets are send to a victim to jam the traffic so that the attacker can use the data of the victim. Various attack methods, its mechanisms, flooding attacks etc (Mirkovic and Reiher, 2005) are briefed in this paper. The scopes of DDOS attacks, measures and solutions to the attacks are hereby explored with effectiveness in various attack scenarios. A Distributed Denial-of-Service (DDoS) attack is an attack where the perpetrator uses more than one unique IP address, often thousands of them. Attacks may involve forging sender's Internet Protocol (IP) addresses (IP address spoofing) as an alternative or augmentation of DDoS, making it difficult to identify and defeat the attack. For specific targeted purposes, including disrupting transactions and accessing databases, an application layer DDoS attack is done, which requires less resource and often accompanies network layer attacks.

Research Paper

Smart Helmet and Fingerprint Based Ignition System for Vehicles

Jyoti Prasad* , Jyoti Samota**, Suruchi Rajput***, Tripti Banjare****, Ankit Singh*****, Dharmendra Singh******
*-**** B.E. Scholar, Department of Electronics and Telecommunication, SSIPMT, Raipur, India.
*****-****** Assistant Professor, Department of Electronics and Telecommunication, SSIPMT, Raipur, India.
Prasad, J., Samota, J., Rajput, S., Banjare, T., Singh, A., Singh, D. (2017). Smart Helmet and Fingerprint Based Ignition System for Vehicles. i-manager’s Journal on Computer Science, 5(2), 8-11. https://doi.org/10.26634/jcom.5.2.13904

Abstract

In this era, Human identification and authentication play a very important role in human life, since the fingerprint is unique for all human beings. It helps the person to identify or secure the system. In this paper, a method is proposed by which a vehicle can be ignited using a helmet or fingerprint of the user. Nowadays, as the injuries and the death rate due to accidents are increasing, an automated helmet based system is designed through which the driver will not be able to start the motorcycle engine without a helmet. Also, to overcome the theft activity fingerprint module is used to start the vehicle.

Research Paper

Touch Screen Based Food Ordering System for Restaurants

Charu Verma* , Priya Yadav**, Pooja Samrit***, Supreeti Karashi****, Dharmendra Singh*****
*-**** B.E. Scholar, Department of Electronics and Telecommunication, SSIPMT, Raipur, India.
***** Assistant Professor, Department of Electronics and Telecommunication, SSIPMT, Raipur, India.
Verma, C., Yadav, P., Samrit, P., Karashi, S., and Singh, D. (2017). Touch Screen Based Food Ordering System for Restaurants. i-manager’s Journal on Computer Science, 5(2), 12-16. https://doi.org/10.26634/jcom.5.2.13905

Abstract

Automation has become a very important part of human life. Internet of things (IoT) has brought a drastic change in the daily life of human beings. Earlier the food industry was lagging behind all other industries. Nowadays, the adoption of wireless technologies and emergence of mobile devices has led to automation in the food industry. The food industry also increases business opportunity; the automated food ordering system for any restaurant will attract people. In this paper, the manual menu system is replaced by an automated touch screen based menu system. In this system, the input module is the touch screen sensor which is placed on Graphical Liquid Crystal Display (GLCD) which is used to get the input from the user, the second module, is the microcontroller which accepts the order from the input module, and the output module is the ZigBee module which is used to communicate between the user table and the receiver end.

Research Paper

Vehicle Tracking and Anti-Theft System

G. Ravi Kumar* , Ch. Srinivasa Reddy**, Prasanthi Kalavala Gowthami***, G. Sunita****
* -*** Assistant Professor, Vignan's Institute of Information Technology, Andhra Pradesh, India.
**** UG Scholar, Vignan's Institute of Information Technology, Andhra Pradesh, India.
Kumar, G.R., Srinivasareddy, Ch., Prasanthi, K.G., and Sunita, G. (2017). Vehicle Tracking and Anti-Theft System. i-manager’s Journal on Computer Science, 5(2), 17-22. https://doi.org/10.26634/jcom.5.2.13906

Abstract

A major problem today for vehicle owners is that they are in constant fear of having their vehicles stolen from a common parking lot or from outside their home. Currently, most of the people are having their own vehicles. Stolen in parking lots and sometimes while driving in insecure places. The safety of vehicles is extremely essential for public. The main theme of this paper is Vehicle tracking which basically concentrates on tracking the vehicle location at the time of vehicle theft. In order to prevent vehicle theft an ignition controlling technique has been used. When the owner removes the key from the ignition lock, the system turns ON. When a person tries to steal the vehicle, an alert will be sent to the owner (authorized person) in the form of message by GSM (Global System for Mobile Communications) and GPS (Global Positioning System) technologies. When vibrations are detected, SMS is send to owner of the vehicle, so that the owner in return can send a ‘stop’ message.

Research Paper

A Comparative Analysis of Fuzzy Based Load Balancing Algorithms

Neeraj Kumar Rathore* , Pramod Kumar Singh**
*-** Assistant Professor, Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, India.
Rathore, N., and Singh, P.K. (2017). A Comparative Analysis of Fuzzy Based Load Balancing Algorithms. i-manager’s Journal on Computer Science, 5(2), 23-33. https://doi.org/10.26634/jcom.5.2.13907

Abstract

A distributed system is a network of physically separated computing resources that are connected by some means of communication medium. It is a communication intensive system, where each system sends and receives some messages to keep itself updated with the current system status. It provides various advantages such as good resource sharing, reliability, extensibility and good performance. In distributed system, there is a chance that some processors of the system are overloaded; at the same time some processors are idle or underloaded, and hence the performance of the system is degraded. The Load Balancing Algorithm aims (LBA) to have all processing elements to equal workloads over the long term. The performance of a distributed system heavily depends on the performance of Load Balancing Algorithm employed to it. Load Balancing Algorithms work on different matrices such as rate of resource utilization, communication overhead, reliability, scalability, stability, and fault tolerance. LBA helps in optimal utilization of resources in distributed system.

Survey Paper

Comparison of Programming Languages for Human Gender Classification

G.D.K.Kishore* , Babu Reddy Mukkamalla**
* Research Scholar, Department of Computer Science, Krishna University, Andhra Pradesh, India.
** Assistant Professor and Head, Department of Computer Science, Krishna University, Andhra Pradesh, India.
Kishore, G. D. K., and Reddy, M.B. (2017). Comparison of Programming Languages for Human Gender Classification. i-manager’s Journal on Computer Science, 5(2), 34-39. https://doi.org/10.26634/jcom.5.2.13908

Abstract

Nowadays, the investigation of Human gender classification (Yong et al., 2012; Mahmood et al., 2012) is capable and powerful, of predicting human gender by utilizing statistical tools and methods. There are a few numerical computational tools that fill in as instructive tools and are likewise accessible for business use to contrast different tools. In this paper, statistical tools like Python, R and MATLAB along with their advantages, working environment, features and challenges are discussed. Here, a review on the most important software tools for image classification applications is presented. Additionally, which software tool is best for beginning learners to learn image learn classification with accurate results and for analysing output results perfectly are also discussed.