i-manager's Journal on Software Engineering (JSE)


Volume 16 Issue 4 April - June 2022

Research Paper

Covid-19 Analysis using Chest X-Rays and CT-Scan

Anshita Sinha* , Sonali Singh**, Mohammad Sohail Shekh***, Vinita Kumari Pal****
*-**** Shri Shankaracharya Technical Campus, Junwani, Bhilai, Chhattisgarh, India.
Sinha, A., Singh, S., Shekh, M. S., and Pal, V. K. (2022). Covid-19 Analysis using Chest X-Rays and CT-Scan. i-manager’s Journal on Software Engineering, 16(4), 1-8. https://doi.org/10.26634/jse.16.4.18756

Abstract

COVID-19 is commonly known as a novel coronavirus disease, which is a highly contagious disease that emerged in China in late 2019. This disease is caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It is a virus belonging to the large family of coronaviruses. The disease first emerged in Wuhan, China in 2019 and then quickly developed into a global pandemic, spreading to more than 213 countries. The well-known symptoms of COVID-19 are fever, shortness of breath, dry cough, and other symptoms. Pain or difficulty breathing may occur. Most of these symptoms point to signs of respiratory infections and lung abnormalities that can be detected by radiologists. So, chest xray and computed tomography images can be used with machine learning algorithms to find the disease.

Research Paper

Secure Multimedia Data Transfer using Crypto and Stegano Algorithms

B. Sailaja* , K. Meghana**, S. Harika Damayanthi***, S. Sandhya****, V. Satya Sushma*****
*-***** Department of Computer Science and Engineering, Vignan's Institute of Engineering for Women, Visakhapatnam, India.
Sailaja, B., Meghana, K., Damayanthi, S. H., Sandhya, S., and Sushma, V. S. (2022). Secure Multimedia Data Transfer using Crypto and Stegano Algorithms. i-manager’s Journal on Software Engineering, 16(4), 9-16. https://doi.org/10.26634/jse.16.4.18820

Abstract

Recent developments in Steganalysis have made it difficult to secure personal content, messages, or digital images using steganography. Using Steganalysis can easily reveal the presence of hidden information in storage files. This paper presents a new Steganographic approach to communication between two individuals. The approach presented in this paper uses both Steganographic and cryptographic methods. Cryptography uses Rivest–Shamir–Adleman (RSA) and Steganography use image Steganography to hide data. It also uses the mutual authentication process to satisfy all services in the field of cryptography, i.e., access control, confidentiality, integrity, and authentication. In this way, it can store data more securely. Since it uses the RSA algorithm to protect the data again, it performs Steganography to hide the data in the image. Thus, any other person on the network cannot access the data present on the network. Only the sender and receiver can extract the message from the data.

Research Paper

Catching Illegal Fishing using Random Forest and Linear Regression Models

Mounika* , Sowjanya**, Keerthana***, Tejaswini****
*-**** Vignan's Institute of Engineering for Women, Andhra Pradesh, India.
Mounika, Sowjanya, Keerthana, and Tejaswini. (2022). Catching Illegal Fishing using Random Forest and Linear Regression Models. i-manager’s Journal on Software Engineering, 16(4), 17-23. https://doi.org/10.26634/jse.16.4.18818

Abstract

Globally, illegal fishing is posing a serious financial challenge to the fishing industry. Because of this, illegal fishing pushes many fish populations to extinction. This paper proposes analyzing illegal fishing using data analysis and machine learning techniques. The existing methods use data manipulation in the illegal fishing data due to the delay in catching illegal vessels, while in this system the data is entered manually. This paper offers data analytics to find these vessels. It may collect raw data from Global Fishing Watch (GFW) and analyze the data to find vessels, whether it is used for illegal or legal fishing. Based on the sensors attached to the ship, it can find data about the Automatic Identification System (AIS) location, the ship's type, and the ship's speed. This model can predict illegal fishing and take appropriate action against illegal fishing vessels.

Research Paper

Pathfinding Visualizer

Ananya Maurya* , Aayushi Yadav**, Ashish Baiswar***
*-***Department of Information Technology, Shri Ramswaroop Memorial College of Engineering and Management Lucknow, Uttar Pradesh, India.
Maurya, A., Yadav, A., and Baiswar, A. (2022). Pathfinding Visualizer. i-manager’s Journal on Software Engineering, 16(4), 24-30. https://doi.org/10.26634/jse.16.4.18801

Abstract

Visualizations of algorithms contribute to improving computer science education. The process of teaching and learning of algorithms is sometimes, complex and hard to understand problem. Visualization is a useful technique for learning and analyzing any algorithm easily. Pathfinding refers to computing an optimal route between the specified start and goal nodes. It is an important research topic in the area of Artificial Intelligence with applications in fields such as GPS, Real-Time Strategy Games, Robotics, logistics while implemented in static or dynamic or real-world scenarios. Recent developments in pathfinding lead to more improved, accurate and faster methods and still captivates the researcher's attention for further improvement and developing new methods as more complex problems arise or being developed in AI. A great deal of research work is done in pathfinding for generating new algorithms that are fast and provide optimal path since the publication of the Dijkstra algorithm in 1959.

Review Paper

E-Commerce Application (Q-Kart)

Ravikant Soni* , Anik Gupta**, Shweta Yadav***, Disha Dave****, Madan Mohan Sharma*****
*-***** Department of Computer Science and Engineering, Swami Vivekanand Technical University, Chhattisgarh, India.
Soni, R., Gupta, A., Yadav, S., Dave, D., and Sharma, M. M. (2022). E-Commerce Application (Q-Kart). i-manager’s Journal on Software Engineering, 16(4), 31-37. https://doi.org/10.26634/jse.16.4.18503

Abstract

The Internet has become a vital source in cutting-edge business, so e-shopping has become important not only from the point of view of the business person but also from the point of view of the customer. For business people, e-purchases open up new opportunities for work; for customers, make relative shopping possible. Many virtual store customers are instinctive and usually decide to stay at the outlet for a few seconds. The site plan is like decorating a store. Whether the stores look shabby or like thousands of other stores, the customer is more likely to run away to another store. Hence, it has developed a design to provide the client with uncomplicated research, data correction, and certain comments that are possible. In this design, an E-Commerce web page is passed to the stoner that can be used to purchase various types of online products. In this design, the payment system is not included because it uses a specific gateway to complete the payment system.