Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst <p>Asian Journal of Computer Science and Technology (AJCST) a half-yearly peer-reviewed International Journal promoting the dissemination of original research and technological implementation experiences in the areas of Computer Science, Engineering, and Information Systems.</p> en-US editor.trp@trp.org.in (Dr.K.S.Shivraj) submissions@trp.org.in (Ms. S. Sukanya) Fri, 05 Nov 2021 00:00:00 +0530 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 An Online Road Transport Booking System https://ojs.trp.org.in/index.php/ajcst/article/view/2913 <p>Road transportation bookings have traditionally been done over the counter in transportation terminals but with the exponential growth of e-commerce, this has changed. This study focuses on automating the Road Transport Booking System to allow travellers (passengers) and employees to buy and sell tickets online. The study also discusses issues that consumers and administrators face, such as long wait times to book a trip, unsafe environments and more. The project investigates several implementation problems and makes suggestions about how to successfully incorporate an Online Road Transport Booking System. This web portal would aid future development of a fully integrated system that connects transportation company employees to consumers, employees to employees, employees to other types of transportation providers, employees to companies, and employees to government agencies. The development tools used in the development of this research are PHP, CSS, HTML, JavaScript, MYSQL database, and XAMPP server.</p> Olubukola D. Adekola, Yaw Mensah, Stephen O. Maitanmi, Oyebola Akande, Funmilayo A. Kasali, Ayokunle Omotunde, Wumi Ajayi, Oluwatosin Ajiboye Copyright (c) 2021 https://ojs.trp.org.in/index.php/ajcst/article/view/2913 Fri, 08 Oct 2021 00:00:00 +0530 Beyond the Hashtag: Social Media and the Challenges to Cyber Security https://ojs.trp.org.in/index.php/ajcst/article/view/2837 <p>Social media may be seen as the new oil that makes the world go round providing access to all manner of information about the users. With the challenges to cyber security, social media users now require a level of awareness of the impact of their actions. This study focuses on the awareness level of social media users to the threats and risks of using the platforms and the extent to which the users are prepared to take responsibility. The study adopted a quantitative descriptive cross-sectional survey research over WhatsApp with 95 respondents selected from two institutions using random selection. Data collected were analyzed using IBM SPSS version 23 to generate summaries of descriptive statistics. All (100%) the respondents are within working class ages although most were aged 31-40 years (45.3%). All users were always on social media (SM) (100%), post daily on social media even though not all (21%) of them read terms and conditions associated with the different social media platforms. Also (55%) of the respondents agree that social media influences their thinking. However, majority of the users are unbothered about the aftermath of their posts as few respondents (32%) disagree that the thoughts of other users about their post is not their problem but that of the other users while (87%) of the respondents believe they can defend their posts. Few respondents (27%) believe that it is possible for litigation to arise as a result of their post on social media and (26%) believe that the application stores their records, which encourages litigation. Despite high level of awareness of the impact of acts of users on cyber security, users are more interested in their protection than that of other users. Whilst regulation would go a long way to manage identified threats, regulation should seek to regulate the coding of social media platforms while social media users garner the requisite emotional intelligence required as a defense mechanism for cyber security.</p> S. O. Maitanmi, A. M. Davies, R. O. Oladapo, A. Omotunde , A. O. Awoleke Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/2837 Thu, 28 Oct 2021 00:00:00 +0530 Fire Detection Using Image Processing https://ojs.trp.org.in/index.php/ajcst/article/view/2883 <p>Fire disasters have always been a threat to homes and businesses even with the various systems in place to prevent them. They cause property damage, injuries and even death. Preparedness is vital when dealing with fires. They spread uncontrollably and are difficult to contain. To contain them it is necessary for the fire to be detected early. Image fire detection heavily relies on an algorithmic analysis of images. However, the accuracy is lower, the detection is delayed and in common detection algorithms a large number of computation, including the image features being extracted manually and using machine. Therefore, in this paper, novel image detection which will be based on the advanced object detection like CNN model of YOLO v3 is proposed. The average precision of the algorithm based on YOLO v3 reaches to 81.76% and also it has the stronger robustness of detection performance, thereby satisfying the requirements of the real-time detection.</p> B. Swarajya Lakshmi Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/2883 Fri, 05 Nov 2021 00:00:00 +0530 An Inventive Technique of Fault Recognition and Data Recapture Construction for Gesture Assessment Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3014 <p>Specified the basic job of movement estimate (ME) inside a cinematic programmer, analyzing such a pattern is of need anxiety. Even though zeroing in upon this analyzing of ME inside a cinematic programming framework, that effort presents an error discovery and data retrieval (EDDR) plan, inside light of this residue and quotient (RQ) program, toward implant obsessed by ME for cinematic programming analyzing requests respectively. A mistake inside processing elements (PEs), for example main parts for a ME, it can be recognized and recuperated adequately through exploiting this projected EDDR plan. The test outcomes establish that this projected EDDR strategy for ME analyzing can discriminate blunders and recuperate information by an OK section above and effectiveness punishment. Critically, this projected EDDR formation achieves sufficiently to the extent that output and unwavering quality for ME analyzing requests respectively.</p> S. Ravichandran, K. Kumaresan, R. Geetha Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/3014 Fri, 05 Nov 2021 00:00:00 +0530 A Comparative Analysis of Agile Methods and the Capacity Maturity Model Integration (CMMI) https://ojs.trp.org.in/index.php/ajcst/article/view/2920 <p>Quality issue is an important aspect of system development which is defined by a range of plausible elements such as correctness, efficiency, scalability, modularity, maintainability, speed etc. To provide better quality of software than the ones offered by the usual traditional approaches of software development process, new methods like agile methodology was introduced. However, since its introduction, there have been keen contentions as to whether agile methodology offers more advantages than a typical traditional methodology or its numerous “flavours”- that is, a methodology which evolved from a typical traditional approach e.g. the Capacity Maturity Model integration - CMMI. Recent works to determine best practices addressed by three Methodologies shows that both agile and the Capacity Maturity Model integration are now widely used methods in system development process. However, they make different but unique contributions to overall project quality control. Here in this work (using relevant previous works as background), analysis of these two great methods- Agile and CMMI is presented by taken into consideration the fundamental components of both methods, their views about quality, perspective from project management and software development, contributions to overall project quality control and concluded on compatibility of the two methods within the same project. Findings from this work and existing data showed that both can be used in same project to get desirable quality.</p> Wumi Ajayi Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/2920 Fri, 05 Nov 2021 00:00:00 +0530 Design and Development of Refuge and Retrieve Controller Estimation for Cloud Data Centers https://ojs.trp.org.in/index.php/ajcst/article/view/2921 <p>Cloud server farms appropriate the common information to the clients. In cloud climate consumers' material is normally organized distantly in vague machineries that consumers don't claim or effort respectively. Client information control is decreased on information sharing under remote machines. Incorporated checking applications are not reasonable for profoundly powerful information access climate. Information access the executives should be possible through the cloud specialist co-ops (CSP). Cloud Data auditing plans are utilized to screen the common information esteems. Cloud Information Accountability (CIA) system is an exceptionally decentralized data responsibility model. CIA system joins parts of access control, use control and validation. Two unmistakable modes are produced for inspecting push mode and pull mode. The push mode alludes to logs being occasionally shipped off the information proprietor or partner. The force mode alludes to the client or one more approved party can recover the logs depending on the situation. Container (Java ARchives) records are utilized to consequently log the use of the clients' information by any substance in the cloud. Circulated evaluating systems are additionally used to fortify client's control. The information are sending alongside access control approaches and logging arrangements encased in JAR records, to cloud specialist organizations. Any admittance to the information will trigger a mechanized and verified logging system nearby to the JARs. The Push and Pull mode log recovery calculation is utilized for the log the board interaction.&nbsp; Information evaluating and security plans are coordinated to give client log data to the common information. The Cloud Information Accountability (CIA) system is improved to give verification plan to JAR records. The framework consolidates the information and runtime uprightness check measure. Log information examination is furnished with ordering and collection capacities. The framework incorporates information and executable access control model.</p> S. Ravichandran, A. P. Babu Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/2921 Fri, 05 Nov 2021 00:00:00 +0530 Managing Security Risks in Wireless Web Services https://ojs.trp.org.in/index.php/ajcst/article/view/2936 <p>Over the last twenty years, the Internet has become highly interactive and is not merely a static repository of websites, which allows its users to interact proactively. The functions and tasks of the Internet have evolved during this twenty-year period, such that it is no longer a rudimentary collection of websites. The Internet empowers individual users to explore the Internet in an exponentially greater capacity than in years past. In this study, we will consider the issues like security and trust issues in IoT and local cloud interfaces. Additionally, the security, requirements of M2M services and security solutions for the internet are analyzed, and their ineffectiveness is discussed.</p> Alaa Alsaeed Copyright (c) 2021 Asian Journal of Computer Science and Technology https://ojs.trp.org.in/index.php/ajcst/article/view/2936 Fri, 05 Nov 2021 00:00:00 +0530