Welcome to Guest !
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
  Subscriber Services   |   Feedback   |   Subscription Form
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The IUP Journal of Computer Sciences
ISSN: 0973-9904
A ‘peer reviewed’ journal indexed on Cabell’s Directory,
and also distributed by EBSCO and Proquest Database


Previous Issues


The IUP Journal of Computer Sciences is a quarterly journal focusing on state-of-the-art computing techniques, algorithms and data structures, encryption techniques, computational problems, artificial intelligence, databases, cybernetics, firewall techniques, chip designing, logic circuits, software engineering, programming techniques, computer architecture, neural networks, etc. The journal publishes contemporary research papers, emerging concepts, and strategies pertaining to the broad area of computer sciences with contributions from thought leaders, eminent academicians and researchers.

Privileged access to Online edition for Subscribers.
Editorial Board
Information to Authors
  • Algorithms and Data Structures
  • Encryption Techniques
  • Computational Problems
  • Artificial Intelligence
  • Databases
  • Firewall Techniques
  • Chip Designing
  • Logic Circuits
  • Software Engineering
  • Programming Techniques
  • Computer Architecture
Handwriting Recognition Using Haar Transform
Improved SVM Classifier Based on FODPSO and GSA Algorithms and Its Application in Face Recognition
Extraction of Serial Number on Currency Notes Using LabVIEW
Vulnerability Assessment and Evaluation of Associated Attacks on Physical and Virtual Networks
Select/Remove All    
(April 2018)

Handwriting Recognition Using Haar Transform

--Kaki Leela Prasad and Pilaka Anusha

The objective of the paper is to receive intelligible handwritten input from paper documents and convert it into understandable format. Handwriting recognition involves the automatic conversion of text in a document into letter codes which are usable within computer and text-processing applications (Hanna et al., 1997). The information contained within these documents must first be extracted from the hard copy using optical scanner and then stored in a computerized format, which can be easily understood. The data obtained by this form is regarded as a static representation of handwriting (Read et al., 2002a). This technology is successfully used by businesses which process lots of handwritten documents, like insurance companies.

Article Price : Rs.50

Improved SVM Classifier Based on FODPSO and GSA Algorithms and Its Application in Face Recognition

--Deepti Ahlawat and Vijay Nehra

Support Vector Machine (SVM) is widely used as a classifier in a number of applications in image processing. However, the penalty parameter (C) of SVM controls the tradeoff between margin and penalty factor. And the kernel parameter gamma (g) of SVM with the Radial Basis Function (RBF) is inversely proportional to width of kernel which affects the classification performance seriously. The parameters C and g are the deciding factors which affect the performance of SVM classifier. The paper tunes these factors using hybrid optimization algorithms. Two optimization algorithms, namely, Fractional Order Darwinian Particle Swarm Optimization (FODPSO), which is advanced level of DPSO, and Gravitational Search Algorithm (GSA) are combined. Out of these, the first is local optimization algorithm and the second one is global optimization algorithm. Two common datasets, namely, JAFFE and Yale, are used in the experiments to validate the performance of the proposed algorithms. The results demonstrate that the SVM parameters selected by FODPSO-GSA-SVM contribute to higher accuracy than PSO, GA, GSA and other methods mentioned in the literature.

Article Price : Rs.50

Extraction of Serial Number on Currency Notes Using LabVIEW

--J Bhaskara Rao and A Siva Kumar

Currency has great importance in day-to-day life and therefore currency recognition is a great area of interest for researchers. Image processing is the most popular and effective method of currency recognition. Image processing-based currency recognition technique consists of a few basic steps like image acquisition, its preprocessing and finally recognition of the currency. To recognize a character from a given currency image, there is a need to extract feature descriptors of such image. As extraction method significantly affects the quality of whole Optical Character Recognition (OCR) process, it is very important to extract features, which will be invariant towards various light conditions, used font type and deformations of characters caused by a skew of the image. Heuristic analysis of characters is done for this purpose to get the accurate features of characters before feature extraction in currency.

Article Price : Rs.50

Vulnerability Assessment and Evaluation of Associated Attacks on Physical and Virtual Networks

--Moses Ashawa

There is no system in the 21st century that has no vulnerability. Most networks seem to be very secure because the vulnerabilities in them are yet to be discovered. However, these vulnerabilities decrease in networks that undergo regular checks and upgrade in their directories with embedded security parameters which have cryptographic primitives. Lack of network checks has fashioned various attack vectors, which hackers exploit to break into the security of private, public and even virtual networks. Network attacks such as brute forcing, Man-in-the-Middle (MITM) attack, social engineering and Advanced Persistent Threats (APT) occur as a result of the combinations of several vulnerabilities which are embedded in them. The aim of this paper is to discover vulnerabilities such as weak passwords on networks and to demonstrate some common attacks that are frequently carried out on vulnerable networks which lack strong security primitives. Basic attacks demonstrated in this research were MITM attack, Address Resolution Protocol (ARP) poisoning, Dynamic Host Configuration Protocol (DHCP) starvation attack and brute forcing. This research was conducted using network attack tools such as Nmap and Ethercap which are attack tools in kali Linux. The results showed that the vulnerabilities on networks range from poor embedment of security parameters on networks, opened network ports, weak and unsalted passwords and a host of others.

Article Price : Rs.50



- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.