Welcome

to

JACSAI

The Journal of Applied Computer Science & Artificial Intelligence is an open access journal that publishes articles which contribute to new results. The main aim of JACSAI is to publish refereed, original research articles, and studies that describe the latest research and developments in the area of Computer Science & Engineering
Register
Register
Register
Register
Register
Call For Paper
Call For Paper
Call For Paper
Call For Paper
Call For Paper
JOURNAL OF APPLIED COMPUTER SCIENCE & ARTIFICIAL INTELLIGENCE
Author A1*, Author B2, Author C3 [ font size11]
Abstract
Immediately following the names of the author(s), type Abstract, 10-point Times New Roman. Include a one-paragraph abstract of approximately 150 to 300 words in 10-point Times New Roman, summarizing the purpose and findings of the research. At the end of the abstract, double-space and include a line with “Keywords,” as shown below. The abstract’s length should be a minimum of 150 words and a maximum of 200 words; it should be confined within a single paragraph.
Keywords
Component, Formatting, Style, Styling, Insert (key words)
INTRODUCTION
Introduction should lead the reader to the importance of the study; tie-up published literature with the aims of the study and clearly states the rationale behind the investigation. It should state the purpose and summarize the rationale for the study and gives a concise background[1]. Use references to provide the most salient background rather than an exhaustive review. The last sentence should concisely state your purpose for carrying out the study or a summary of the results[2]. The purpose of the contribution statement is for you to provide a clear and concise understanding of the primary contribution provided by your manuscript. The statement should: 1. clearly articulate the ways in which the research provides insight to a consumer-relevant question;
2. situate your research within the existing knowledge on the topic; and 3. explain what the research adds to what is already known about the consumer-relevant problem. As a last paragraph of the introduction should provide organization of the paper/article (Rest of the paper is organized as follows, Section I contains the introduction of ………………. , Section II contain the related work of ……………, Section III contain the some measures of …………...., Section IV contain the architecture and essential steps of ……………..., section V explain the

Published journal

Recognition of Handwritten Numerals Using Support Vector Machine
SOUVIK BANERJEE, SOUVIK ROY ,PIJUS KANTI DHARA, SHAWNA SAHA, SOUMENDU DAS, PRANATI RAKSHIT CSE Dept., JIS College Of Engineering
Abstract
Pattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data. Pattern recognition systems are in many cases trained from labeled "training" data (supervised learning), but when no labeled data are available other algorithms can be used to discover previously unknown patterns (unsupervised learning). In recent years, the recognition of printed and handwritten mathematical expressions has received an increasing amount of attention in pattern recognition research. The diversity of approaches to recognize mathematical expressions and the lack of a commercially viable system, however, indicate that there is still much research to be done in this area.
Keywords
Numeral Recognition, Machine learning, Support Vector Machine, training, supervised learning
INTRODUCTION
Pattern recognition is one of the major challenges in statistics framework. Its primary goal is to extract efficient feature and accurately classify the patterns into categories. A well-known and vital application in this field is the handwritten digit classification and
recognition where digits from 0 to 9 have to be assigned into one of the 10 classes using some classification method. The variety of digits to be recognized, the variations in handwriting, different notations and several other issues make this a complex problem.
Published on: 30 Sep 2020
Unique Identification Key Generation System for Secure Authentication
Shrabanti Saha, Aniket Kumar, Kaushik Kumar, Sudipta Sahana
Abstract
The project entitled “Unique Identification Key Generation System for Secure Authentication” is a web based application software for generating a Unique Identifiable Key for a particular individual user and validating the respective individual user by that Unique Key as per requirements. This web based application software can be used for validating an individual user in various platform with a single Unique Identification Key, one such example is to keep track of entries and departure of an individual, working in an Office, College or some organization where large number of peoples works across the platform. This web based application will be a replacement of manual pen & paper system as it time consuming and fully automated.
Keywords
Alcohol sensor, ADC, GSM, Arduino, GPS
INTRODUCTION
The project titled “Unique Identification Key Generation System for Secure Authentication” is being developed in the Computer Science and Engineering Department, JISCE, Kalyani, Nadia. The purpose of developing such and web application is to computerize the identification system of a particular user at various organizations fast
and at the same time making it more secured and user friendly. Another purpose for developing such a web application is the ability to identify an individual by using his/her identity information by simply making use of a Unique Identifiable Key. The system will help to keep track and to generate reports of both the registered individuals as well the validated individual’s on daily basis or as per requirement.
Published on : 30 Sep 2020
An effort to optimize the error using statistical and soft computing methodologies
Gopal Purkait, Dhrampal Singh
Abstract
In today’s era, decision making problems are getting more importance than other’s problem. In this paper, an effort has been made to make a comparison on the performance of different statistical methods like least square techniques based on linear equation, exponential equation and logarithmic equation on iris data set. Initially, data preprocessing techniques applied on the data set to clean it in proper format and later on concept of factor analysis on preprocessed data set to finds total effect value. The methods least square techniques based on linear equation, exponential equation and logarithmic equation have been used on total effect value and logarithmic equation outperformed the other used techniques with average error of 6.32 %.
Keywords
Alcohol sensor, ADC, GSM, Arduino, GPS
INTRODUCTION
Data mining is the process of analysing large data sets to identify patterns and establish relationships to solve problems through data analysis. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use and to predict future trends. Data mining techniques
are used in research areas, mathematics, cybernetics, genetics and marketing. While data mining techniques are a means to achieve efficiencies and predict behaviours, in general, the benefits of data mining come from the ability to uncover hidden patterns and relationships in data that can be used to make predictions on a large data set.
Published on: 30 Sep 2020
Performance Analysis of MWMCDS Algorithm in Ad-Hoc Networks using NS2
Sayed Karar Waris , Ira Nath
Abstract
Efficient routing among a set of mobile hosts (also called nodes) is one of the most important functions in ad-hoc wireless networks. Routing based on a connected dominating set is a frequently used approach, where the searching space for a route is reduced to nodes in the set. A set is dominating if all the nodes in the system are either in the set or neighbors of nodes in the set. We used existing heuristic MWMCDS Algorithm, which is also known as Maximal Weighted Connected Dominating Set. With help of AODV Routing protocol heuristic MWMCDS Algorithm is implemented in Ad-Hoc Networks and performance is analysed using NS2 Simulation. In existing, minimum connected dominating set with weight factor but here weight factor is depend on routing process. Existing system doesn't setup the effective routing. So we can choose the MWMCDS with support of AODV routing protocol.
Keywords
Lorem ipsum dolor sit amet.
INTRODUCTION
How to design a efficient routing among a set of mobile hosts(also called nodes) is one of the most important functions in ad hoc wireless networks. Routing based on a minimum connected dominating set (MCDS) is a promising approach, where the search space for a route is reduced to nodes in the set
(also called gateway nodes). So, to determine this set is a very vital problem.In this paper we used introduced MWMCDS, a simple and efficient heuristic algorithm for calculating minimum connected dominating set withmaximal weight in the topology graph G of a ad hoc wireless network[2]. The performance of MWMCDS improves compare to existing method.
Published on: 30 Sep 2020

EDITORIAL BOARD

Editor-in-Chief
 

Dr. Dharmpal Singh
Head of Department
JIS College of Engineering
Computer Science & Engineering
head_cse.jisce@jisgroup.org
Associate Editor-in-Chief
 

Dr. Sudipta Sahana
Assistant Professor
JIS College of Engineering
Computer Science & Engineering
sudipta.sahana@jiscollege.ac.in
Journal Update
Call For Paper Volume 2 , Issue 2
Article/Paper Acceptance Requirements

The criteria for an article to be accepted for publication include: The article is presented in an intelligible fashion and is written in JACSAI Template. The article should be original writing that enhances the existing body of knowledge in the given subject area. Results reported have not been submitted or published elsewhere. Experiments, statistics, and other analyses are performed to a high technical standard and are described in sufficient detail. Conclusions are presented in an appropriate fashion and are supported by the data. All figure/Image should be showing clearly and Clearly mention figure name and numbers in increasing order Equation/Formula should be in Math’s equation editor Software (equation editor software). Please do not give scanned equation/formula. Tables should be in MS Word. Please do not give scanned equation/formula. Appropriate references to related prior published works must be included in JACSAI Standard. All the submitted papers are first reviewed at editorial board level and assessed on the basis of their technical suitability for the journal, scope of work and plagiarism. We are using Turnitin / Plagiarism CheckerX software to check the Plagiarism / Similarity Index of the paper submitted for JACSAI. If selected by the editorial board, the paper shall be subjected toa fair and unbiased double blind peer review by at-least two refereeson the basis of their originality, novelty, clarity, completeness, relevance, significance and research contribution.The review process may take 05 to 15 days depending upon the cycles of review required, before the paper is finally accepted . Please refer to Authors Guidelinesfor details of reviewing process and to submit your papers please refer to Online Submission System. Please note that all manuscripts/papers/articles MUST be submitted through the Online Submission System. Manuscripts/papers/articles submitted outside of the system will not be considered for publication.


Scope of the Journal

JACSAI publishes high quality, innovative research results in various areas of artificial intelligence and soft computing. These areas include, but are not limited to: Computer Science Engineering and Technology, Advanced Algorithms, Applications of Computer Science, Architecture Evaluations, Artificial intelligence, Automation and Mobile Robots, Bioengineering, Bioinformatics, Blue-Tooth Technologies, Brain machine Interface System, Brain Mapping, Cloud Computing, Computational Biology, Computational linguistics, Computational Statistics, Computational Mathematics, Computer Graphics, Computer Applications, Computer Architecture, Compiler, Computer Software / Hardware, Cyber-Science and Cyber-Space, Data and Information Systems, Data Bases and its applications, Data Compression, Data Engineering, Data Fusion, Data Mining, Data Warehousing, Databases, Design of Algorithms, Digital Speech Processing, Distributed Data Base, Distributed Knowledge-base Systems, Distributed Multimedia, Cloud Computing and Applications, Collaborative applications, Communication architectures for pervasive computing, Communication systems, Computational intelligence, Computer and microprocessor-based control, Computer Architecture and Embedded Systems, Computer Business, Computer Vision, Computer-based information systems in health care, Computing Ethics, Context-awareness and middleware, Cross-layer design and Physical layer based issue, Cryptography, Data Base Management, Data Mining, Data Retrieval, Decision making, Digital Economy and Digital Divide, Digital signal processing theory, Distributed Sensor Networks, E-Business, E-Commerce, E-Government, Emerging signal processing areas, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Encryption, Energy-efficient and green pervasive computing, Event-based, publish/subscribe, and message-oriented middleware, Evolutionary computing and intelligent systems, Expert approaches, Fuzzy algorithms, Fuzzy logics, GPS and location-based applications, Green Computing, Grid Networking, Healthcare Management Information Technology, Human Computer Interaction (HCI), Image analysis and processing, Image and multidimensional signal processing, Image and Multimedia applications, Industrial applications of neural networks, Information and data security, Information indexing and retrieval, Information Management, Information processing, Information systems and applications, Information Technology and their application, Instrumentation electronics, Intelligent Control System, AI in Modelling and Simulation, AI in Scheduling and Optimization, Automated Reasoning and Inference, Bioinformatics, Cognitive Aspects of AI, Computer Vision and Speech Understanding, Data Mining, Distributed Intelligent Processing, Evolutionary Design, Expert Systems, Fuzzy Modelling and Control, Hardware Implementations, Heuristic Search, Hybrid Models, Information Retrieval, Intelligent Database Systems, Knowledge Engineering, Mechatronics, Multi-agent Systems, Natural Language Processing, Neural Network Theory and Architectures, Neuro-informatics and Bio-inspired Models, Pattern Recognition, Robotics and Related Fields, Rough Sets Theory: Foundations and Applications, Supervised and Unsupervised Learning, Swarm Intelligence and Systems, Web Intelligence Applications & Search, Various Applications.


Why Publish Here

JACSAI publishes articles that are of high interest to readers-original, novelty, completeness, relevance, significance, techniacally correct, and clearly presented. The scope of this all-electronic,archival publication comprises all JACSAI fields of interest, emphasizing applications-oriented and interdisciplinary articles. JACSAI makes it easy for practitioners, researchers, institutions, funding agencies, and others to make published information available to everyone via one of the most prestigious and growing technical publishers in the world. JACSAI open access publishing facilitates dissemination to those who seek direct access to an author's research results.


Abstracting and Indexing