https://i-scholar.in/index.php/ijocs/issue/feed Indian Journal of Computer Science 2023-07-13T10:34:27+00:00 Mrs. Satya Gilani editor@indianjournalofcomputerscience.com Open Journal Systems Indian Journal of Computer Science (ISSN 2456 - 4133; indexed in Indian Citation Index, Google Scholar among others) is a bi-monthly journal that provides a platform to professionals, graduates, engineers, academics, and researchers in all areas of Computer Science to share research achievements, their perspectives, practical experiences, as well as disseminate information on state-of-the-art techniques in the field of Computer Science and related topics such as e-governance, online consumer behaviour, and technology-enabled business. The journal aims to fill the gaping hole that exists in the field of research related to computer science in India and other developing countries. https://i-scholar.in/index.php/ijocs/article/view/222517 Drishti : Real-Time Object Recognition for the Visually Impaired 2023-07-13T10:30:11+00:00 Hitanshu Parekh hitanshuparekh72@gmail.com Niyati Agarwal niyatiagarwal061101@gmail.com Pranav Bangera pranavbangera18@gmail.com Roger D’souza rogerds31@gmail.com Grinal Tuscano grinaltuscano@sfit.ac.in In 2017, the World Health Organization (WHO) reported that nearly 284 million individuals worldwide experienced some degree of visual impairment, with approximately 39 million individuals suffering from total blindness. People with visual impairments often rely on assistance from others or use canes to move around and identify obstacles. Our proposed system aims to aid the visually impaired by identifying and classifying common objects in real-time, as well as recognizing text from various sources such as documents and signs. This system provides voice feedback to enhance understanding and navigation, and utilizes depth estimation algorithms to determine a safe distance between objects and individuals, promoting self-sufficiency and reducing dependence on others. We employ the COCO image dataset, which contains everyday objects and people, and utilize the Mobilenet SSD algorithm for real-time object identification. To enable real-time Optical Character Recognition (OCR) Text-To-Speech functionality, we employ advanced technologies such as OpenCV, Python, and Tesseract for text detection and recognition, and the Pyttsx3 library for converting recognized text into audible speech. Our proposed system is dependable, affordable, realistic, and feasible. 2023-04-01T00:00:00+00:00 https://i-scholar.in/index.php/ijocs/article/view/222518 Attack Detection and Prediction Using Machine Learning 2023-07-13T10:31:51+00:00 Vaishali Shirsath vaishali.shirsath@vcet.edu.in Jainil Shah jainilshah.242001@gmail.com Ajay Shah shahajay2712@gmail.com Devansh Shah devanshshah3102001@gmail.com Data plane and control plane are divided by Software Defined Networking (SDN). A centralized controller oversees and manages the entire network. With SDN, the network may be programmed and flow regulations can be created dynamically. Numerous benefits including adaptability, programmability, and centralized management are offered by this decoupling. However, SDN also creates new vulnerabilities as a result of desired data plane and control plane connectivity. Attacks on switch buffer overflows and control plane saturation are two examples of threats that exploit such flaws. The controller is vulnerable to Distributed Denial of Service (DDoS) attacks, which induce resource exhaustion and impair the controller's capacity to provide services. By flooding the control plane with TCP SYN packets from the data plane (i.e., switches), several attacks can be launched. SVM is the most popular and often used classifier, both for classification and regression, thanks to its high accuracy and low false positive rate. For DDoS detection, the SVM classifier is examined and contrasted with other classifiers. In order to identify anomalies, such as malicious traffic, and report them, Snort, an intrusion detection system, examines the traffic and packets. The entropy approach is used to assess the flow data's randomness. An IP address for the intended recipient and a few TCP flag attributes make up the entropy information. We implement it as an additional module in the Floodlight Controller and assess its viability and efficacy. We thoroughly evaluate how we have implemented things via Mininet, substantial emulation. 2023-04-01T00:00:00+00:00 https://i-scholar.in/index.php/ijocs/article/view/222519 An Analysis of the Usage of Various Programming Languages to Classify Whether they are Relevant, Extinct, or on the Verge of Extinction 2023-07-13T10:33:23+00:00 Apoorv Mohit mohitapoorv12@gmail.com Sunaina Rustagi sunainarustagi1101@gmail.com The first modern high level general purpose programming languages appeared over seventy years ago. Since then, with the exponential increase in the usage of different types of computer software and developments in computer hardware, numerous high level programming languages have been created for various purposes, with each language having its own relative advantages and disadvantages. Usually, specific general purpose high level programming languages are appropriate for specific applications or problems because of the nature of capabilities of the languages such as efficiency, memory consumption, expressiveness, availability of compilers, and tools etc. Newer languages incorporate significant functionalities of older languages which may serve as an “inspiration” for it while introducing new features and functionalities. However, the creation of newer programming languages does not necessarily mean the obsolescence of older languages because of factors such as programming effort, familiarity, and popularity. However, their usage for newer and upcoming applications may eventually decrease and familiarity and popularity might consequently fade away with it. In this paper, we take a look at 38 different programming languages that have been invented and identify the least used programming languages to provide an overall estimate of the least used programming languages in today’s time and the programming languages on the verge of death 2023-04-01T00:00:00+00:00 https://i-scholar.in/index.php/ijocs/article/view/222520 Cybersecurity Awareness Amongst Youth – A Survey in Delhi/NCR 2023-07-13T10:34:27+00:00 Vaishali Chawla vaishali.mcs18.du@gmail.com Yatin Kapoor yatin.mcs19.du@gmail.com Tanya Chawla tanyachawla104@gmail.com Cyberspace has become an integral part of modern society, especially in the last two decades. As the internet has rapidly progressed globally, the community of cyber users in cyberspace has widely expanded. One group of cyber users that is swiftly becoming active in cyberspace is the youth, particularly, school and college students. However, young cyber users are increasingly becoming the soft targets of cybercriminals. Taking cognizance of the rising cybercrime cases against young cyber users, this research study surveyed several schools and colleges in the Delhi-NCR region to assess the cyber awareness among students and academic professionals. It was found that most of the participants were not aware of ethical and safe digital practices. These observations are attributed to the poor application of initiatives to ensure cyber safety among school children, especially in developing countries like India. Based on the findings from the survey, this study provides suggestions and recommendations to various role-players involved in cyberspace to assure safe cyber behaviour. 2023-04-01T00:00:00+00:00