International Journal of System & Software Engineering https://i-scholar.in/index.php/ijsse <div id="i-scholarabout">International Journal of Software Engineering is a peer reviewed, fully refereed International Journal focusing on theories, methods and applications in Software Enginering and related fileds. It publishes original research articles, case studies, review articles, technical notes, book reviews etc. relating to all aspects of software engineering.</div> Publishing India Group en-US International Journal of System & Software Engineering 2321-6017 Intelligent Control System of Wheelchair Based on Brain Wave and Voice https://i-scholar.in/index.php/ijsse/article/view/205828 In order to improve the quality of life of the elderly and the disabled, the system fully considers the lifestyles of the elderly and the disabled and realizes the intelligent control of the wheelchair by using the Internet of Things and the intelligent control technology. By designing wearable equipment, the system can obtain the original EEG signals from the brain, and after filtering the noise and power signals, the brain waves are converted into output signals to realize the control of the wheelchair. Wearable devices are called brain wave collection caps. In addition, the system also has infrared obstacle-avoidance function, speech recognition and other functions, and ultimately to help the elderly and disabled people to achieve the “body with the brain moving” goal. Long-term testing of the system shows that the equipment is easy to operate, suitable for the elderly and disabled people with limited mobility, and it is of great social significance to improve the quality of life and happiness index. Jianyong Zhang Wei Han Pingzeng Liu 2019-12-01 2019-12-01 7 Cost Analysis for N-Policy Machining System With Spares, Service Halt, Set Up and Common Cause Failure https://i-scholar.in/index.php/ijsse/article/view/205829 In the present study we consider N-Policy for machining system with mixed standbys (warm and cold). The life times of on-line units and standby units are assumed to be exponentially distributed. There may be the case when all or some units fail simultaneously due to any common cause. When both types of standbys are exhausted the operating unit fails in degraded fashion. The failed units are repaired by the single server in exponential fashion, which activates only when queue size of failed units becomes N (³ 1). The server may also face sudden halt due to breakdown, which is immediately repaired. The server failure, set up duration taken by the repairman before he starts repairing of service and repair times of repairman are also exponentially distributed. The solution for steady state probabilities of the number of failed units in the system is obtained using recursive method. Expressions for various performance indices viz. expected number of failed units in the system and queue, the probability of server being idle, busy, breakdown or in set up state etc. are determined. Cost analysis is done by taking cost factors related to different situations. Neetu Singh 2019-12-01 2019-12-01 7 Smart Intrusion Detection Systems Using Machine Learning https://i-scholar.in/index.php/ijsse/article/view/205830 Engineering problems are generally solved by gathering domain specific knowledge and then developing algorithms to solve that particular problem. Machine learning is an Engineering discipline that helps us solve these problems by collecting a large datasets and then with the help of that data it is possible to create black box machine output of which can then be used to solve real world problems [1]. This paper cites the basis of machine learning concepts and the methods which can be applied to intrusion detection in the cyber security industry. Machine learning is used to generate predictive models that can be used to classify requests on to a server. Main goal is to build a machine learning model that can classify a request on a server into a normal request or a malicious request based on the server’s behaviour and determine the type of attack. Proposing a new system that employs data science community such as normalization through the minmax algorithm, feature selection through the chi square method, planning to separate the data by the Gaussian kernel and then approaching to employ two machine learning models. Yaseen Khan Zaid Haroon Jan V. Nagaveni 2019-12-01 2019-12-01 7