{"title":"THE CUTTING EDGE TECHNOLOGIES IN COMPUTER SCIENCE: A REVIEW","authors":"Mohammad Abdullah","doi":"10.26483/ijarcs.v14i1.6945","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6945","url":null,"abstract":"Technological gadgets, methods, and accomplishments that make use of the most recent and advanced IT advances are examples of cutting-edge technology. \"Cutting edge\" is a term commonly used to describe the most advanced and forward-thinking companies in the IT industry. The term \"cutting-edge technology\" is used to describe the most advanced and up-to-date technological features, as opposed to \"bleeding-edge technology,\" which is so novel that it presents risks to consumers. While the term \"technology\" is most often associated with computer and electronic devices, it can refer to advancements in virtually any field. The author of this paper has properly cited the most up-to-date cutting-edge research.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN AND OPTIMIZATION TECHNIQUES FOR FAULT TOLERANCE IN CLOUD COMPUTING","authors":"","doi":"10.26483/ijarcs.v14i1.6951","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6951","url":null,"abstract":"Cloud computing is a strong framework that helps individuals and organizations to acquire the care they deserve. Several more services are provided by the framework, including storage, deployment systems, and easy access to web services. Load balancing is a frequent problem in the cloud that makes it difficult to guarantee the reliability of apps adjacent to the QoS measurement and adhering to the SLA document as required from cloud services to companies. Cloud providers struggle to evenly distribute workload among servers. An effective LB method should optimize and achieve optimum user satisfaction by making better use of VM resources. Green loud computing has been shown to be an effective method for lowering energy use for data storage on clouds. An ant colony optimization ACO method is used to effectively construct cloud services. In this job, overburdened VM jobs and moved to another virtual machine for successful performance using the ACO method. The study findings demonstrated unequivocally that ACO based task scheduling in the cloud outperforms traditional methods by a time and cost saving of 18% to 20%.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131431721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ALGORITHM TO GENERATE GLOBAL ACADEMIC CLASS SCHEDULE","authors":"Md. Mizanur Rahman","doi":"10.26483/ijarcs.v14i1.6943","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6943","url":null,"abstract":"This paper describes an algorithm to generate global academic class schedule of an educational institution. In this method course teachers are assigned to courses manually. Rooms are also assigned with a further option which provides a searching technique for available rooms. This algorithm also considers the restrictions or conditions that define a specific period or a specific room for a particular teacher or for a particular course or for a particular batch/section. Depending on all assignments, restrictions and conditions global academic class schedule is generated automatically by this algorithm.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURE SOFTWARE DEVELOPMENT LIFECYCLE: A CASE FOR ADOPTION IN SOFTWARE SMES","authors":"Wisdom Umeugo","doi":"10.26483/ijarcs.v14i1.6949","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6949","url":null,"abstract":"Software is widely deployed and used for managing critical daily domestic, social, and economic activities. Due to software’s economic value, software is a high-value target of malicious actors and a primary source of many information security vulnerabilities. Software must be engineered to be secure because of its value. Traditional approaches to software security treat software as an addon and have been proven inadequate at producing secure software. Practicing the secure software development lifecycle (SSDLC) is recommended in academic literature. Software SMEs must adopt and practice the SSDLC for increased security of published software. This paper explores the SSDLC and makes a case for its adoption with the goal of informing security decision-makers of Software SMEs.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RESOURCE MANAGEMENT AND ALLOCATION IN FOG COMPUTING","authors":"Dr Radha Karampudi","doi":"10.26483/ijarcs.v14i1.6947","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6947","url":null,"abstract":"Smart objects are increasingly playing a crucial role in the daily operations of both industries and individuals. These devices collect data through various apps and sensors, leading to a significant accumulation of information across various sectors. The use of smart objects has grown exponentially with the advent of the Internet of Things (IoT). This has led to a significant increase in the amount of data being generated, including both structured and unstructured data. However, there are currently no effective ways to manage this data. Despite the significant advancements made in the field of IoT, incorporating cloud computing is still facing challenges such as latency, performance, network and security concerns of computing can address the challenges faced by cloud computing in the context of the Internet of Things (IoT) by bringing the cloud closer to the edge. The primary objective of fog computing is to process and store data collected by IoT devices locally on a fog node, rather than transmitting it to a remote cloud server. This approach results in faster response times and better quality of services compared to cloud computing. Fog computing is an effective solution to enable the IoT to provide reliable and secure services to a large number of IoT customers. Fog computing allows for the management of service and resource provisioning from outside of cloud computing, closer to devices, at the edge networks, or at locations specified by Service Level Agreements (SLAs). It is not intended to replace cloud computing, but rather to enhance it by enabling computation at the edge while still providing access to cloud data centers. It covers various computing frameworks, fog computing features, a comprehensive reference architectural style of fog with its multiple levels, a comprehensive study of fog with IoT, various fog system methodologies, and a thorough evaluation of the challenges in fog computing, which also serves as a middle layer between IoT sensors or devices and cloud data centers.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121837461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INCORPORATING A HONEYFARM WITH MLFFNN IDS FOR IMPROVING INTRUSION DETECTION","authors":"Dr. Loye L. Ray","doi":"10.26483/ijarcs.v14i1.6946","DOIUrl":"https://doi.org/10.26483/ijarcs.v14i1.6946","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STOCK MARKET FORECASTING USING CONTINUOUS WAVELET TRANSFORM AND LONG SHORT-TERM MEMORY NEURAL NETWORKS","authors":"José Alfredo Acuna-García","doi":"10.26483/ijarcs.v13i6.6919","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6919","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOFTWARE QUALITY PREDICTION USING MACHINE LEARNING TECHNIQUES AND SOURCE CODE METRICS: A REVIEW","authors":"Santosh Saklani","doi":"10.26483/ijarcs.v13i6.6918","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6918","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116260065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEEP LEARNİNG ARCHİTECHTURE FOR CLASSİFİCATİON OF BREAST CANCER CELLS İN FLUORESCENCE MİCROSCOPY IMAGES","authors":"A. Kakumani","doi":"10.26483/ijarcs.v13i6.6921","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6921","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}