https://www.i-scholar.in/index.php/ijocs/issue/feedIndian Journal of Computer Science2023-07-13T10:34:27+00:00Mrs. Satya Gilanieditor@indianjournalofcomputerscience.comOpen Journal SystemsIndian Journal of Computer Science (ISSN 2456 - 4133; indexed in Indian Citation Index, Google Scholar among others) is a bi-monthly journal that provides a platform to professionals, graduates, engineers, academics, and researchers in all areas of Computer Science to share research achievements, their perspectives, practical experiences, as well as disseminate information on state-of-the-art techniques in the field of Computer Science and related topics such as e-governance, online consumer behaviour, and technology-enabled business. The journal aims to fill the gaping hole that exists in the field of research related to computer science in India and other developing countries.https://www.i-scholar.in/index.php/ijocs/article/view/222517Drishti : Real-Time Object Recognition for the Visually Impaired2023-07-13T10:30:11+00:00Hitanshu Parekhhitanshuparekh72@gmail.comNiyati Agarwalniyatiagarwal061101@gmail.comPranav Bangerapranavbangera18@gmail.comRoger D’souzarogerds31@gmail.comGrinal Tuscanogrinaltuscano@sfit.ac.inIn 2017, the World Health Organization (WHO) reported that nearly 284 million individuals worldwide experienced some degree of visual impairment, with approximately 39 million individuals suffering from total blindness. People with visual impairments often rely on assistance from others or use canes to move around and identify obstacles. Our proposed system aims to aid the visually impaired by identifying and classifying common objects in real-time, as well as recognizing text from various sources such as documents and signs. This system provides voice feedback to enhance understanding and navigation, and utilizes depth estimation algorithms to determine a safe distance between objects and individuals, promoting self-sufficiency and reducing dependence on others. We employ the COCO image dataset, which contains everyday objects and people, and utilize the Mobilenet SSD algorithm for real-time object identification. To enable real-time Optical Character Recognition (OCR) Text-To-Speech functionality, we employ advanced technologies such as OpenCV, Python, and Tesseract for text detection and recognition, and the Pyttsx3 library for converting recognized text into audible speech. Our proposed system is dependable, affordable, realistic, and feasible.2023-04-01T00:00:00+00:00https://www.i-scholar.in/index.php/ijocs/article/view/222518Attack Detection and Prediction Using Machine Learning2023-07-13T10:31:51+00:00Vaishali Shirsathvaishali.shirsath@vcet.edu.inJainil Shahjainilshah.242001@gmail.comAjay Shahshahajay2712@gmail.comDevansh Shahdevanshshah3102001@gmail.comData plane and control plane are divided by Software Defined Networking (SDN). A centralized controller oversees and manages the entire network. With SDN, the network may be programmed and flow regulations can be created dynamically. Numerous benefits including adaptability, programmability, and centralized management are offered by this decoupling. However, SDN also creates new vulnerabilities as a result of desired data plane and control plane connectivity. Attacks on switch buffer overflows and control plane saturation are two examples of threats that exploit such flaws. The controller is vulnerable to Distributed Denial of Service (DDoS) attacks, which induce resource exhaustion and impair the controller's capacity to provide services. By flooding the control plane with TCP SYN packets from the data plane (i.e., switches), several attacks can be launched. SVM is the most popular and often used classifier, both for classification and regression, thanks to its high accuracy and low false positive rate. For DDoS detection, the SVM classifier is examined and contrasted with other classifiers. In order to identify anomalies, such as malicious traffic, and report them, Snort, an intrusion detection system, examines the traffic and packets. The entropy approach is used to assess the flow data's randomness. An IP address for the intended recipient and a few TCP flag attributes make up the entropy information. We implement it as an additional module in the Floodlight Controller and assess its viability and efficacy. We thoroughly evaluate how we have implemented things via Mininet, substantial emulation.2023-04-01T00:00:00+00:00https://www.i-scholar.in/index.php/ijocs/article/view/222519An Analysis of the Usage of Various Programming Languages to Classify Whether they are Relevant, Extinct, or on the Verge of Extinction2023-07-13T10:33:23+00:00Apoorv Mohitmohitapoorv12@gmail.comSunaina Rustagisunainarustagi1101@gmail.comThe first modern high level general purpose programming languages appeared over seventy years ago. Since then, with the exponential increase in the usage of different types of computer software and developments in computer hardware, numerous high level programming languages have been created for various purposes, with each language having its own relative advantages and disadvantages. Usually, specific general purpose high level programming languages are appropriate for specific applications or problems because of the nature of capabilities of the languages such as efficiency, memory consumption, expressiveness, availability of compilers, and tools etc. Newer languages incorporate significant functionalities of older languages which may serve as an “inspiration” for it while introducing new features and functionalities. However, the creation of newer programming languages does not necessarily mean the obsolescence of older languages because of factors such as programming effort, familiarity, and popularity. However, their usage for newer and upcoming applications may eventually decrease and familiarity and popularity might consequently fade away with it. In this paper, we take a look at 38 different programming languages that have been invented and identify the least used programming languages to provide an overall estimate of the least used programming languages in today’s time and the programming languages on the verge of death2023-04-01T00:00:00+00:00https://www.i-scholar.in/index.php/ijocs/article/view/222520Cybersecurity Awareness Amongst Youth – A Survey in Delhi/NCR2023-07-13T10:34:27+00:00Vaishali Chawlavaishali.mcs18.du@gmail.comYatin Kapooryatin.mcs19.du@gmail.comTanya Chawlatanyachawla104@gmail.comCyberspace has become an integral part of modern society, especially in the last two decades. As the internet has rapidly progressed globally, the community of cyber users in cyberspace has widely expanded. One group of cyber users that is swiftly becoming active in cyberspace is the youth, particularly, school and college students. However, young cyber users are increasingly becoming the soft targets of cybercriminals. Taking cognizance of the rising cybercrime cases against young cyber users, this research study surveyed several schools and colleges in the Delhi-NCR region to assess the cyber awareness among students and academic professionals. It was found that most of the participants were not aware of ethical and safe digital practices. These observations are attributed to the poor application of initiatives to ensure cyber safety among school children, especially in developing countries like India. Based on the findings from the survey, this study provides suggestions and recommendations to various role-players involved in cyberspace to assure safe cyber behaviour.2023-04-01T00:00:00+00:00