Open Access Original Research Article

Numeric Guess a Guessing Game for Mind Tests

S. Dorin Christa, M. S. Hiruni Peiris, P. Shouthiri

Asian Journal of Research in Computer Science, Page 47-58
DOI: 10.9734/ajrcos/2021/v9i230219

In the modern world, all technologies have reached, their level of perspective especially computer technology has reached the maximum level. Nowadays, the game application plays a major role in everyone's life. Day by day, Gaming applications and the gaming industries are becoming more and more fashionable. This article aims to create, design and develop a Computer Game named as Numeric Guess, a guessing game to test the mind, which should be entertaining, relaxing, interesting and very pleasant to play during leisure as well as during moments of relaxation. The Numeric Guess is a game for desktop computers. A guessing game is a game that, as an object, can find or discover some kind of information. Similarly, The Numeric Guess is a guessing game, which will randomly fix a number within a known range, and then the player that the person who played the game wants to guess the number in limited trials. In this game, the player can choose the default range, or the user selection range to play. The game application was implemented by Java programming language using eclipse in java with tools like JFrame and the windows application to build the interfaces. Photoshop used to change the background of the interfaces. The if-else instruction mainly used for programming and JOptionPane for the input string as well as the popup messages. This Numeric Guess game is the most exciting and competitive game for the adults as well as the children do. This article study assesses the use of java language to develop a simple and challenging game.

Open Access Review Article

Comparison of Software Defined Networking with Traditional Networking

Saad H. Haji, Subhi R. M. Zeebaree, Rezgar Hasan Saeed, Siddeeq Y. Ameen, Hanan M. Shukur, Naaman Omar, Mohammed A. M. Sadeeq, Zainab Salih Ageed, Ibrahim Mahmood Ibrahim, Hajar Maseeh Yasin

Asian Journal of Research in Computer Science, Page 1-18
DOI: 10.9734/ajrcos/2021/v9i230216

The Internet has caused the advent of a digital society; wherein almost everything is connected and available from any place. Thus, regardless of their extensive adoption, traditional IP networks are yet complicated and arduous to operate. Therefore, there is difficulty in configuring the network in line with the predefined procedures and responding to the load modifications and faults through network reconfiguring. The current networks are likewise vertically incorporated to make matters far more complicated: the control and data planes are bundled collectively. Software-Defined Networking (SDN) is an emerging concept which aims to change this situation by breaking vertical incorporation, promoting the logical centralization of the network control, separating the network control logic from the basic switches and routers, and enabling the network programming. The segregation of concerns identified between the policies concept of network, their implementation in hardware switching and data forwarding is essential to the flexibility required: SDN makes it less complicated and facilitates to make and introduce new concepts in networking through breaking the issue of the network control into tractable parts, simplifies the network management and facilitate the development of the network. In this paper, the SDN is reviewed; it introduces SDN, explaining its core concepts, how it varies from traditional networking, and its architecture principles. Furthermore, we presented the crucial advantages and challenges of SDN, focusing on scalability, security, flexibility, and performance. Finally, a brief conclusion of SDN is revised.

Open Access Review Article

Application of Neural Network Algorithm in Optimal Control of Ethylene Distillation Tower

Ruyang Mo, Huihui Wang

Asian Journal of Research in Computer Science, Page 19-29
DOI: 10.9734/ajrcos/2021/v9i230217

For some nonlinear dynamic systems with uncertainties or disturbances, neural networks can perform intelligent cognition and simulation on them, achieve a good system description, and further realize intelligent control. Aiming at the ethylene rectification process, in order to avoid the time delay of complex rectification process modeling and large-scale process simulation software interface program, and to improve the simulation operation speed, the optimization model combined with the learning function of the neural network is used for the simulation calculation of the rectification process. It can meet the time and accuracy requirements of online optimization. This article outlines several commonly used neural network algorithms and their related applications in ethylene distillation, aiming to provide reference for the development and innovation of industry technology.

Open Access Review Article

Attack and Anomaly Detection in IoT Networks using Machine Learning Techniques: A Review

Saad Hikmat Haji, Siddeeq Y. Ameen

Asian Journal of Research in Computer Science, Page 30-46
DOI: 10.9734/ajrcos/2021/v9i230218

The Internet of Things (IoT) is one of today's most rapidly growing technologies. It is a technology that allows billions of smart devices or objects known as "Things" to collect different types of data about themselves and their surroundings using various sensors. They may then share it with the authorized parties for various purposes, including controlling and monitoring industrial services or increasing business services or functions. However, the Internet of Things currently faces more security threats than ever before. Machine Learning (ML) has observed a critical technological breakthrough, which has opened several new research avenues to solve current and future IoT challenges. However, Machine Learning is a powerful technology to identify threats and suspected activities in intelligent devices and networks. In this paper, various ML algorithms have been compared in terms of attack detection and anomaly detection, following a thorough literature review on Machine Learning methods and the significance of IoT security in the context of various types of potential attacks. Furthermore, possible ML-based IoT protection technologies have been introduced.

Open Access Review Article

Smart Android Graphical Password Strategy: A Review

Guhdar Yousif Izadeen, Siddeeq Y. Ameen

Asian Journal of Research in Computer Science, Page 59-69
DOI: 10.9734/ajrcos/2021/v9i230220

In recent years, when users across the world have embraced smart devices in greater numbers owing to recent advances and appealing applications, they have also become a target for criminals who are zealously attempting to breach protection. As a result, a significant number of attacks have been observed on these systems. As a result, several password-based authentication mechanisms have been proposed to counteract these attacks. Among them, the graphical password scheme is more consistent with smart devices, which are highly graphic-oriented. However, current graphical password schemes are vulnerable to a variety of assaults, including shoulder surfing, smudging, intersection attacks, and reflection attacks. Thus, the paper aims to review recent published papers on android smart phone graphical password and identify used techniques. Moreover, the paper analyzes results to give better understanding for users of such devices to protect their devices from unauthorized access and attacks.