Volume 12 ~ Issue 4

Cover Page Index Page

A Study on Project Management in Software Engineering
Tapas Ranjan Baitharu, Satyajit Mohapatra, Abani Kumar Bisoi
Download Full Paper
ABSTRACT
The software industry is crucial in developing countries due to its value addition and high value. However, poor project management, particularly in developing countries, is a significant issue. This study focuses on planning for project success. This study explores the role of planning in software projects, focusing on planning factors, planning performance, and project outcomes. Planning factors include human, management, and technical aspects. Project outcomes are evaluated based on overall success, qualitative benefits, financial benefits, time, and costs. The framework suggests that project characteristics influence planning factors and performance. Smaller projects have better scheduling, budget excess, and intangible benefits. However, significant differences are mainly related to human factors, with foreign companies showing better project manager effort and customer involvement.
Keywords:- SPM, Project Planning, Risk management, Project staffing, Scheduling.

Examining the Rarity of Classes using Big Data
Sarbasri Sahoo, Abani Kumar Bisoi
Download Full Paper
ABSTRACT
In the field of machine learning, a class imbalance occurs when there is a statistically significant difference in the number of instances (majority) between the two classes. Class imbalance can cause datasets to be biased toward the majority (negative) class in Machine Learning algorithms. This can have detrimental effects if false negatives are penalized more heavily than false positives. We investigate class rarity in big data through two case studies in our paper, each using a unique combination of three learners (logistic regression, random forest, and gradient-boosted trees) and three performance metrics (area under the precision-recall curve, geometric mean, and area under the receiver operating characteristic curve). Our trials produced class rarity, an exceptionally high degree of class imbalance.
Keywords:- Big data, Class imbalance, Machine learning, Medicare fraud, POST Slowloris, Class rarity & under sampling.

Enhanced Data Security of Communication System Using Combined Encryption and Steganography
Sushant Kumar Panigrahi, Rosalin Mangaraj, Debasish Pradhan, Lopita Bisoi
Download Full Paper
ABSTRACT
Data security is crucial in daily life, as systems can be hacked, posing high risks to confidential files. This paper proposes a method for storing basic images, which are protected in composites using DWT wavelet transform. The encrypted image is hidden behind the encrypted image, and the system includes two algorithms for encoding and hiding, and returning and decoding the main image to its original state efficiently.
Keywords:- encryption, discrete wavelet transform, steganography, modulated image, hidden image

Ethical Hacking: Skills to Fight Cyber security
Deepak Kumar Biswal, Sudhir Kumar Das, Riyazuddin Khan
Download Full Paper
ABSTRACT
Ethical hacking education equips future information security professionals with the necessary skills to combat cyber security threats. This proactive approach, unlike most defensive technologies, is used by malicious hackers, making it a double-edged sword for businesses, schools, and individuals are all becoming reliant on the Internet and Internet of Things (IoT) devices.
Keywords:- Malicious hackers, Ethical hackers, Firewalls, Vulnerabilities

Face Identification Using Python
Jharana Paikray, Nibedita Chhatoi
Download Full Paper
ABSTRACT
The world's rapidly growing population is accelerating the development of technologies, leading to the creation of a face apperception app using machine learning to detect people's faces, track terror activities, and capture unwanted faces. Face detection is a phase where identifying the faces from the images or video sources. It very well may be utilized for remote distinguishing proof administrations for security in regions.
Keywords:- Machine Learning, Haar Cascade, Open CV, Database, Criminal Record

An Investigation into the contribution of Web Technology to University Academics' increased pursuit of Research
Jitansu Sekhar Patra, Nibedita Chhatoi, Nilambar Suanani
Download Full Paper
ABSTRACT
This study set out to assess how web technologies can encourage university instructors to pursue research, look into how teachers use web technologies for research, and pinpoint the issues facing higher education when it comes to employing web technologies for research. The study's scope was restricted to social science faculty in Pakistan's Punjab Province universities. Two groups of people were included in the study: academic leaders such as department heads and deans, as well as university instructors. Using a random selection technique, 200 university teachers and 25 academic heads made up the study's subjects. For the purpose of gathering data, two 5-point Likert scale questionnaires were created. Pilot testing was used to validate the study instruments.
Keywords:- Web Technology, Research Pursuance, University Academia, Academic Heads, Research Skills.

Applications and Challenges of Big Data Analytics
Laxmidhar Panda, Rati Ranjan Sahoo
Download Full Paper
ABSTRACT
The term "big data analytics" describes data sets that are too large in number and create at a high pace of variation. Thus, the term "big data" refers to these data sets. They are challenging to manage with conventional techniques because of their expensive nature, imprecise algorithms, and numerous other issues. Numerous fields generate data, and the usage of the internet has led to a growth in it. There are three types of big data: semi-structured, unstructured, and structured.............
Keywords:- big data, problems, applications, challenges, big data analytics.

KAGN: Attentiveness driven by knowledge Also used for social media rumor detection are graph convolutional networks
Prakash Chandra Jena, Sarmistha Palai, Jharana Paikaray
Download Full Paper
ABSTRACT
Given how quickly online and social media platforms are developing, rumours have drawn a lot of attention. The public at large, the government, and social media companies are becoming increasingly concerned about the automatic identification of rumour from posts. While neglecting knowledge entities and concepts concealed within the article that aid in rumour detection, the majority of current approaches concentrate on the language and semantic components of postings' content............
Keywords:- social media, Graph convolutional networks, knowledge graphs, attention, and rumor detection.

Future Directions for Semantic Web Technology
Rosalin Mangaraj, Sunil Kumar Panigrahi
Download Full Paper
ABSTRACT
Numerous fields have shown interest in the semantic web and its technology. They are able to consistently and logically link and arrange data over the internet. Semantic web technologies, which include OWL, RDF schema, and rule and query languages like SPARQL, will aid in the problem-solving of diverse areas. The first part of this review paper examines the requirements and nature of the semantic web. All ten domains that are closely related to the semantic web and its technologies have been taken into consideration. We have divided the paper into three main contributions for easier comprehension. Initially, we examine the semantic web and the domains that contribute to its expansion. Second, we talk about every domain.
Keywords:- Semantic Web, OWL, SPARQL, linked data, ontology

A Prototype Modelling of a System for Smart Irrigation in Agriculture
Rati Ranjan Sahoo, Jharana Paikaray, Sagar Ray
Download Full Paper
ABSTRACT
Agriculture plays an important role in the development of food production in India Agriculture in our country depends on monsoon which is not an adequate source of water. So irrigation is used in agriculture. Internet of Things (IoT) is a milestone in the development of technology. IOT plays an important role in many fields, one of which is agriculture, in order to feed billions of people on the planet in the future. This paper aims to overcome this challenge, the entire system is based on micro control and can be managed remotely..........
Keywords:- Smart Irrigation, Sensors, Wi-Fi, ZigBee communication, micro controller ESP 32.

Review on Cyber-security
Subhadra Biswal, Jharana Paikaray, Biswajit Tripathy, Sujata Behera
Download Full Paper
ABSTRACT
A qualitative study conducted in Korea reveals that businesses use security techniques to protect their information systems, with a focus on preventing security threats using technological countermeasures. The study found a deep-rooted preventative mindset driven by the desire to ensure technology availability and a lack of awareness of enterprise security concerns. The research agenda for deploying multiple strategies across an enterprise includes combining, balancing, and optimizing systems. Nine security strategies were identified, and a qualitative focus group approach was used to determine their use in organizations. Many organizations use a preventive approach to keep technology services available, while some other methods support the prevention strategy on an operational level.
Keywords:- Cybersecurity; Cyberspace; Cyber terrorism.

IRJES Authors

Scroll to Top