https://milestoneresearch.in/JOURNALS/index.php/IJHCI/issue/feedInternational Journal of Human Computations & Intelligence2024-10-15T09:12:34+00:00Executive Editoreditor_ijhci@milestoneresearch.inOpen Journal Systems<p>International Journal of Human Computations and Intelligence (IJHCI) <strong>[ISSN:</strong> 2583-5696] is an <strong>Open Access</strong>, computer science archival journal on engineering and technology. IJHCI invites researchers to submit novel and unpublished research and surveys. The journal includes computer science domains such as artificial intelligence (AI), machine learning (ML), intelligent communication, data processing, human computer interaction (HCI) systems and much more. IJHCI is indexed and abstracted in Google Scholar, Research Gate, ProQuest, COPE.</p>https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/150Enterprise Network Design and Implementation2024-10-15T08:51:26+00:00Sanjana Rai B Sa@gmailc.ocmKushal Ta@gmail.comShashank B Na@gmail.comRohan T Ra@gmail.comNaveen Chandra Gowdaa@gmail.com<div><span lang="EN-GB">One kind of network intended for setting up an internet connection on an enterprise setup in a building is an enterprise network module. It acts as the company's cornerstone. The enterprise network's base is provided by the CCNA learning goals. A private or public network's construction requires the proper tools and procedures to ensure its dependability. Networks are important to organizations, especially virtual and wide area networks. In this article, we plan and implement new network services in a new building. This project is being implemented using Cisco Packet Tracer. A person who studies computer networking and technology gains knowledge of several subjects, such as IP address configuration, topology design, and data transmission.</span></div>2024-10-15T00:00:00+00:00Copyright (c) 2024 Sanjana Rai B S, Kushal T, Shashank B N, Rohan T R, Naveen Chandra Gowdahttps://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/151Smart Surveillance system using Gaussian Mixture Model2024-10-15T08:59:37+00:00Nihaal Abdul Baseers@gmail.comMohammed Samiuddina@gmail.comMD Imrana@gmail.comAnkur Deba@gmail.comNaveen Chandra Gowdaa@gmail.com<div><span lang="EN-GB">Surveillance systems are in huge demand and at best, a necessity in developed and developing communities. But with the rise in demand, a basic integrated system costs a significant amount. This is my attempt at creating an intruder detection system with the tools that are easily accessible and understanding and choosing between the different approaches to solving this problem. We also look at different ways you can better this to your personal preferences. As is, this is a perfect implementation for a general plug-and-play use case.</span></div>2024-10-15T00:00:00+00:00Copyright (c) 2024 Nihaal Abdul Baseer, Mohammed Samiuddin, MD Imran, Ankur Deb, Naveen Chandra Gowda