Journal of Advances in Shell Programming
https://computers.stmjournals.com/index.php?journal=JoASP
<p align="center"><strong>Journal of Advances in Shell Programming (JoASP)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2395-6690</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoASP&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 6.128</p><p align="center"> </p><p><strong>Journal of Advances in Shell Programming (JoASP)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Shell Programming advances. It's a triannual journal, started in 2014.</p><p align="center"> </p><p align="center"><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoASP</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Shell commands & simple programming</li><li>Overview of TCP/ IP networking - basic concept of 4 layers</li><li>Overview of the UNIX/ LINUX</li><li>Simple filters grip command</li><li>Linux Administrators</li><li>UNIX programmers</li><li>Database (Oracle/Sybase)developers working on UNIX platforms</li><li>Database (Oracle/Sybase)Administrators</li><li>Loop Constructs</li><li>Condition Execution</li><li>Handling Run-Time Data</li><li>Integer Arithmetic</li><li>I/O Redirection features</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: JoASP</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong> </strong></p><p><strong><a href="/index.php?journal=JoASP&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p> </p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoASP&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong>Phone no.:</strong> 0120-4746-214 / Email: nikita@stmjournals.com</p><p> </p>en-USJournal of Advances in Shell Programming2395-6690<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>Secure File Storage over Inter Planetary File System (IPFS)
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2752
<em>Nowadays, a massive amount of data is created and manipulated on the internet. This data is stored on third-party cloud storage which is in a centralized manner; however, the centralized approach of centralized storage is not completely secured. On the latest technology, blockchain is decentralized cloud storage that ensures complete securing using a decentralized peer-to-peer network maximizing resource utilization where each node is connected on a peer network. In the proposed system, the user’s file is encrypted and stored across multiple peers using the Inter Planetary File System (IPFS) blockchain protocol. The hash value indicates the file stored on the network and the path of the file. This study focuses on secure file uploading on decentralized storage, efficient storage utilization, and high data availability</em>Mitesh MethaDnyanesh WaghuldeMonali Deshmukh2021-06-112021-06-118Human Retention using Data Science
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2751
<p><em>Employees are the backbone of any successful organization and hence employee retention is of utmost importance. Using Data Science, this research work seeks to assist HR and Project Managers in improving the retention rate of valued workers in an organization, thus lowering the company's employee turnover expense. Following extensive research into how to choose the most desirable employee and the application of methodological assumptions, performance was created using conditional logic statements to demonstrate which workers are valuable and which are not. The key goal of this project is to use the K-Nearest Neighbors algorithm and a Decision tree classifier to determine whether or not a company's employee will quit. We use the satisfaction level of an employee, the last evaluation of employee performance, the average monthly hours at work, and the number of years spent in the company, among others, as our features. The dataset was split, using 70% for training the algorithm and 30% for testing it, achieving an accuracy of 95% approximately. HR managers may use this application to make job retention decisions easier.</em><strong><em></em></strong></p>Sharayu KavitkarRutuja PowarDivyesh PatilShaila D. Pawar2021-06-112021-06-118Cloud Based Online Examination Portal using Docker
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2750
<em>Online examination portal is a cloud-based web application, which allows any industry or institute to arrange, conduct and manage examinations via an online environment. It can be done through the Internet/Intranet /Local Area Network environments. Some of the problems faced during manual examination systems are the delays occurred in result processing, filing poses a problem, and filtering of records is difficult. The chance of loss of records is high; also record searching is difficult. Maintenance of the system is also very difficult and takes lot of time and effort. Online examination is one of the crucial parts for online education system. It is efficient, fast enough and reduces the large amount of material resource. It proposes a plan to build a systematic, integrated, intelligent and extensible web application on the cloud computing platform such as Google cloud, Amazon web services by using the container-based Docker and Django framework.Cloud security means the set of control-based technologies which are designed to maintain the security and protect the information, data security and all the applications associated with it.</em>Nikhil TambeRahul SurwadeAbhijit MankarRina Bora2021-06-112021-06-118Nexus: A Social Media Application
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2689
<p><em>As the Android is the world class platform today and approximately used by 1.4 billion people in the world; hence, we have chosen the Android platform in the world of mobile development rather than choosing other platform like windows. We plan on exploiting this information to provide users with an application which will allow them to safely use a social platform without getting useless information or distractions as the application will be secure, privately owned, and the control of data and users is directly in the hands of admin.To summarize, this project provides its user a social media application which is owned by the organization or institute itself.</em></p>Fahad ChougleUbaid JalgaonkarPrithviraj BhoiteArchana Arudkar2021-06-112021-06-118Complete Evaluation of Superiority: Linux or Windows
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2744
<p><em>There are widely three major types of operating systems used for our desktop environment, viz. Windows, macOS, and Linux. Now out of these three, the most underrated as well as the most versatile at the same time with its different distributions for different usage is Linux. Linux is an operating system that is open source and free to use, unlike Windows and macOS. There is a wide range of people opting to switch from different Os to Linux, Hence, let us compare Linux with an Os that is used widely, Windows. So we understand its differences, similarities, and other aspects.</em></p>Ashish JaiswalTanvi Chavan2021-06-092021-06-098Analysis of Linux Shell Script and Shell Programming
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2667
<p align="center"><strong>Abstract</strong></p><p>The Linux shell scripting and shell programming rule are clarified in this investigation. A shell content is a program for the machine to run the Linux shell that is a translator of an order line. The various tongues of shell contents are known as dialects that compose. Regular shell content tasks incorporate record dealing with, execution of the program and printing of text. A shell script can enable a device functionality to be changed in a way that enables the new script to still function as a completely standard command when special environment settings, command options or post processing are implemented automatically. This paper also discusses the root of Shell Programming, and also examines and examines Shell Programme's programming Structures and creation highlights. In this article, it is also discussed how Shell Programming is useful for the Linux Shell in how many ways.</p>Satish Kumar AlariaAshish Raj2021-04-072021-04-078Using Shell Script Automize the Services of Server for Deployment
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2675
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Nowadays, every company is trying to produce their server and trying to automize their server. Many companies prefer a Linux-based server and those who are having a windows server are switching to Linux based server, the reason is that the Linux server is very secured, high speed, cost-efficient, and privacy is maintained on a Linux server. Big companies like Google, Twitter, Facebook, Amazon, IBM, NASA, McDonald’s, missiles and weapons, hackers are using Linux-based server. Many administrators perform some configuration manually but sometimes the server crashes then they have to do the same task again and again which is time-consuming. The purpose of this paper is to automate the manual work of the server so that if the server crashes then the shell script will run by itself and do the several manual processes by itself in less time. Very little time is required to run the shell script to run, within 50 to 60 seconds shell script will run and perform the task. This proposed system will reduce the workload and solve the problem. </em></p>Sujata BhairnallykarAnjali D. JaiswalKunal R. MoreAnanya V. Kamalapur2021-04-072021-04-078Simulation of Image Processing using Linux Operating Systems
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2674
<p align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>Image processing and restoration through a base image can provide useful information about the scene, such as saliency and depth map. We first apply the geometric transformation algorithm for restoration of the blurred image. As suggested in the base paper that the geometric analysis will provide us the fine feature available in the image, we have utilized this algorithm for the purpose of image restoration. Measuring the amount of blur globally and locally is an important issue. It can help us in eliminating the spatially changing haze and upgrading the visual nature of the imaging framework yields. While advanced imaging frameworks have been generally utilized for some, applications including customer photography, microscopy, aeronautical photography, galactic imaging, and so forth, their yield pictures/recordings regularly suffer from spatially fluctuating haze brought about by focal point, transmission medium, post handling calculations, and camera/object movement.</em></p>Abhijeet SinhaAnkita Sharma2021-04-072021-04-078Study of Smart Device Based on Client–Server Communication on Linux using Socket Programming in ‘C’
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2673
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Smart device is an intelligent hardware that has more smart features. When a normal hardware is implementing on IOT, then a new hardware is developed in the form of smart hardware. When smart hardware is connected to a secure operating system as Linux, the hardware is more secure, then hardware is known as smart device. The mainly four components of Linux as utility, shell programming, kernel and hardware for develop a structure of Linux. This work discussed the smart devices, Linux OS with components, client–server model and socket programming briefly, and discussed the review of literature related to this work. In this paper, we implemented client and server on Linux using socket programming in C and then communication is success for message interchange using inter-process communication.</em></p>Vinay BhattAmit Bindal2021-04-072021-04-078Linux Shells Fundamentals
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2672
<p align="center"><strong><em>Abstract</em></strong><strong></strong></p><p><em>Linux is a Unix-like open-source operating system characterized by its distinctive Linux kernel. Linux shell is a command interpreter that supports the user to execute commands and utilities in both Linux and Unix-based operating systems. This paper represents the working of different Linux shells along with relevantly stating the efficiency provided by those shells and received by the users. Along with their contrasting feasibility and performance. Also, with the availability of a variety of different types of users, preferred shell types along with their functionality has also been listed. Conclusively, this paper also discusses whether having a shell is needed in Linux.</em></p>Tanvi Chavan2021-04-072021-04-078Linux—the Operating System
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2671
<p align="center"><strong><em>Abstract</em></strong><strong></strong></p><p><em>The hottest and the most underrated operating system ever is none other than the Linux. We just listen to Linux as an operating system but not to use, because often we are not sure about the usability factors and features of Linux to use it efficiently. Let us discuss Linux and see about it for what kind of usability and what kind of people can use it. Also, a comparison with the other operating system shall give us an in-depth knowledge on Linux in comparison with other operating systems currently being used at large scale apart from Linux.</em></p>Ashish Jaiswal2021-04-072021-04-078Storage Management in Shell Programming
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2531
<p>We propose an extreme re-design of the conventional operating system storage stack to get the piece off the data path. Utilizing virtualized I/O equipment for circle and glimmer stockpiling, most peruse and compose I/O tasks go legitimately to application code. The bit progressively distributes degrees, deals with the virtual to physical authoritative, and performs name interpretation. The advantage is to significantly diminish the CPU overhead of capacity tasks while improving application adaptability.</p><p>Keywords: Shell, Kernel , Applications, technology, programming</p><p>Cite this Article: T. Velumani. Storage Management in Shell Programming. Journal of Advances in Shell Programming. 2020; 7(2): 11–17p.</p>T. Velumani2020-08-122020-08-128UNIX Operating System and Improvement of the Password Authentication Technique
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2530
<p>The UNIX operating system is an operating system that safeguards against illegal access and other threats to the computer system. In this paper, the UNIX file system is analyzed, the security weaknesses are x-rayed, an improved on-time password authentication technique is presented, and the underlying model used for the design is described. Moreover, a password authentication programme was designed which implements an improvement of the general one-time password technique. Passwords, which are individually selected by users from a codebook are now randomly selected by the system for the user in the improved programme. Real-data entries into the programme demonstrate an enhancement of the security of the system even on the event of the loss of the codebook.</p><p>Keywords: Authentication, codebook, simulation access control, one time password technique.</p><p>Cite this Article: T. Velumani.UNIX Operating System and Improvement of the Password Authentication Technique.Journal of Advances in Shell Programming. 2020; 7(2): 24–32p.</p>T. Velumani2020-08-122020-08-128Eyes on the Prize: A History of the Evolution of Video
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2505
<p>From its early beginnings to modern day, video has evolved from a niche experiment involving the capture of motion to a popular medium used everyday around the world. Simply put, video matters, and it will only continue to evolve and grow in both popularity and prominence in the future.</p><p>Keywords: Video, History, Cinema, Film, Television, Technology</p><p>Cite this Article: James P. Embrey. Eyes on the Prize: A History of the Evolution of Video.Journal of Advances in Shell Programming. 2020; 7(2): 1–5p.</p>James Embrey2020-08-122020-08-128Phishing Website Detection
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2528
<p>As another type of malevolent software, phishing websites show up much of the time as of late, which cause extraordinary damage to online budgetary administrations and information security. In this paper, we plan and execute an insightful model for recognizing phishing sites. In this model, we remove 10 distinct kinds of highlights, for example, title, watchword and connection text data to speak to the site. Heterogeneous classifiers are then assembled dependent on these various highlights. We propose a principled gathering arrangement calculation to consolidate the anticipated outcomes from various phishing identification classifiers. Various leveled bunching method has been utilized for programmed phishing classification. Contextual investigations on huge and genuine day by day phishing sites gathered from Kingsoft Internet Security Lab exhibit that our proposed model beats other generally utilized enemy of phishing strategies and instruments in phishing site location.</p><p>Keywords: phishing, website, technology, hierarchical clustering, URL</p>Cite this Article: Kaustubh Jadhav, Vaibhav Dingankar, Praveen Shinde. Phishing Website Detection.Journal of Advances in Shell Programming. 2020; 7(2): 6–10p.Kaustubh JadhavVaibhav DingankarPraveen Shinde2020-08-062020-08-068Remote Disk Booting
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2529
<p>Now-a-days, the traditional disk-full technology will be replaced by the disk-less technology because of its advantage such as controlling from the central control system, managing large number of computer systems, reducing the redundancy of computer systems, reducing the energy consumption and costs. This project aims at creating a system for centralization of IT resources of an organization by building upon the concept of disk less booting. Disk-less technology provides a disk-less or system-less environment for client machines(workstations). It works on Debian, Ubuntu, Red Hat, Fedora, CentOS and SuSE. Diskless Remote Boot uses distributed hardware resources and makes it possible for clients to fully access local hardware. It also uses PXE/Ether-boot, NFS, NIS to provide service to client machines so that it is not necessary to install GNU/Linux on the client hard drives individually. Client stations will contain only RAM for executing the required tasks. The network will consist of a Dynamic Host Configuration Protocol (DHCP) server will assign each of client stations with an IP address.To maintain security, Security Hash Algorithm (SHA) is used to encrypt sensitive data by creating a hash value for any kind of data, for example passwords and is unique for every input. Individual ports and services can be secured by keeping them under the control of a firewall. To maintain security, Security Hash Algorithm (SHA) is used to encrypt sensitive data by creating a hash value for any kind of data, for example passwords and is unique for every input. Individual ports and services can be secured by keeping them under the control of a firewall.Individual filesor folders can be secured as per requirement by employing SELINUX. The target referencefor SELINUX can be different for different files hence, it can provide extensive control. Thesystem would also contain a Graphical User Interface (GUI). The main aim is to provide convenience and user friendliness with the functionalities like administrator login or logout or settings, Memory Management (Add or Release memory) and User management (Add or Delete users).</p><p>Keywords: Linux based disk, disk-less booting, disk-less client, client station, client machine, operating system, hard disk, working framework, boot ROM, advanced OS deployment, system administration, DHCP, PXEBoot, NFS, NIS, TFTP.</p>Cite this Article: Prasad Vijay Jogale, Siddarth Rao, Ketan Tandel, Diksha Gautam Kumar. Remote Disk Booting. Journal of Advances in Shell Programming. 2020; 7(2): 18–23p.Prasad Vijay JogaleSiddarth RaoKetan TandelDiksha Gautam Kumar2020-08-062020-08-068Secured Mail Server with (3FA) Three Factor Authentication for Web-based Cloud Services
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2451
<p>A more secure way is to use three-factor authentication (3FA). 3FA is very common among web-based e-mail sharing services. In addition to a username/password, the user is also required to have a device to display a one-time password and finger print. Some systems may require the user to have a mobile phone while the one-time password will be sent to the mobile phone through SMS during the login process. By using 3FA, users will have more confidence to use shared computers to login for web-based e-banking services. For the same reason, it will be better to have a 3FA system for users in the web-based cloud services in order to increase the security level in the system. This application also provides service secured webmail server to send and receive emails within an organization. Using this system, the user can transmit mail in a secure manner. The hackers cannot break the information. When composing, the mail is encrypted by using symmetric algorithm and it will store on a web server. If the hackers try to crack this mail he can’t open and read the original message on a mail, only the responsible user can get the mail by means of decrypting.</p><p>Keywords: OTP, Fingerprint, Hackers, Webmail, Authentication</p><p>Cite this Article: T. Velumani. Secured Mail Server with (3FA) Three Factor Authentication for Web-based Cloud Services. Journal of Advances in Shell Programming. 2020; 7(1): 33–40p.</p>T. Velumani2020-06-022020-06-028Imaging Technologies in Breast Cancer Screening Beyond Mammography
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2450
<p>There is a passionate debate in medical world about the best screening method for breast cancer. Early detection is an effective way to diagnose and manage breast cancer. Mammography is the most widely used screening modality, with solid evidence of benefit for women aged 40 to 74 years. Even then it has also undergone increased scrutiny for false-positives with additional testing which increase radiation dose, cost and anxiety. False-negatives with false sense of security and potential delay in cancer diagnosis. To overcome these challenges, new imaging technologies for breast cancer screening have been developed, including; X-ray mammography, contrast enhanced mammography, digital mammography, ultrasound, automated whole breast ultrasound (AWBU), and magnetic resonance imaging (MRI) are being evaluated. The purpose of this paper is to provide an overview of different medical imaging techniques used in the diagnosis of breast cancer. We compare their effectiveness, advantages, and disadvantages for detecting early-stage breast cancer. We mainly focusing on the comparison of these technologies with mammography for the diagnosis of breast cancer. Here, we recommend digital mammography is the best available screening method for the early detection of breast cancer. Even though the optimal screening will ultimately require a personalized approach. It based on the metrics of cancer risk with selective application of specific screening technologies best suited to the individual’s age, risk, and breast density.</p><p>Keywords: Breast cancer, mammography, X-ray mammography, contrast enhanced mammography, digital mammography, ultrasound, automated whole breast ultrasound (AWBU), magnetic resonance imaging (MRI)</p><p>Cite this Article Anoop Sreekumar R.S., Sam Abraham. Imaging Technologies in Breast Cancer Screening Beyond Mammography. Journal of Advances in Shell Programming. 2020; 7(1): 22–32p.</p>Anoop Sreekumar R.S.Sam Abraham2020-06-022020-06-028Implementation of Shell Programming Scripts with Features
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2449
<p>A shell programming is a PC program intended to be controlled by the Unix shell, a command-line interpreter. The different vernaculars of shell contents are viewed as scripting dialects. Tasks performed by shell contents incorporate record control, program execution, and printing content. A content which sets up nature, runs the program, and does any fundamental cleanup, logging, and so on is known as a wrapper. The expression is additionally utilized all the more for the most part to mean the computerized method of running a working framework shell; in explicit working frameworks they are called different things, for example, group documents (MSDos-Win95 stream, OS/2), order techniques (VMS), and shell contents, and centralized computer working frameworks are related with various terms. The common Unix/Linux/POSIX-agreeable establishment incorporates the KornShell (ksh) in a few potential forms, for example, ksh88, Korn Shell ‘93 and others. The Microsoft Windows and Linux PC operating systems are a long-running conversation point inside the PC business. All through the whole time of the Windows 9x systems through the presentation of Windows 7, Windows has held an incredibly huge retail deals greater part among working frameworks for individual work area use, while Linux has supported its status as the most conspicuous Free Software and Open Source working framework. After their underlying conflict, both working frameworks moved past the client base of the PC market and offer a competition on an assortment of different gadgets, with contributions for the server and implanted frameworks markets, and mobile internet access.</p><p>Keywords: Linux, Unix, Shell, Korn Shell, Bash Systems, grep, ALGOL, awk</p><p>Cite this Article T. Velumani. Implementation of Shell Programming Scripts with Features. Journal of Advances in Shell Programming. 2020; 7(1): 14–21p.</p>T. Velumani2020-06-022020-06-028Role of Information Technology in Solving Environmental Problems in Kabul, Afghanistan
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2399
<p>Technology causing some environmental problems, it also one of the best tools we have available to the people to help us understand how we can fix these environmental problems. Computers, mobiles and other information systems are available to people in the prediction of natural and technological events that affect the environment. The paper is an assessment of how efficiently information technology (IT) is used in the Kabul, Afghanistan, physical environment. It outlines mainly the procedures of environmental management in Kabul, Afghanistan, in relation to the use and application of computer models, geoinformatics and scientific techniques in environmental management. Environmental management bodies in Kabul, Afghanistan, served as the study population and results obtained. The research employed the use of questionnaire and interview, the method of analysis data is descriptive. The study promotes an objective evaluation of how well environmental agencies, management and equipment are executing, with the aim of safeguarding the environment. So, the main objective of this research is to find the positive effects of technology for safeguarding of environment.</p><p>Keywords: safeguarding of environment, environment problem, information technology, environment organization, Kabul, Afghanistan.</p><p>Cite this Article Mohammad Salem Hamidi. Role of Information Technology in Solving Environmental Problems in Kabul, Afghanistan. Journal of Advances in Shell Programming. 2020; 7(1): 8–13p.</p>Mohammad Salem Hamidi2020-06-022020-06-028A Similarity Analysis between Linear Multiracial Feature and Non-linear Multiscale Texture in Detection and Segmentation at Brain Tumor
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2448
<p>The panorama of the stochastic model, i.e., Random model, is called cancer. In that cancer contain benign and malign cells among that the vulnerable is rapid growth of malign cells lead to jeopardy. According to existing system the MRI fetches with multiresolution fractal (linear) model known as multi-fractional Brownian motion method but the flavor of proposed system may be interesting to keep contourlet transform and genetic algorithm for feature selection and tumor detection which is better than that of wavelet transform, and it measures the discontinuity also, whereas the wavelet cannot do.</p><p>Keywords: Linear and non-linear multiracial, detection, segmentation, brain tumor, cancer, contourlet transform, genetic algorithm</p><p>Cite this Article Anoop Sreekumar R.S., Albin Jose S. A Similarity Analysis between Linear Multiracial Feature and Non-linear Multiscale Texture in Detection and Segmentation at Brain Tumor. Journal of Advances in Shell Programming. 2020; 7(1): 1–7p.</p>Anoop Sreekumar R.S.Albin Jose S.2020-06-022020-06-028Towards the Development of Low Cost Calibration Apparatus for 3D Reconstruction of Spine
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=273
<p>Three-dimensional reconstruction of the human spine is very much essential in diagnosis, planning of surgery and treatment of several spinal deformities. This can be achieved using stereo-radiographic methods. Calibration of a stereo-radiographic setup is a necessary step in this process. It provides metric information from 2D images. Many calibration methods that are available in literature result in cumbersome calibration objects. Hence difficult to use in the clinical valuation of spinal deformities. 3-D reconstruction without calibration or with small calibration objects is considered to be unreliable. It also results in large reconstruction errors. A review of different calibration techniques is performed and compared. The best suitable technique is proposed which gives least reconstruction error and produces minimum undesirable objects in radiographs.</p>Sampath KumarVinyas k.2020-01-272020-01-278An Introduction of Smart Self-learning Shell Programming Interface
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=242
<p>To manage computer systems, the command line interfaces are heavily in use by computer administrators. Therefore, such tasks require a prerequisite know-how of the programming interface. Often, such tasks desired for automation requires repetitive coding and heavy interdependencies on certain logical input-output co-relation. Due to this criticality it is required that such automation of system administration jobs are often supervised manually. This paper presents an intelligent programming interface to help in jobs of automating system administration by fast paced coding with adaptive level learning and simultaneously supervising the procedural execution in logically multi-relational basis.</p>Ankush Rai2020-01-272020-01-278Secure Two Party Computation
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2383
<p>The author investigated the flaws with two-party computation over a cloud or parallel services for an encrypted data which can be easily accessed by any efficient shell programmer. Generally, the computation with the slaves and the master enables the store-to-store data locally, even that may be a constant amount of data and thereby we have found that the third parties can remotely access the n amount of data items, while ensuring that the identities of the items are kept hidden. Hence, in this short communication the author presented a patched protocol for hidden scalable computational environment to safeguard its computing data from outside interventions.</p><p>Keywords: Secure computational communication, encryption protocol</p>Ankush Rai2020-01-272020-01-278Automation in Computation Over Linux Integrated Environment
https://computers.stmjournals.com/index.php?journal=JoASP&page=article&op=view&path%5B%5D=2381
<p>The challenges of building an automated computational system for an effective controller<br />of job scheduling and execution of computational tasks in heavy computing research<br />projects, either requires external controllers or must function within the restriction bound<br />of the utility service offered by APIs. We address the problem of the automation in<br />computation over a Unix environment using effective shell programming techniques. The<br />approach is mainly based on dividing computational jobs by explicitly reducing the<br />problem to the satisfiablity through strings of feedback control policies for a variety of<br />services.</p><p>Keywords: Automation, Computation, Linux Shell, Dynamic Programming.</p>Ankush RaiSiddarth Choubay2020-01-272020-01-278