https://computers.stmjournals.com/index.php?journal=JoOSD&page=issue&op=feedJournal of Open Source Developments2021-06-14T12:13:35+00:00Princeprince.editor@celnet.inOpen Journal Systems<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table><p align="center"><strong>Journal of Open Source Developments (JoOSD)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2395-6704</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoOSD&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 6.078<strong></strong></p><p><strong> </strong></p><p><strong>Journal of Open Source Developments (JoOSD)</strong> is a journal focused towards the rapid publication of fundamental research papers on Open Source Development.</p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoOSD</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Tools of open source development</li><li>open source software projects, products, and processes</li><li>Open source software artifacts and open source communities</li><li>Economic analyses of open source</li><li>Legal aspects of open source software</li><li>Bug trackers and task lists</li><li>Version control systems</li><li>Methodology and data sources</li><li>Watermarking Techniques</li><li>Watermarking Methods</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: JoOSD</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong> </strong></p><p><strong><a href="/index.php?journal=JoOSD&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p align="center"><strong> </strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoOSD&page=about&op=editorialTeam">Editorial Board</a></span></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p>https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2731Women Self Help Group For Record Maintaining2021-06-14T12:13:35+00:00Divyasree Adivya123ms02.01@gmail.comAbarna Kdivya123ms02.01@gmail.comIndhumathi Sdivya123ms02.01@gmail.comMythili Tdivya123ms02.01@gmail.com<h2 align="center"><strong>Abstract</strong></h2><em>A women’s self group is a website where any women can be benefited by either joining this group or creating their own group. The group head can add and remove group members and also performs necessary management operations. All the records of the group can be well organized and maintained. This website will be really helpful for women who are running women’s self group with the benefit of automating everything and performing their group activities. Unfortunately the existing system has some security issues and operating slowly while handling huge amount of data. So, the objective of the present study is to help females with record maintaining and loan management; to save time by automating the whole system of women’s self group; and to help all the women who need financial support, by giving loans</em>2021-06-14T12:12:37+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2732UML Designing Tools: A survey2021-06-14T12:13:35+00:00Babita Bhagatbbhagat@mes.ac.in<p>Nowadays many equipment can be seen in the marketplace to assist constructing system. Thus for selecting the best equipment we have to recognize the maximum essential functions of it. Today, UML never forget as a de facto preferred in software program improvement and is used in lots of domain names starting from medical modeling to commercial enterprise modeling. Here, this study describes the maximum used UML equipment. It defines the principle functions of every one, after which comparison is done amongst them by keeping their functions in knowledge. It additionally defines the standards for selecting the best device in constructing system. Some equipment are used at helping precise life-cycle phases; however they regularly do not longer meet simple necessities bobbing up in heterogeneous environments, UML education, early life-cycle phases, or agile processes hassle-free device deployment, assist for instant version sketching, and photo export functions. A comparative study has been presented along with a choice of those equipment, display benefits and drawbacks for every device.</p>2021-06-14T12:07:29+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2735Google Play Store Analysis2021-06-14T12:13:35+00:00Kaushal Gadariachavanprathamesh1807@gmail.comPrathamesh Chavanchavanprathamesh1807@gmail.comDheeraj Deorechavanprathamesh1807@gmail.comManasee Deorechavanprathamesh1807@gmail.comSupriya Joshichavanprathamesh1807@gmail.com<p><em>Google play store consists of millions of applications and several thousand apps are added on the play store every day. The competition is so fierce that it is really difficult for the developers to find out whether the app that is the product of his hard work is going to be successful or not. The main goal of the study is to create a tool that helps developers and organizations to understand the current trends in the Play Store and the user bias for applications and utilize the data for making optimal decisions regarding their upcoming app.The success of an app can be determined by factors like ratings, number of installs and reviews. In this studywe demonstrate using applied exploratory data analysis to discover correlaations among features of an app and direct contribution of features towards success of the app to predict which apps will succeed. Data from Google Play Store was used to train various supervised learning models for prediction of the rating of an app, the models being-Random Forest, Support Vector Machine and Linear Regression. The user reviews are used to learn input bias of users towards applications using natural language processing techniques. Data of reviews is used to train classification models to predict polarity and sentiment of reviews.</em></p>2021-06-14T11:57:41+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2734Android Sentence Framer Application2021-06-14T12:13:35+00:00Jagruti Shindemandar.ganjapurkar@kccemsr.edu.inProf. Mandar Ganjapurkarmandar.ganjapurkar@kccemsr.edu.inProf. Suman Bhujbalmandar.ganjapurkar@kccemsr.edu.inNeha Sonawanemandar.ganjapurkar@kccemsr.edu.inImran Sayedmandar.ganjapurkar@kccemsr.edu.in<p><em>English is one of the easiest languages to learn, compared with other complex languages. Learning English language is helpful for many reasons, but achieving true fluency takes additional dedication and determination.You may speak excellent English,but you are not considered as “fluent” as you accomplish a specific ease in speaking and feel comfortable utilizing expressions and idioms.Tomaster in English sentence and fluency, we here built up a software project named Android Sentence Framer Application. This application refers to different classes like food, games, breakfast etc. from which, the client can choose any of these categories to show its contents. After selection of any one category, the application will allow the client to choose multiple images of his decision from which the application frames a sentence and shows it to the client. Client can get into the system directly without login. This is how the client could easily construct English sentences, and furthermore can learn a lot from this system.The sentence framer can act as a good friend in correcting the English language of a person. Sometimes there will be someone to correct the language that you are speaking. You can speak more than typing. This application gives you more than the correct sentence. </em></p>2021-06-14T11:34:48+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2745Fathoming Open Source Softwares2021-06-14T12:13:35+00:00Tanvi Chavantanvichavan1113@gmail.comAshish Jaiswaltanvichavan1113@gmail.com<p><em>Open Source Software development technically implies that the owners of the software publish their software's source code online. They give permission to anyone over the internet to use, alter, modify or distribute their software.Programmers, with access to the source code, use this opportunity to modify the software by fixing parts of code that arenot working appropriately or changing it. Open-source software usually comes with a license that helps programmers to customize the software to their own needs and manage how it is delivered. Overall, it implies that open source software is crowd-sourced. This paper talks about what open source software technically indicates, the advantages it offers, how it works and manymore.</em></p>2021-06-09T10:01:11+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2646Sustainability in Requirement Analysis and Quality Assurance: An Improved and Enhanced SDLC2021-02-10T06:34:09+00:00Arati Pradhanaratipradhancompsc@gmail.comPrangyaprachi Samantarayaratipradhancompsc@gmail.com<h1 align="center"><em>Abstract</em><em></em></h1><p><em>In each and every field of today’s world, information technology has established its remarkable and unavoidable footprint. Along with all its positive side, some negative issues are also associated with it. The objective of this paper is to highlight some major issues and their adverse impact on society and environment. This paper has also analysed the role of sustainability in software engineering and how sustainability can enhance software engineering process and to achieve long term objectives. We have also discussed Requirement Analysis during development phase and quality assurance during Maintenance phase. We have analysed these aspects in relation to GREENSOFT Model.</em></p>2021-02-10T06:33:08+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2647Big Data: A Survey Paper on MapReduce Big Data2021-02-10T06:34:09+00:00sahana N. Asahana15396@gmail.comMohammed Rafisahana15396@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Hadoop MapReduce is processed for analysis large volume of data through multiple nodes in parallel. However, MapReduce has two function Map and Reduce, large data is stored through HDFS. Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over This survey intends to assist the database and open source communities in understanding various technical aspects of the MapReduce framework. In this survey, we characterize the MapReduce framework and discuss its inherent pros and cons. We then initiate the development strategies which were announced in the recent literature. We also consider the open points and summons which were raised on parallel data analysis with MapReduce</em></p>2021-02-10T06:29:28+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2645A Survey on Datamining Techniques and its Uses on Real-Time Applications2021-02-10T06:34:09+00:00A. Linda Sherinkousalyakrishnan15@gmail.comKousalyadevi Bkousalyakrishnan15@gmail.comDr. A. Finny Belwinkousalyakrishnan15@gmail.comDr. Antony Selvadoss Thanamanikousalyakrishnan15@gmail.com<h1 align="center"><em>Abstract</em></h1><p><em>Data mining is one of the area gaining lot of sensible significance and is progressing at a brisk pace with new methods, methodologies and findings in diverse packages associated with remedy, computer science, bioinformatics and stock market prediction, climate forecast, textual content, audio and video processing to name a few. Data occurs to be the key difficulty in statistics mining. With the massive online facts generated from several sensors, Internet Relay Chats, Twitter, Face e book, Online Bank or ATM Transactions, the idea of dynamically converting records is becoming a key project, what we call as statistics streams. In this paper, we discuss about the data mining techniques and some of its applications that uses the data mining techniques in various stages, such as healthcare application, forensic, prediction analysis, agriculture, customer relationship management, sequence discovery and education sectors.</em></p>2021-02-10T06:25:40+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2644A Study on K-Nearest Neighbor Techniques with Other Techniques2021-02-10T06:34:09+00:00Kousalyadevi .Bkousalyakrishnan15@gmail.comDr. A. Finny Belwinkousalyakrishnan15@gmail.comDr.A. Linda Sherinkousalyakrishnan15@gmail.comDr. Antony Selvadoss Thanamanikousalyakrishnan15@gmail.com<h1 align="center"><span>Abstract</span></h1><p><em>The closest neighbor (NN) system is basic, exceptionally proficient and feasible in the field of example acknowledgment, content arrangement, object acknowledgment and so forth. Its straightforwardness is its primary preferred position; however, the impediments cannot be overlooked even. The memory necessity and calculation unpredictability are moreover matters. Numerous methods are created to defeat these restrictions. NN procedures are comprehensively ordered into structure less and structure-based procedures. In this paper, we present the review of such procedures. Weighted kNN, Model-based kNN, Dense NN, Reduced NN, Generalized NN are structure less procedures while k-d tree, ball tree, Principal Axis Tree, Closest Feature Line, tunable NN, Orthogonal Search Tree are structure put together calculations created with respect to the premise of kNN. The structure less technique conquer memory confinement and structure-based procedures lessen the computational multifaceted nature.</em></p>2021-02-10T06:19:56+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2642A Review of Code Defect Likelihood Using ML Methods2021-02-10T06:34:09+00:00UKPE KUFREukpekaycee123@gmail.comAMANNAH *ukpekaycee123@gmail.comConstance Izuchukwuukpekaycee123@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Software begets defects and defects are inevitable in software design and coding. This paper focused on five machine learning analysis models (MLAM); Support Vector Machine, Random Forest, K-Nearest Neighbor, Classification and Regression Tree, and Linear Discriminant Analysis. These models are trained to detect software defects using the software defect dataset from Promise data repository. The collected dataset is preprocessed to reduce the amount of redundant features using a dimension reduction algorithm called Principal Component Analysis. The transformed dataset is then used in training the five MLAM to predict software defect as a classification task. Real life software packages are analyzed and code attribute values such as line of code, cyclomatic complexity, line of comment, number of operators, number of operands, and so on are extracted for use in testing the trained models. To ascertain the efficiency of the system and also select the best algorithm for prediction of software, the performance of the trained models is evaluated; using the metrics; accuracy, error rate, precision, and recall. These models are ranked with respect to their performance and the best model (model with the highest accuracy) is selected and recommended for the task of software defect prediction. </em></p>2021-02-10T06:14:48+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2524Finite Field Extension and Public Key Cryptosystem2020-08-12T06:54:25+00:00Sunil Kumar Kashyapsharmabk07@gmail.comBirendra Kumar Sharmasharmabk07@gmail.comAmitabh Banerjeesharmabk07@gmail.com<p>We propose DLP over Gauss’s finite cylcotomic extension fields (GFCEF) subsequently design a PKC. In this paper, we consider the concept known as of Gauss’s Finite Cyclotomic Extension Field (GFCEF) to propose seven DLPs. Our basic idea is to study the splitting fields of polynomial with special attention to the case K = Q. Then splitting fields turn out to be an Abelian extensions whose Galois Groups are well known. There are in general, referred as Finite Cyclotomic Extension Field (FCEF).</p><p>2010 AMS Mathematics Subject Classification Number: 94A60.</p><p>Keywords: DLP, GFCEF, PKC, Galois Groups, Abelian Extension.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Finite Field Extension and Public Key Cryptosystem. Journal of Open Source Developments. 2020; 7(2): 22–24p.</p>2020-08-12T06:53:55+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2526Texting or Calling: A Comparison2020-08-12T06:54:25+00:00Gurmeet Singh Sarlarijak1@gmail.com<p>The world changed with the invention of telephone and opened a wideworldof communication. Telephone was used basically to make calls and speak to the person at the other end. After the advent of smart phone, people use their devices for messaging, gaming, browsing the internet, listening to music, watching movies, online shopping, banking and sometimes making phone calls too. Smart phone today has become an essential accessory, a necessary evil and a part and parcel of day to day life of an individual. Some people are so fond of texting and others are comfortable just calling up. This review article weighs the pros and cons of making a phone call versus sending a text message and compares the behavioural pattern of smart phone users.</p><p>Keywords:Texting, calling, instant messaging, short message service, communication</p><p>Cite this Article: Gurmeet Singh Sarla. Texting or Calling: A Comparison.Journal of Open Source Developments. 2020; 7(2): 18–21p.</p>2020-08-12T06:49:30+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2525Discrete Logarithm and Cryptosystem2020-08-12T06:54:25+00:00Sunil Kumar Kashyap7sunilkumarkashyap@gmail.comBirendra Kumar Sharma7sunilkumarkashyap@gmail.comAmitabh Banerjee7sunilkumarkashyap@gmail.com<p>We formulate a new DLP and designed a PKC. Our ProposedDiscrete Logarithm Problem (PDLP) is distinct from the Traditional Discrete Logarithm Problem (TDLP), which is proved in this paper. We use this PDLP for design a PKC. Our claim that, this PKC is more secure than the previous PKC’s, because a one reason is enough in support of this statement that, the PDLP is more complex problem because the computation of this problem is more difficult, because this has the distinct mathematical structure as compare to the TDLP. Mathematics Subject Classification NO: 94A60.</p><p>Keywords: Proposed Discrete Logarithm Problem (PDLP), Public Key Cryptosystem (PKC), Traditional Discrete Logarithm Problem (TDLP), DLP, PKC.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Discrete Logarithm and Cryptosystem. Journal of Open Source Developments. 2020; 7(2): 15–17p.</p>2020-08-12T06:47:06+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2523Cryptosystem Based on Fuzzy Theory2020-08-12T06:54:25+00:00Ashutosh Pandeyantu_28jd@yahoo.co.inSunil Kumar Kashyapantu_28jd@yahoo.co.in<p>This paper proposes a cryptosystem whose security comprises with the membership function of fuzzy. The security lies with the linguistic and numeric representation of information and its transformation by fuzzy. The one way hash function is substituted to membership function. The key generation and encryption comprises with fuzzy set and fuzzy logic respectively. Thus, the proposed system provides the security against all attacks by linguistic transformation rather than numeric representation. This is also an efficient cryptosystem by grading.</p><p>Keywords: Fuzzy, Cryptosystem, Membership Function, Fuzzy Set, Fuzzy Logic.</p>2020-08-12T06:44:14+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2522Atomic Cryptosystem2020-08-12T06:54:25+00:00Sunil Kumar Kashyap7sunilkumarkashyap@gmail.comBirendra Kumar Sharma7sunilkumarkashyap@gmail.comAmitabh Banerjee7sunilkumarkashyap@gmail.com<p>We propose public key cryptosystem (PKC), which is based on the atomic discrete logarithm problem (DLP). Sometimes, the word atomic referred as logical. This can be found by the logical formulation over the finite field. We study the work of [1-10].Atomic cryptosystem deals with the Galois representation of the elements of the cyclic group over finite field for providing the security against semantic attacks. 2000 Mathematics Subject Classification Number: 94A60.</p><p>Keywords: PKC, DLP,Atomic, Finite Field, Galois Representation.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Atomic Cryptosystem. Journal of Open Source Developments. 2020; 7(2): 1–6p.</p>2020-08-12T06:42:00+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2395Traffic Volume and Accidental Analysis of Blackspot Chogitti Intersection: A Quantitative and Qualitative Approach2020-05-02T09:23:51+00:00Malind Kumarer.harpreets@yahoo.comIpandeep Singher.harpreets@yahoo.comHarpreet Singher.harpreets@yahoo.com<p>There is increase in number of accidents worldwide especially at accident-prone areas known as ‘Blackspots’. The specific case taken here is of Jalandhar city’s blackspot Chogitti intersection. The research intent to find out what are the reasons that contribute in formation of blackspots alongside ways to eliminate them, which forms central question/problem. There is need of this study because of alarming rate of increase of accidents, which is evident from the fact that by year 2030 accidents will be the fifth major cause of deaths around the world. The study is done by hybrid quantitative and qualitative sequential design approach. Among quantitative analysis traffic volume study is conducted by human enumerators. In qualitative part of analysis level of service and traffic flow is analyzed. This hybrid approach is supported by peculiar Human Error Assessment and Reduction Technique (HEART), which illuminates the probability of human error occurrence during data collection in quantitative phase. The question about reasons of accidents is answered, as there just about exist a causal relationship among traffic volume and accidents. Reasons that are observed include violation of traffic guideline and norms by Indian Road Congress (IRC), Highway Capacity Manual (HCM); below average quality, Level of Service (LOS); increase in volume causing increase in accidents. This research is unique as it touches qualitative aspect of accidents and try to combine its effect with the available traffic volume, which has never done before and yields better result due to widened horizon of data input, form and analysis approach.</p><p>Keywords: Human error assessment, reduction technique, blackspot Chogitti Jalandhar, traffic volume analysis, accidental studies, causation relationship</p><p>Cite this Article Malind Kumar, Ipandeep Singh, Harpreet Singh. Traffic Volume and Accidental Analysis of Blackspot Chogitti Intersection: A Quantitative and Qualitative Approach. Journal of Open Source Developments. 2020; 7(1): 24–32p.</p>2020-05-02T09:23:25+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2415Tropical Change LULC Forestry Data Assessment to Classify Accuracy and Kappa Statistics2020-05-02T09:23:51+00:00Rajkumar Patilrajjakpatil@gmail.comBharath Kumarrajjakpatil@gmail.comCh Raj kumarrajjakpatil@gmail.comS. Nikhilrajjakpatil@gmail.com<p>Forests can be categorized as tropical evergreen, feedstock forests, and so forth. In other classes, the goal of this mission is to compute regions of various woodland kinds in India using photograph processing techniques. This information is very beneficial for organizations such as woodland and environmental protection departments to recognize if the wooded area areas are growing or no longer and therefore take the necessary steps. In order to calculate the regions of various woodland types and the photograph cascade set of rules, the project makes use of the pixel segmentation set of rules to decide exclusive wooded area types. Images of various woodland types are stored in a picture record system. The record device is saved inside the Usutu listing structure in a positive place. While the idea of trade-detection analysis is not always novel, a want for image processing strategies. Dissemination of map sensors and databases, come across and hint woodland assets, has been created with the aid of the emergence from new imager-sensors and geospatial technology. The common objective of this take a look at is for Land sat and ASTER imagery to discover and analyze structural modifications in woodland cowl.</p><p>Keywords: Satellite information, LULC, error matrix, specificity, entophyte</p><p>Cite this Article Rajkumar Patil, Bharath Kumar, Raj Kumar, S. Nikhil. Tropical Change LULC Forestry Data Assessment to Classify Accuracy and Kappa Statistics. Journal of Open Source Developments. 2020; 7(1): 19–23p.</p>2020-05-02T09:19:52+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2413QR Code System Intended for All Railway Ticking2020-05-02T09:23:51+00:00Nalli Vinaya Kumariv.vinayakumari@gmail.com<p>Technological growth has brought about a digital world without borders. This has contributed to payments through virtual money rather than real money. The use of intelligent cards minimized the wait for a ticket; however, the card should never fail to transport the user. So, he/she must be careful not to lose or steal the ticket. E-ticketing proceeded, where passengers have to bring electronically booked an SMS or printout of the card. “Metro Railway Ticketing” (MRT), a mobile application that can be conveniently accessed anywhere and anywhere and everywhere, and the ticket in the form of a “Quick Response Key” is accessible on a customer phone. GPS is used to check the ticket at origin and location, where it will expire when it is processed. The ticket must expire. The ticket information is stored in a firebase. Each user's information is stored in a cloud server that is not accessible for security purposes on the current metro system. The QR scanner will also be provided to the ticket-checker, which provides the full details of the user along with the number of the ticket and the ticket's status.</p><p>Keywords: Short-Message-Service (SMS), Global-Positioning System (GPS), Quick Response Key (QPK), QR scanner, railway ticketing</p><p>Cite this Article Nalli Vinaya Kumari. QR Code System Intended for All Railway Ticking. Journal of Open Source Developments. 2020; 7(1): 12–18p.</p>2020-05-02T09:10:22+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2389Design of Hybrid SAC-OCDMA FSO System Using Zero Cross Correlation Code2020-05-02T09:23:51+00:00Himali Sarangalhimali.sarangal@gmail.comAmarpal Singhhimali.sarangal@gmail.comJyoteesh Malhotrahimali.sarangal@gmail.comSimrandeep Singh Thaparhimali.sarangal@gmail.com<p>Spectral amplitude coding (SAC)-optical code division multiple access (OCDMA) being an ensuring advancement gives satisfactory response for burst and asynchronous environment. While free space optics (FSO) transfer information from one place to another at high speed where other systems are hard to reach. This paper offers and endeavors to dissect the performance of the system (SAC-OCDMA) through diverse environment conditions in FSO channel utilizing Zero cross correlation code having bit rate of 70 (10×7) Gb/s for seven users. In doing so, the influence of distance on the performance of SAC-OCDMA has been compared. The simulative investigation has been carried out as far as significant parameters like bit error rate (BER) and Eye diagrams. It has been observed from the comprehensive simulations that the system performance improves with an optical amplifier by 30.7%, 32.4%, 15% and 20.9% in clear weather, heavy haze, moderate Fog and heavy rain respectively.</p><p>Keywords: FSO, SAC-OCDMA, ZCC code, Multi Access Interference (MAI), bit error rate (BER)</p><p>Cite this Article Himali Sarangal, Amarpal Singh, Jyoteesh Malhotra, Simrandeep Singh Thapar. Design of Hybrid SAC-OCDMA FSO System Using Zero Cross Correlation Code. Journal of Open Source Developments. 2020; 7(1): 5–11p.</p>2020-05-02T09:04:18+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2414Blockchain: A Disruptive Technology2020-05-02T09:23:51+00:00Mandeep Kaur Grewalmonakhosa@gmail.comKiran Soodmonakhosa@gmail.com<p>Blockchain technology is a trending issue, since the introduction of Bitcoin cryptocurrency in 2008, by Satoshi Nakamoto. The interest in blockchain technology is constantly increasing as all the countries are making efforts to introduce them in various sectors. Our selection of articles gives a prologue to blockchain innovation by providing a view of three primary topics. First, what is blockchain technology. Second, how does it work. Third, real world challenges faced by blockchain technology. Blockchain implementation is still in its early stage. Hence, conclusion of this study can be used for further improvement and implementation of blockchain technology in real world.</p><p>Keywords: Blockchain, bitcoin, cryptocurrency, technology, innovation</p><p>Cite this Article Mandeep Kaur Grewal, Kiran Sood. Blockchain: A Disruptive Technology. Journal of Open Source Developments. 2020; 7(1): 1–4p.</p>2020-05-02T08:46:23+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2306An Approach to Recognizing Numerals and Alphabets Signs for Impaired People2019-12-30T10:40:32+00:00Bhavika Patelpatelbhavika912@gmail.comNarendra M Patelpatelbhavika912@gmail.comZankhana H. Shahpatelbhavika912@gmail.com<p>Abstract: Sign Language is the language used by deaf and dumb people for communication in their day to day life. Every nation has its own sign language. Indian people use Indian Sign Language. Generally, other sign languages such as ASL (American Sign Language) and BSL (British Sign Language) are single-handed sign language while ISL is the language which uses both hands to make signs. So, it is difficult to exactly classify and recognize those types of signs. The work presented here focuses on recognizing Indian sign language where Fourier descriptor is used for feature extraction and classification is achieved using a neural network.</p><p>Keywords: A nonverbal form of communication, preprocessing, Contour extraction, Fourier descriptor, neural network</p><p>Cite this Article: Bhavika Patel, Narendra M. Patel, Zankhana H. Shah. An Approach to Recognizing Numerals and Alphabets Signs for Impaired People. Journal of Open Source Developments. 2019; 6(2): 1–7p.</p>2019-12-30T10:40:01+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2348The Next Level Computing: Quantum Computers2019-12-30T10:40:32+00:00Gagan Agarwal2017pietcsgagan038@poornima.orgAnushka Mangal2017pietcsgagan038@poornima.orgAlka Rani2017pietcsgagan038@poornima.org<p>Abstract: Quantum computer is an emerging technology. The quantum computer is based on quantum physics, as like the quantum particles. The normal computers work on two states 0 and 1 but this quantum computers work on three states 0, 1, 0 or 1. These quantum computers are used in the system where very high speed is required. But in present scenario, this computer is not developed.</p><p>Keywords: Qubits, QuAIL, D-wave, quantum computers, quantum mechanics</p><p>Cite this Article: Gagan Agarwal, Anushka Mangal, Alka Rani. The Next Level Computing: Quantum Computers. Journal of Open Source Developments. 2019; 6(3): 19–22p.</p>2019-11-30T05:27:39+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2349Internet of Things Security2019-12-30T10:40:32+00:00Krati Hansrajani2016pietcekrati048@poornima.orgAkshita Gupta2016pietcekrati048@poornima.orgAlka Rani2016pietcekrati048@poornima.org<p>Abstract: This paper aims to present all the basic information about the Internet of Things (IoT) system. It includes how this technology is growing day by day and also all the factors involved and affecting it. For better security and efficiency, many researches and new techniques are to be evolved. In this paper, there are contents about the new techniques that are being used for the efficiency of the system.</p><p>Keywords: Malware, network, embedded system, IoT (Internet of Things), cryptography</p><p>Cite this Article: Krati Hansrajani, Akshita Gupta, Alka Rani. Internet of Things Security. Journal of Open Source Developments. 2019; 6(3): 16–18p.</p>2019-11-30T05:27:35+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2342Industrial IoT: Advancement in IoT2019-12-30T10:40:32+00:00Shubham Khandelwalkhandelwalshubham0@gmail.comAbhishek Dadhichkhandelwalshubham0@gmail.com<p>Abstract: Industrial Internet of Things (IIoT) are the new revolution for the industries in current times, in this review, we have reviewed different types of IoT and the applications of the IoT which can be used in the Industries. In this paper, we have also discussed about the future scope of IIoT in the market. IIoT is also known as industrial revolution 4.0 for the industries.</p><p>Keywords: Industrial IoT; Industrial Revolution; Industries 4.0 Internet of things (IoT), sensor, IOD (Internet of Data)</p><p>Cite this Article: Shubham Khandelwal, Abhishek Dadhich. Industrial IoT: Advancement in IoT. Journal of Open Source Developments. 2019; 6(3): 12–15p.</p>2019-11-30T05:14:29+00:00https://computers.stmjournals.com/index.php?journal=JoOSD&page=article&op=view&path%5B%5D=2343Electronic Eye for Security Systems2019-12-30T10:40:32+00:00Rohit Jangidjangidrohit250@gmail.com<p>Abstract: Electronic eye delineates the arrangement and execution of Entryway picture find by utilization of security based on microcontroller structure for society and work environments. It outfits the customer with gainful and tried and true security structure for Entryway picture get for home, working environments and endeavors that support the usage of a sensor at the best approach to send the signs to keep an eye with ringer alarm for security purpose which gets you a picture when the door opens to get at the yield of workstation or your personal computer or the web.</p><p>Keywords: Microcontroller, Electronic eye, security system, control unit, sensor and web application</p><p>Cite this Article: Rohit Jangid. Electronic Eye for Security Systems. Journal of Open Source Developments. 2019; 6(3): 8–11p.</p>2019-11-30T05:11:25+00:00