Journal of Operating Systems Development & Trends
https://computers.stmjournals.com/index.php?journal=JoOSDT
<p align="center"><strong>Journal of Operating Systems Development & Trends (JoOSDT)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2454-9355</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoOSDT&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong> </strong></p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 5.306</p><p> </p><p><strong>Journal of Operating Systems Development & Trends (JoOSDT)</strong> is a journal focused towards the rapid publication of fundamental research papers on Operating Systems Development & Trends. It's a triannual journal, started in 2014.</p><p align="center"> </p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoOSDT</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Implementation of Multi programmed OS</li><li>Architecture of OS</li><li>Multiprocessor, Multimedia and Real time OS</li><li>Models of Thread Implementations</li><li>Tradition and Real - Time Signals</li><li>Clocks, Timers and Callouts</li><li>Inter process/ Interthread Synchronization and Communication</li><li>File Organization, File System Interface and Virtual File Systems</li><li>Graphical User Interface (GUI)</li><li>Linear Block Addressing (LBA)</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong></strong></p><p><strong>Abbreviation: JoOSDT</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong> </strong></p><p><strong><a href="/index.php?journal=JoOSDT&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p> </p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoOSDT&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> <strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p> </p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong>Phone no.:</strong> 0120-478-1240/ Email: <span>deeksha.sharma</span>@celnet.in, meenakshi@celnet.in</p><p> </p>en-USJournal of Operating Systems Development & Trends2454-9355<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>Classroom Education using Augmented Reality
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2765
<p align="center"><strong><em>Abstract</em></strong></p><p><em>The primary objective is to boost existing education system by introducing the construction of improvement of reality through sensible mobile phones. With this technology, students and teachers each can get benefited. Moreover, teachers will choose their subject topics and present them in 3D Models,and neatly illustrate to their students. Even, students can well understand the topics explained with the assistance of 3D Models. AR permits flexibility in use that is enticing to education. AR technology is often utilised through a mediums for theas desktops, mobile devices, and smartphones. The technology is transportable and flexible for anysituations.</em></p>Ruchira BiduShruti GaikwadAbhishek SinghBhagyashree Sonawale2021-06-242021-06-248Sentiment Analysis Using Hybrid Feature Extraction for Hotel Reviews
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2717
<em>Interpersonal interaction destinations have become well known and normal spots for sharing wide scope of feelings through short messages. These feelings incorporate satisfaction, pity, tension, dread, and so forth. Breaking down short messages helps in recognizing the conclusion communicated by the group. Feeling analysis on hotel audits recognizes the generally speaking sentimentor assessment communicated by a commentator towards an inn. Numerous specialists are dealing with pruning the notion investigation model that obviously recognizes a positive audit and a negative survey. In the proposed work, we show that the utilization of hybrid highlights acquired by linking Machine Learning highlights (TF-IDF) with Lexicon highlights (TextBlob) gives better outcomes both as far as exactness and intricacyare concerned.The proposed model unmistakably separates between a positive audit and negative survey. Since understanding the setting of the surveys assumes a significant part in grouping, utilizing hybrid highlights, helps in catching the setting of the hotel audits and thus expands the precision of order.</em>shivam naikAkshay SawantSwapnil GawadeMadhu Nashipudimath2021-06-242021-06-248Task Scheduling with Cron Job using Cloud Brain
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2715
<p><em>Most people have fear in their mind to share their secrets, specifically banking details with others but they have to share it with someone, because that will help in the situations like that person affected by memory loss or may death happen, these details also get buried. In this situation, his/her family members know the details to access the bank but the bank requires various certificates and proof. This will take too much time, but when using the cron jobs, these all processes can be done easily. Because all the details are already fed inside the program in cron. The purpose of a cron job is to make everything in schedule-based work and also automatic, cron is the word that comes from Greek which means time. So, the person wants to do a simple thing, use cron job by creating ASCII text cron file, and edit it by text editor and then run; it will do the given work at particular intervals regularly. Now in bank, the person can add alternative user details to the primary user account and also add cron time to the server-side, that's it; all these problems will be over</em></p>Poorviga CSaravanan SAkalya RKabila PTamilselvi B2021-06-242021-06-248Mood based Music Player using Fisher Face
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2764
<p><em>This document is an overview of the project completed by our group,‘Emotion Based Music Player’, in which the user can play a music based on his/her emotion detected by the system. Once the user face is detected, automatically the song gets played. Likewise, the framework hails the inquiry and sifting of melodies according to the state of mind recognized utilizing a portion of the python libraries.The system is based on real time environment. Thus, it yields better accuracy in terms of performance and reduces the time taken.</em></p>Akanksha GalweMadhura GijamDarshita Gilda2021-06-242021-06-248Augmented Reality Based Shooting Game
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2714
<p><em>In this developing world of technology, there are so many things going on at the same time. Humans are progressing in so many fields at the time for the betterment of human race. An innovation that holds its place among these is Augmented Reality (AR). AR refers to displaying virtual objects into the real world. This research work presents the features and functionalities of AR based shooting games which require precise “aiming” and “timing” to shoot its target down in order to survive. It is not like everyday survival game as it is based on the augmented reality. The proposed system created using AR Foundation is for both iOS and Android.<strong></strong></em></p>Pratik Dattatray JaykarDnyaneshwari Rajaram BandagaleVaishali Shankar KokareVaishali Jadhav2021-06-242021-06-248Soil Analysis Technique: NPK Detection using IOT
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2634
<p class="ABSTRACT" align="center"><strong><em>Abstract</em></strong><em></em></p><p class="ABSTRACT"><em>The growth and maintenance of the crops is a very important task in the agricultural domain. There are a lot of ways in which we can make sure that the crops are properly grown and the soil quality is high, we can use good quality seeds, we can regularly grow different crops to ensure the balanced nutrients in the soil, also irrigation and fertilization are great methods to do so. But the current soil testing systems in the agricultural sectors are not easily accessible by the farmers, and those which are accessible have a very slow process. Being a major drawback, there is a need for a tool with a good methodology that is able to produce real time results which can be used by the farmers with ease. Such a device would greatly reduce the time delay, and will be able to accurately identify the nutrient composition of the soil samples. The nutrients focused in the soil analysis technique are N, P and K, these nutrients are essential requirements for all the major crops. In this paper, we will take a look at the standard method to check the nutrients of the soil (N, P, and K) for crops and focus on an IoT based analysis which would provide a brief report, according to which the farmers can use the best-suited fertilizer to enhance the growth of crops.</em></p>Abhishek JainVinayak MathurVaishnavi Ajmera2021-02-102021-02-108Performance Analysis of Junctionless SONOS Memory
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2630
<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>This paper presents the performance analysis of the JL SONOS device electrical characteristics of the two different types of device i.e., one built on BULK substrate and other over the SOI substrate. The difference in the properties and its related impact on the device performance will be discussed through physical interpretations and mathematical equations. Simulation of both devices is done by taking same device dimension and parameter to check the program and erase characteristics and compared on the basis of improved memory characteristics. In the memory device, variation occur in the characteristics of device, have been discussed. To achieve the required memory performance bulk doping is used as tunning parameter. The erasing efficiency of the JL bulk SONOS memory cell is better and JL SOI SONOS memory cell exhibits larger memory window within a specified program time.</em></p>Akansha ShrivastavaSanjeev Patel2021-02-102021-02-108IOT Big Data Techniques for Smart Home: A Study for Applicable in Small City at India
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2635
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Internet of Things is the connections of embedded technologies that contained physical objects and is used to communicate and intellect or interact with the inner states or the external surroundings, rather than people to people communication, IoT emphasis on machine to machine communication. This paper represents Big Data deployment in smart homes as it was limited for its applicability in IT industry. The proposed architecture can be applied to different smart cities applications. Authors describe multiple objectives of smart cities based on big data analysis. This approach is to find the possible applicability of Internet of Things techniques to provide better way towards building smart cities, such as the management of the energy consumption.</em></p>Dr. Nilam ChoudharyVijeta KumawatVivek Kumar2021-02-102021-02-108IOT-based Solar Tracking System for Efficient Power Generation
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2607
<p align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>In remote areas the sun is a cheap source of electricity because instead of hydraulic generators it uses solar cells to produce electricity. But the output of solar cells depends on the intensity of sunlight and the angle of incidence. It means to get maximum efficiency; the solar panels must remain in front of the sun during the whole day. But due to the rotation of the earth, those panels can’t maintain their position always in front of the sun. This problem results in a decrease of their efficiency. So, to get a constant output, an automated system is to be required which should be capable to constantly rotate the solar panel. Automatic sun tracking system with photovoltaic plate to improve the efficiency of solar power generation was helpful to solve the problem, mentioned above. It is completely automatic and keeps the panel in front of the sun until that is visible. The unique feature of this system is that instead of taking the earth as its reference, it takes the sun as a guiding source. Its active sensors constantly monitor the sunlight and rotate the panel towards the direction where the intensity of sunlight is at maximum with the help of DC motor</em></p>Akshatha A M SMohammed Rafi2021-02-102021-02-108IOT-based Line of Control Monitoring System
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2633
<p><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>Indian Security Border areas are normally considered as places where great deal of violence and intervention happens between several persons. This often caused the danger for the life of employees, soldiers and common people working and living in border areas. It is not possible for our soldiers to watch the borders at each and every moment. In this paper, we have proposed “automated monitoring system” as the solution of the problem for effective monitoring of line of control (LOC). The automatic monitoring system can immensely improve the surveillance of border areas and it will help to control illegal movements at the LOC. This paper introduces a model with useful and protective systems such as PIR sensors, ultrasonic systems, thermal infrared cameras, GPS, and touch sensors. This paper proposes an efficient IOT (Internet of Things) based model for monitoring and controlling for line of control system. The proposed system is completely bullet proof and water proof. The software-based monitoring system will provide an efficient solution for monitoring large border areas of India.</em></p>Rajvirsinh parmarParthkumar GohilSaurabhkumar YadavStavansinh ThakorMadhavi DesaiAnkit PrajapatiBhagyasri Patel2021-02-102021-02-108Operating System - Concept and Comparison
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2561
<p>Operating system is essential to operate computers. Normally, computers came with preloaded operating systems. The purpose of this paper is to discusses about the functionality of Operating Systems with their specialization in their field and how different OS are present with UI and hardware support for software tuning. Most of the OS are UNIX based or support UNIX like features. This discusses the pre-installed OS’s which are installed in many PC’s, Laptops and Mobile Phones and about most famous Linux distributions.</p><p>Keywords: operating system, technology, UNIX, UI (User Interface), hardware</p><p>Cite this Article: Vatsal Gupta, Nidhi Tyagi. Operating System-Concept and Comparison. Journal of Operating Systems Development & Trends. 2020; 7(2): 24–30p.</p>Vatsal GuptaNidhi Tyagi2020-08-132020-08-138Greenhouse Automation
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2560
<p>The demand has been increasing in the automation sector, to successfully nurture and grow a plant yield. The most important thing here is to moniter the plants during their growth cycle. In this system image processing is used to monitor the disease on leaf after the image of the infected leaf is captured by a robot. For the classification purpose convolutional neural network is used. It can work with a huge number of classes. This system divides the dataset into Training and Testing set for implementation of query images. Our framework utilizes the Resnet-50 which represents remaining system 50. Resnet-50 is essentially a capacity accessible in matlab. Support Vector Machine (SVM) which is an administered AI calculation is utilized for include extraction. The main role of Resnet-50 is to compare the features of images and classify the input image into a corresponding category.</p><p>Keywords:Image processing, leaf, convolutional neural network, Resnet-50, SVM, feature extraction.</p><p>Cite this Article: Kalash Milind Waingankar, Rahul Rajendra Waghmare, Akshay Rajendra Rakh, Sujata Bhairanallykar.Greenhouse Automation. Journal of Operating Systems Development & Trends. 2020; 7(2): 14–18p.</p>Kalash Milind WaingankarRahul Rajendra WaghmareAkshay Rajendra RakhSujata Bhairanallykar2020-08-062020-08-068Hoax News Detection Using Convolutional Neural Network
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2564
<p>In this paper our objective is to build a classifier that can predict whether a piece of news is Hoax or not based only its content, thereby approaching the problem from a purely deep learning perspective by technique models like LSTM(GRU), Naive Bayes and CNN. We will show the difference and analysis of results by applying them to the dataset Hoax_news which is available on kaggle.com. We found that the results are close, but CNN is the best of our results that reached (0.982) followed by Naive bayes(0.8644) and LSTM-GRU(0.916).</p><p>Keywords: Deep Learning; LSTM (longshort-term memories); GRU (Gated Recurrent Unit); CNN(Convolutional Neural Networks), technology.</p><p>Cite this Article: Aditya Dighe, Pallavi Naik, Pranay Kamble, Shraddha Subhedar. Hoax News Detection using Convolutional Neural Network.Journal of Operating Systems Development & Trends. 2020; 7(2): 19–23p.</p>Pranay KambleAditya DighePallavi NaikShraddha Subhedar2020-08-062020-08-068Fake Review Detection
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2562
<p>In the enterprise marketing process, online information assumes progressively significant job. As a kind of information, counterfeit surveys of the items, have been genuinely influencing the unwavering quality of both dynamic and information examination of the undertaking. To distinguish spam surveys, the paper presents a lot of conclusion spam discovery's ID markers dependent on conduct highlights of the spammer. Our review identification algorithm achieves lower latency. More importantly, the proposed algorithm for recognizing honest reviews can be used to analyze the relevancy between the review content and the given review topic by using the word segmentation technique. The Experimental results show that the number of fake reviews by our algorithms is higher than that of the traditional algorithm.</p><p>Keywords: Word Segmentation, Spam reviews, Stemming, technology, fake detection</p><p>Cite this Article: Saurav Waghmare, Tushar Shinde, Susheel Daware, Shraddha Subhedar. Fake Review Detection. Journal of Operating Systems Development & Trends. 2020; 7(2): 6–13p.</p>Saurav WaghmareTushar ShindeSusheel DawareShraddha Subhedar2020-08-062020-08-068Bridge Safety Monitoring System
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2563
<p>Bridges may get fallen or inclined because of flooding or some solid issue, normal catastrophes. So there is a need to plan a system which will consistently screen state of bridges. It is valuable for open safety and decrease in human misfortunes. Such framework will help in a debacle the board and recuperation. IoT-based scaffold security checking framework is created utilizing the WSN Technology. This framework is made out of: Monitoring devices introduced in the extension condition, specialized gadgets interfacing the scaffold checking gadgets and the cloud based server, a powerful database that stores connect condition information, cloud based server figures and breaks down information transmitted from the observing gadgets. This framework can screen and examine continuously the state of a scaffold and its condition, including the water levels and other safety conditions. This paper presents an exhaustive overview of SHM utilizing WSNs sketching out and calculation like harm recognition and restriction, arrange configuration difficulties and future exploration course.</p><p>Keywords: bridge safety, IoT, technology, WSN (Wireless Sensor Network), SHM (Simple Harmonic Motion)</p><p>Cite this Article: Pratik Jaiswal, Aditya Krishna Parida, Praveen Shinde. Bridge Safety Monitoring System. Journal of Operating Systems Development & Trends. 2020; 7(2): 1–5p.</p>Pratik JaiswalAditya Krishna ParidaPraveen Shinde2020-08-062020-08-068Support Vector Machine Based Supervised Machine Learning Algorithm for Finding ROC and LDA Region
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2431
<p>Breast Cancer is one of the most dangerous forms of conditions in the world, according to the Breast Cancer Institute (BCI). Breast cancer is a leading cause of death for women. Several empirical studies have explored the use of machine and predictive systems for breast cancer. Breast cancer can be the major cause of women’s death. Many claim their algorithms are faster, easier or more precise, as according to cancer. Net, for the most cancer groups and associated hereditary syndromes individualized literature exhibits over 100 and 20 varieties. The purpose of this study was to optimize the algorithm used to carry out the study, including hybrid models mixed from various algorithms for Machine Learning (ML), including Vector Machine (SVM), to K-Nearest Neighbor (KNN) for efficient breast cancer detection. Two kinds of tumors exist. One is a brain tumor, and the other is malignant, benign tumors which are not primarily types of cancer and malignant tumors.</p><p>Keywords: Accuracy, Gaussian blend show, SVM, KNN, ROC, Wisconsin breast cancer</p><p>Cite this Article: Nalli Vinaya Kumari, G. S. Pradeep Ghantasala. Support Vector Machine Based Supervised Machine Learning Algorithm for Finding ROC and LDA Region. Journal of Operating Systems Development & Trends. 2020; 7(1): 26–33p.</p>Nalli Vinaya KumariG. S. Pradeep Ghantasala2020-06-022020-06-028STAD - Pragmatic Execution of Collaborative Learning
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2432
<p>Primary benefit of using collaborative learning is enhancing outcome based education and increasing social skills. Additionally, it emphasizes students to work together in collaborative groups, the more they understand, retain, and feel better about themselves and their peers. Moreover, working together in a collaborative environment encourages student responsibility for learning.</p><p>Keywords: Collaborative learning, Dijkstra’s algorithm, Google map, outcome based education, STAD</p><p>Cite this Article: Ashish Revar, Ankit Samani. STAD - Pragmatic Execution of Collaborative Learning. Journal of Operating Systems Development & Trends. 2020; 7(1): 22–25p.</p>Ashish RevarAnkit Samani2020-06-022020-06-028Design and Simulation of Proximal Convoluted Tubule Flow Kinetics for Kidney-on-chip Applications
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2435
<p>The primary function of human kidney is purifying the impure blood in the body. In addition to this, kidney performs balance homeostasis, solute balance and blood pressure maintenance. Proximal convoluted tube (PCT) is a primary part in the nephron which plays a crucial role in the excretion, secretion and re-absorption of solutes and proteins. While performing all these functions, kidneys tends to get affected in several ways leading to failure of the kidney. Artificial kidneys containing human proximal convoluted tubule cells have been applied in clinical trials and research trends to study how the lumen fluid flows in and out in PCT. This paper proposes a novel design considering the flow kinetics and accurate dimensions of PCT to develop an artificial bio-reactor which helps in kidney-on-chip applications. The model considers transporting channels which are connected straight and inclined to main tubule. The modelling, simulation, and analysis are carried out to optimize the flow in the proposed structure. The analytical formulae developed are considered and a model has been built in FEM tool. The total volumetric flow through straight channels is 0.63×10-16 which is comparatively less than slant channels 0.72×10-16. The obtained simulated results have good correlation with analytical analysis. Finally, the shape of main tubule has been analysed with two different shapes straight and diagonal. The straight tubule is considered for its ease of practical realization and acceptable flow velocity.</p><p>Keywords: Fluid shear stress, kidney-on-chip, microfluidics, nephron, proximal convoluted tubule, re-absorption</p><p>Cite this Article: Jasti Sateesh, M. Surya Manoj, S. Shahrukh Sohail, Koushik Guha, Arindam Dutta, Pratim Sengupta, K. Srinivasa Rao. Design and Simulation of Proximal Convoluted Tubule Flow Kinetics for Kidney-on-chip Applications. Journal of Operating Systems Development & Trends. 2020; 7(1): 14–21p.</p>Jasti SateeshM. Surya ManojS. Shahrukh SohailKoushik GuhaArindam DuttaPratim SenguptaK. Srinivasa Rao2020-06-022020-06-028Solar Powered Cost Effective Paddy Harvester and Collecting Machine
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2434
<p>Paddy is a staple food of Indians. Harvesting is the process in which the matured paddy is being cut. Paddy harvesting is one of the most important processes in the practices of paddy field. Traditional process of harvesting is cutting of paddy crops with the help of a sickle. A group of labourers cut the paddy crops in the paddy field. There is a considerable grain loss and damage to the crop while harvesting with sickle, which is a manual harvesting process. Nowadays, the paddy harvesting machines are available in the market, which work on petrol or diesel engine. Fuel based harvesting cost represents a significant portion of total paddy production cost. Harvesting cost per acre land is influenced by many factors including harvesting performance rate per acre, input costs like running and labour cost, pesticide cost and weed cutting cost. Hence, there is an urgent need for a harvester machine using renewable energy resource. Solar energy is an abundant and renewable energy resource. One solar cell can equalize 1.5 W of electrical energy, which is fed immediately. Solar energy plays an important role in drying agricultural products and irrigation purpose such as pumping the water in remote villages having no electricity. This technology of solar energy can be extended for cutting agricultural plants such as sugarcane, mulberry plants and paddy. The proposed system will provide a facility to farmers in harvesting the paddy crop as well as collecting the crop by using solar energy.</p><p>Keywords: Collecting machines, paddy harvesting, renewable energy resource, solar panel, technology</p><p>Cite this Article: Lakshmi M. Nair, Adhithya Krishna R.S., Parvathy Balachandran, Fathima R.S., Fathima Farook. Solar Powered Cost Effective Paddy Harvester and Collecting Machine. Journal of Operating Systems Development & Trends. 2020; 7(1): 7–13p.</p>Lakshmi M. NairAdhithya Krishna R.S.Parvathy BalachandranFathima R.S.Fathima Farook2020-06-022020-06-028Navigation Enabled High Security Helmet
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2433
<p>The intelligent helmet system reported in this project ensures the safety of a two-wheeler rider. The primary concept behind the working of the system is about the free hand operation of a rider. The ignition of a two-wheeler will be enabled only if the rider is wearing the helmet and it should be buckled. The helmet is powered by a lithium ion battery which in turn is charged manually or by a solar panel, integrated outside the helmet. A fully functioning prototype of the reported switch based helmet system has been fabricated and all the necessary circuits are embedded inside the helmet and the motor bike. The proposed system has the unique characteristic of transmitting the appropriate condition of the signals for a predefined duration, followed by holding of these signals for the rest of the time at the receiving end for the proper functioning of the motorbike. Currently, accidents are a serious problem for everyone. Accidents are increasing day by day, so efforts are made to avoid them to minimize their consequences. We live in a world where the rules of the road have no importance for people and they are regularly violated. In addition, its human nature to resist what is imposed on them. Thus, using a different perspective, we provide safety with luxurious and intelligent features using a helmet.</p><p>Keywords: Helmet, motorbike, navigation, security, technology</p><p>Cite this Article: Ganga V., Anand, Pooja S.R., Sandra B.S., Revathy B.M. Navigation Enabled High Security Helmet. Journal of Operating Systems Development & Trends. 2020; 7(1): 1–6p.</p>Ganga V.Anand .Pooja S.R.Sandra B.S.Revathy B.M.2020-06-022020-06-028An Evaluation of Sentiment Analysis in Online Reviews using FRN Algorithm
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=77
<p>The internet is rich in directional text (i.e., text containing opinions and emotions). World Wide Web provides volumes of text-based data about consumer preferences, stored in online review websites, web forums, blogs, etc. Sentiment analysis is a technique to classify people’s opinions in product reviews, blogs or social networks and has emerged as a method for mining opinions from such text archives. It uses machine learning methods combined with linguistic attributes/features in order to identify among other things the sentiment polarity (e.g., positive, negative, and neutral). The authors investigated supervised learning by incorporating linguistic rules and constraints that could improve the performance of calculations and classifications.</p><p><strong>Keywords</strong>: Opinions, sentiment analysis, machine learning</p>I. HemalathaG. P. Saradhi VarmaA . Govardhan2020-02-282020-02-288Collocation Pattern Analysis
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=78
<p>Spatial data mining becomes more attractive and significant as more spatial data is built up in spatial databases. Many GIS applications are using spatial patterns that are equal to association rules of a business data mining, i.e., online transaction processing (OLTP). Mining the spatial collocation patterns is a significant spatial data mining job with broad applications. Organizations having large data sets of spatial data need to do certain operations that incorporate methods of analyses and summarization which very much crucial; retailers are finding items frequently bought together to make plan catalogs, store arrangements, and promote products together by using Association rule finding in data mining technique; decision-support systems for getting improved information like transformations and trends that occur in the spatial zones. Particularly, the interpretation on the demonstration of collocation (co-location) pattern and its size change using semantically supported elements is more important to archaeologists, GIS scientists, governments, etc., for analyzing the changing trends in civilization. Many spatial datasets contain occurrence of a collection of Boolean spatial features. Spatial association statistics measure the concentration of an attribute over a space.</p><p><strong>Keywords</strong>: Spatial data mining, temporal mining, spatial knowledge, collocation, geographic information system</p><p> </p>N K Kameswara RaoG P Saradhi VarmaM. Nagabhushana Rao2020-02-282020-02-288Review of TDC-based on Vernier Ring Oscillator Time to Digital Converter
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2364
<p>Abstract: The objective of this paper is to review the state-of-the-art of Vernier TDC techniques to achieve high resolution. Modern VLSI technology is mainly driven by digital circuits because a digital circuit has many advantages over analog circuits. To achieving the high-resolution in time-to-digital converter (TDC) is one of the crucial points, it is becoming more suitable for many time-of-flight (TOF) applications because it measures the time difference between two pulses and gives time difference as a digital output code. The Vernier ring TDC place the Vernier delay cells in a ring format and reuses them for the measurement of the input time interval. This Vernier TDC technique will give high resolution than conventional TDC models.</p><p>Keywords: TOF, Time to Digital Converter, Vernier Delay Line, Field Programmable Gate Array, Ring oscillator.</p><p>Cite this Article: Pooja Gupta, Pooja Saxena. Review of TDC-based on Vernier Ring Oscillator Time to Digital Converter. Journal of Operating Systems Development & Trends. 2019; 6(3): 30–35p.</p>Pooja GuptaPooja Saxena2020-01-102020-01-108Information Hiding Using HTML
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2367
<p>Abstract: This paper provides a promenade for data hiding. Steganography is the technique which makes it possible to send data without altering in it. Data is stored in the form of stego data and then transmitted secretly. Various techniques for steganography are proposed till date which ensures the integrity and confidentiality of data stored in HTML documents. Proposed technology works on effectiveness of data hiding in HTML documents using the fact that there is no noise in stego object as compared to cover medium.</p><p>Keywords: Steganography, HTML web page, HTML attributes, embedded data</p><p>Cite this Article: Vishakha Upreti, Vanshika Munjal. Information Hiding Using HTML. Journal of Operating Systems Development & Trends. 2019; 6(3): 22–29p.</p>Vishakha UpretiVanshika Munjal2020-01-102020-01-108Beach Cleaning Vision System
https://computers.stmjournals.com/index.php?journal=JoOSDT&page=article&op=view&path%5B%5D=2366
<p>Abstract: This paper concentrates on vision system for the purpose of automatic beach cleaning process. A system that detects the objects, edges and features is very important for easier and proper cleaning in all the areas. The vision system uses various techniques with the real time captured image for Object detection to find if any object or waste is present. Edge detection is used to recognize the boundary of the waste present in the areas which needs to be cleaned and Feature detection is used for retaining all useful products present in that area. The proposed system uses Speed-Up Robust Features (SURF) algorithm and RANSAC algorithm for Feature detection. Canny edge operator is implemented for Edge detection and Image segmentation technique is used for Object detection. It is implemented in MATLAB R2016b with Computer Vision Toolbox. The real time image capturing is done with IP webcam application and IP camera support package.</p><p>Keywords: SURF algorithm, RANSAC algorithm, Canny edge operator, Image Segmentation Technique, beach cleaning</p><p>Cite this Article: K.T. Anisha Jubitha, Shamini R., Ashna Rasheed, Anshad P.K. Beach Cleaning Vision System Journal of Operating Systems Development & Trends. 2019; 6(3): 14–21p.</p>K.T Anisha JubithaShamini RAshna RasheedAnshad P.K2020-01-102020-01-108