https://computers.stmjournals.com/index.php?journal=JoSETTT&page=issue&op=feedJournal of Software Engineering Tools & Technology Trends2022-01-03T10:26:37+00:00Deeksha Sharmadeeksha.sharma@celnet.inOpen Journal Systems<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table><p align="center"><strong>Journal of Software Engineering Tools & Technology Trends (JoSETTT)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2394-7292</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoSETTT&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong> </strong></p><p align="center"><strong><br /></strong></p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 6.076</p><p> </p><p><strong> </strong></p><p><strong><br /></strong></p><p><strong>Journal of Software Engineering Tools & Technology Trends (JoSETTT)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Software Engineering Tools & Technology. It's a triannual journal, started in 2014.</p><p align="center"> </p><p> </p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoSETTT</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Software evaluation Techniques</li><li>Software and complexity measures</li><li>System Analysis</li><li>Specification languages</li><li>Cloud computing</li><li>File and data structure design, Systems analysis tools</li><li>Software development, coding, verification and integration</li><li>Object Oriented Methodology</li><li>System Development Methods</li><li>Web Database Programming</li><li>Programming Concepts in C++</li><li>Object Oriented Development with Java</li></ul><p><strong> </strong></p><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: </strong><strong>JoSETTT</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p> </p><p><strong><a href="/index.php?journal=JoSETTT&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong><strong></strong></p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoSETTT&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong><br /></strong></p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong><br /></strong></p><p><strong>Phone no.:</strong> 0120-4781-240/ Email: nikita@stmjournals.com</p><p> </p>https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2719Drug Addict Reclamation Android App2021-06-25T10:17:41+00:00Hemant Falehemantfale1234@gmail.comKomal kesarkarhemantfale1234@gmail.comSafana Shaikhhemantfale1234@gmail.comAbhijeet Morehemantfale1234@gmail.com<p><em>The Android app comes as a proposed solution to drug addict people who cannot afford psychological treatment and who are afraid to describe themselves as drug addicts in society. The system is designed to act as aconsultation or referral. The system consists of four modules: home module, user module, counseling module, and admin module. We seek in our project to provide online environments for those who know about drugs that helped a couple of drug-free people who also allow adolescents to be led by a psychologist.</em></p>2021-06-25T10:16:45+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2769Physiotherapy using Pose Estimation2021-06-25T10:17:41+00:00Sarvesh Amberkarsarvesh.amberkar@gmail.comAkshay Badesarvesh.amberkar@gmail.comRina Borasarvesh.amberkar@gmail.comPrithviraj Patilsarvesh.amberkar@gmail.com<p><em>Physiotherapy is a kind of treatment that revolves around the science of movement and aids people by reinstating, rehabilitating, and maximising their physical strength, function, movement, and overall well-being by addressing the underlying issues. Physical therapy management commonly includes prescription or assistance in performing exercises. Physiotherapists work with their patients by preparing fitness programs, developing dietary, and various other lifestyle changes to help their patients recover and prevent the loss of mobility before it occurs by providing services to individuals and populations to improve, keep up, and reinstate maximum mobility and functional ability throughout their lifespan. This includes various services such as providing therapeutic treatment under the circumstances where movement and normal functioning is threatened by various adverse events such as aging, injury, disease, or environmental factors. In this paper, we present an interactive computer vision-based application which with the help of pose estimation will be able to assist any user in performing physiotherapy exercises in the comforts of their own homewhere the patient can perform the exercise anywhere and anytime at his own convenience independently without any human intervention. </em></p>2021-06-25T10:09:57+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2768The Overview of Software Testing: Types, Methods, and Levels2021-06-25T10:17:41+00:00Mithun S. Patilmeethunpatil@gmail.com<p><em>Software development life cycle (SDLC) is a software development model consisting of different phases i.e., analysis, design, coding, testing, deployment, and maintenance. The analysis phase is the primary phase in which all the requirements aregathered and analysed which is further used for designing and coding. The next phase is testing.Software testing is a process of evaluating software so as to check whether it satisfies the requirements of the customer or not and also to find the errors, defects, bugs, etc. Software testing is used to improve the quality and accuracy of the software. Software testing can be done manually or automated. There are many reasons why software testing is important like for security, satisfaction of the customer, enhancing the development process, to check whether all modules and features of the software are running properly or not. Software testing does not deal only with the functional part like unit testing, integration testing, etc. but it is also used to check the non-functional aspects like performance, compatibility, usability, etc. This paper presents the different types of software testing i.e., functional and non-functional, methods, and levels of software testing.Comparison betweensoftware testing methods like Black Box, White Box, and Gray Box are also explained.</em></p>2021-06-25T09:54:17+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2767Child Welfare Management Application Based on Android2021-06-25T10:17:41+00:00Azhar Sayedazzy.sayed.330@gmail.comAditya Singhazzy.sayed.330@gmail.comSahil Bhaldarazzy.sayed.330@gmail.com<p><em>The aim of the kids’welfare association is to shield the simplest interest of the kids and to push the soundness among the kids. We have a tendency to believe in a world where each kid will scan. Through the kids’welfare association, our mission is to develop a system where we will invest in infancy education so as toempower the succeeding generation. This is often achieved by making instructional programs and providing necessary resources in underclass areas. This technique can keep all the records of the children’s activities happening monthly, scholarships, and donations. Mainstreaming the children inside the public structure by giving consideration, support,and protection through shelter, food, and education is our mission. Their basic desires are met and they are going to get new life through gaining data, occupational skills,and life skills. They are going to get love and affection as if their oldsters offer. Their confidence level can increase and become sensible quality to the community. They will develop physically and psychologically and create pretty much as good and productive voters. They are going to inspire by financial aid,and show humanity towards the community.<strong></strong></em></p>2021-06-25T08:39:30+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2747Role of E-Learning-Virtual Classroom Teaching During COVID-192021-06-25T10:17:41+00:00Nidhi Bhatnagarbhatnagar.nidhi.26@gmail.com<p><em>The cross country COVID-19 lockdown has constrained K-12 schools and colleges to close and send their understudies home which, thus, has affected more than 91% of the world's understudy populace. The closure has placed unprecedented challenges on governments, institutions, teachers, parents and caregivers around the world. During COVID-19 education has become the most important issue in the world. Due to the dire effects of corona virus all the education institutes are shut down with no deadline to reopen. Every student, parents and teachers are worried about the prevailing uncertainty of physical classroom teaching. To bridge this gap, online E-learning is the best suited tool for teachers and learners. E-learning can be characterized as the utilization of instructive advances to configuration, convey, and oversee both formal and casual learning and information sharing whenever, any speed and any spot. E-learning activities are designed to fit the specific context for learning, the nature of the subject matter; need and goals of the learner, the learner’s environment and instructional technologies methods.</em></p>2021-06-10T12:29:21+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2654Software Quality Assurance and Systemic Review2021-02-11T04:37:11+00:00Payal M. Thakrarpayal.mashru@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Quality is most of the important factor in industries now a day. Software industries have to work on quality assurance and control, as day by day variety of software is developed and drawn in the market. To satisfy the growing demand and need of customer in today's competitive world companies have to concentrate on the software quality, which is checked while the development of software. Software quality depends upon customer satisfaction which can be achieved through applying standards. With increasing demand for software products with high “Quality”, it has become imperative for organizations to adopt quality models like (International Standard Organization) ISO 9001, (Capability Maturity Model Integration) CMMI or Six Sigma etc. to set and sail on their quality journey. While designing, the architect should analyze the system requirements before committing the resources to it. The analyzing process helps us to ensure the high quality of architecture design. Software testing is an important technique for assessing the quality of a software product. For maintaining the quality, performance, speed, efficiency, and cost of the software quality Assurance activities, principles, and methods are implemented in the early stages of software engineering development phases. The Software Engineering Institute (SEI) Maturity Model and other standards are relevant in understanding the importance and roles of the quality group.</em></p>2021-02-11T04:36:43+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2578Dynamic Analysis Based Software Modularization Augmenting Weighted Module Dependency Graphs2021-02-11T04:37:11+00:00Harleen Kaurer.harleenkaur@gmail.comGeeta Sikkaer.harleenkaurjas@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>The requirements for systems change over time and as the software systems evolve their designs degenerate, making it necessary to restructure the system to recoup with the apprehension that was lost. Without complete knowledge of a software system, a software maintainer may find it difficult to modify the system. A complete understanding of the system is must before making any change to the placement structure of software components and entities. The process of reverse engineering starts with an analysis phase where a system is analyzed by extracting its structure using automated tools. It is very crucial for the developers to understand the system structure before making an attempt to modify it. The dependency structure can be viewed as a directed Module dependency graph (MDG). This research focuses on enriching the MDG for a better understanding of the system structure by assigning different weights to different kind of code dependencies. To each kind of coupling relation different weights are assigned. A naive function has been defined to generate weighted MDGs. The MDGs are generated using static as well as dynamic analysis. Using these graphs for software re-modularization tests the effectiveness of approach.</em></p>2021-02-11T04:26:54+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2632Home-Automation System for Renewable Energy Self-Consumption Optimization2021-02-11T04:37:11+00:00Rishi Shrivastavarishi8269@gmail.comProf. Priyanka Tripathi Choubeyrishi8269@gmail.comProf. Sunil Shahrishi8269@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>One of the largest problems regarding the distributed production of renewable energy is that the effective employment of the produced energy. Usually, this energy is reintroduced within the grid with an obstacle for the producer. During this scenario, we propose an approach that aims at exploiting the whole energy production reintroducing into the grid only the part in excess. The proposed solution is predicated on a tool, called energy switch, that permits a change of the electrical energy source of a system like one linked to both photovoltaic and classical energy grid. This operation needs many considerations for warranting a right energy and avoiding energy lacks potentially dangerous for the appliances. Particularly the system must be able to recognize the situations within which it is possible to use the cheaper source without causing an energy lack to the system. Within the proposed solution, the input file for the system are given by the OMeter stations made by this purpose Over Technologies, a spin-off of Sapienza University. A working type of the energy switch has been built for future empirical test about its efficiency. The system reduces the matter of choosing which lines to attach to which energy source to the knap-sack problem. The performance of the system is evaluated, checking power supply or, on the contrary.</em><em></em></p>2021-02-11T04:23:46+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2631Assessment of Voltage Stability and Event Detection in Distribution Grid with Penetration of Renewable Energy Sources2021-02-11T04:37:11+00:00Deepti Hanwatrajeevchauhan@ggits.orgRajeev Kumar Chauhanrajeevchauhan@ggits.org<p><strong> Abstract</strong></p><p>In this paper we proposed a method which is based on FFT (Fast Fourier Transform) analysis for the assessment and detection of outage of renewable energy, islanding event and grid synchronization of renewable energy. The Voltage signals should be measured, and features extracted are realized to assess the power quality disturbance associated with various events. Operational events are detected with the help of features extracted from the FFT analysis of the measured voltage at substation bus. An FFT analysis based various operational events assessed and detected. This proposed method has been tested successfully on IEEE-09 bus system with necessary modification to integrate wind and solar PV generators to form the hybrid power system. The load flow is done by forward backward sweep method. Simulation results are validated in real time environment with practical data.</p>2021-02-11T04:08:54+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2588Smart Power: An Efficient DC Power System2021-02-11T04:37:11+00:00Hardikkumar V. Mehtahvm2212000@gmail.comKrutika K. Mehrahvm2212000@gmail.comTirth R. Doshihvm2212000@gmail.comHetul P. Sutharhvm2212000@gmail.com<p><strong>Abstract</strong> Attempting to reduce energy losses, as well as rapid resource demands rise has been a problem worldwide in recent years. To solve this problem, Smart Power is designed to make an efficient DC Power System. Smart Power scheme has achieved a reduction of cost in the DC power system and also increased efficiency of the overall power system. In Smart Power, in place of a synchronous generator, a high-efficiency interior permanent magnet (IPM) generator is used. To increase efficiency and reduce initial cost, Smart Power uses Rectifier, Boost converters, DC transmission line, Buck converter, and Distributed inverters. Smart Power transmits in the DC power up to Energy meter, after that there will be an inverter that will convert DC power into AC power. In the future, there will be all residential and industrial area having solar PV system as well as windmill. Conventional power system may have a problem to synchronize with a solar PV system and also, AC power cannot be stored in battery. In the Smart Power system, there will be an easier way to synchronize the renewable energy sources and nonrenewable energy sources. In the Smart Power system, there will only one condition to be satisfied for the synchronization of two-line which is the same voltage level.</p><p><strong>Keywords:</strong> Boost converter; buck converter; efficient DC power system; HVAC transmission; HVDC Transmission; inverter; rectifier; renewable energy; smart grid; Smart Power</p><p><strong>Cite this Article</strong> Hardikkumar V. Mehta, Krutika K. Mehra, Tirth R. Doshi, Hetul P. Suthar. Smart Power: An Efficient DC Power System. Journal of Software Engineering Tools & Technology Trends. 2020; 7(3): 1–7p.</p>2020-10-21T00:00:00+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2569An Enhanced Application Oriented Predictive Analytic using Optimal Deep Learning Model2020-08-26T10:02:23+00:00Vaishali Mate Bhagatmatevaishali2@gmail.comV.U. Deorankarmatevaishali2@gmail.com<p>In order to presents better Predictiveanalytic models of different data using various machine learning algorithms. The data prediction is developed on various applications. These applications are facing many challenges while collecting data and data selection etc. The proposed prediction model involves several phases like (a) Data acquisition, (b) Data cleaning, (c) Data normalization, (d) Optimal Feature selection, and (e) Prediction. The optimal feature selection will be accomplished by a new variant of meta-heuristic algorithm like Self Adaptive-Spider Monkey Optimization (SA-SMO) [26]. The optimally selected features will be subjected to an improved deep learning algorithm termed as Recurrent Neural Network (RNN).</p><p>Keywords:Big data, Self Adaptive-Spider Monkey Optimization (SA-SMO), Recurrent Neural Network (RNN).</p><p>Cite this Article: V.B. Bhagat, V.U. Deorankar. An Enhanced Application Oriented Predictive Analytic using Optimal Deep Learning Model. Journal of Software Engineering Tools & Technology Trends. 2020; 7(2): 5–10p.</p>2020-08-21T07:06:04+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2567Academic Performance Management Algorithm2020-08-21T07:07:26+00:00Swati Jainswati_12bafna@yahoo.co.inSunil Kumar Kashyapswati_12bafna@yahoo.co.in<p>An application of Genetic Algorithm (GA) is presented in this paper to manage the academic performance of the students. This will be an important tool to apply in any academic institute for improving the performance of their students. There is an algorithm for fitting to the feedback form of the students after completion of any academic modules. This is analyzed over the correspondence of personal interview. In this paper, GA based academic performance management is proposed.</p><p>Keywords: Genetic Algorithm, Academic Performance Management, Personal Interview, Feedback Form, Academic Modules</p><p>Cite this Article: Swati Jain, Sunil Kumar Kashyap. Academic Performance Management Algorithm. Journal of Software Engineering Tools & Technology Trends. 2020; 7(2): 1–4p.</p>2020-08-21T07:01:39+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2568Discrete Encryption2020-08-21T07:07:26+00:00Ashutosh Pandeyantu_28jd@yahoo.co.inSunil Kumar Kashyapantu_28jd@yahoo.co.in<p>The present work will be directed the future plan towards the security. This study is presented as the application of the fuzzy set and cryptography both. Zadeh’s contribution was the landmark in the development of real mathematical application but today this has been applied in almost every field of the society. Hard mathematical problem interacts with the security of any cryptography. Such mathematical problems are; factorization, discrete logarithm, lattice, quantum etc. In this paper, Hard Mathematical Problem (HMP) transform into the class comprises with the fuzzy called the Fuzzy Hard Problem (FHP). The message and the FHP generate a new system referred as the discrete encryption.</p><p>Keywords: Fuzzy, Cryptography, Discrete Logarithm, Factorization, Lattice, Quantum.</p><p>Cite this Article: Ashutosh Pandey, Sunil Kumar Kashyap. Discrete Encryption. Journal of Software Engineering Tools & Technology Trends. 2020; 7(2): 11–12p.</p>2020-08-21T06:51:30+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2566Medical Applications of Artificial Neural Network2020-08-21T07:07:26+00:00Deepshikha Sharmavdeeps7777@gmail.comSunil Kumar KashyapVdeeps7777@gmail.com<p>The correspondence between the natural neurons and artificial neurons is defined in this paper. Thus, an excellent idea appears to design the standard diagnosis key diagnosis systems, which security is based on the well known number theoretic problem, i.e. elliptic curve discrete logarithm problem in multiplicative group of the finite field. But now we are moving in the revolutionary idea, “The Automatic groups G converted into the multiplicative groups G’ of the finite field Zp* of the order p-1, where p is the prime number, If G and G’ are one-to-one and onto isomorphic (Theorem ) .” By using this theorem, we design the new diagnosis key diagnosis system, whose security or encoding scheme is strictly different as compare to the other traditional encoding scheme.</p><p>Keywords:Diagnosis, Automatic Groups, Neurons, Diagnosis Systems, Isomorphic.</p><p>Cite this Article: Deepshikha Sharma, Sunil Kumar Kashyap. Medical Applications of Artificial Neural Network. Journal of Software Engineering Tools & Technology Trends. 2020; 7(2): 23–30p.</p>2020-08-21T06:43:00+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2565Big Data Management: Theory & Practice2020-08-21T07:07:26+00:00Swati Jainswati_12bafna@yahoo.co.inSunil Kumar Kashyaswati_12bafna@yahoo.co.in<p>In this paper, Big Data Management is studied. There is finite number of information in Big Data and correspondingly its method of analysis exists. Big Data Analysis (BDA) method is proposed in this paper. A compact method (K-Means Cluster, Generalised K-Means Cluster, C-Means, Fuzzy Means, Fuzzy Numbers, Fuzzy Set, Fuzzy Logic, Neural Network, Genetic Algorithm) based big data analysis is presented in this paper. There are four models are presented as, probabilistic model, possibilistic model, fuzzy model and variance model. A compact algorithm is illustrated also in this paper.</p><p>Keywords: Big Data, K-Means Cluster, Generalised K-Means Cluster, C-Means, Fuzzy Means, Fuzzy Numbers, Fuzzy Set, Fuzzy Logic, Neural Network, Genetic Algorithm.</p><p>Cite this Article: Swati Jain, Sunil Kumar Kashyap. Big Data Management: Theory and Practice. Journal of Software Engineering Tools & Technology Trends. 2020; 7(2): 13–22p.</p>2020-08-21T06:32:38+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2392RFID Technology and its Application: A Vital Impact on Digital Era2020-06-02T11:06:46+00:00Anoop Singhanoop.bwn@gmail.comPriyanka .anoop.bwn@gmail.com<p>In the recent time, number of technologies is emerging from many field areas. RFID is main technology for tracking of objects for security purpose in daily life. In digital era, RFID technology transmits the identity of an objects or person wirelessly, using radio waves. Moves from obscure, RFID technology is an important aspect for digital era. By this technology, we can identify an object, automatically with the help of tag or a microchip. A wireless technology has changed the technology methods in easy way. RFID is the latest technology to be used in many areas for tracking, identifying, security and detection of theft. For security and tracking purposes, RFID technology provides a safe and security facilities for many areas. At the same time due to application of security system that promises to increase efficiency, productivity and enhance user satisfaction. Internet of things, which is now the talk of the world, is playing a vital role in all aspects of life. Emerging RFID system is rapidly growing and has the potential to affect many different field or areas.</p><p>Keywords: RFID Technology, components and its applications, digital era, security, wireless technology</p><p>Cite this Article: Anoop Singh, Priyanka. RFID Technology & its Application: A Vital Impact on Digital Era. Journal of Software Engineering Tools & Technology Trends. 2020; 7(1): 25–31p.</p>2020-06-02T11:06:30+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2438Understanding Text to Image Generation Techniques2020-06-02T11:06:46+00:00Apoorv Khandurikhapoorv@gmail.comPiyush Kumarkhapoorv@gmail.comAshish Joshikhapoorv@gmail.comRahul Kumarkhapoorv@gmail.com<p>In recent years, Generative Adversarial Networks (GANs) have been successful in generating realistic looking detailed images and has applications in data augmentation, astronomy, photo editing. This survey gives a brief introduction and review’s recent improvement in Generative Adversarial Networks (GAN’s) to generate images from their text descriptions. We present their effectiveness, their improvement and further scope of research and discussion on this topic. Introduction: text to image generation is the process of generating images from any set of data based on their text descriptions. The text description forms a part of the model which guides the model to create the image. Text to image generation forms a part of descriptive designing and multimodal learning and drives research for simplification and idea generation based on text description. Text to image generation solves the core problem of creating computer aided design by simple text description. Thus, all T2I problems encompass a GAN which is conditioned on text and thus unlike VanillaGAN or DCGAN will generate image based on the condition which is given to it. Why is t2i optimal for text to image? The improvement in GAN are towards global and local images to improve clarity of different parts of image and is also geared towards better semantic meaning of the given input.</p><p>Keywords: image generation techniques, GAN, T2I, text description, semantic technology</p><p>Cite this Article: Apoorv Khanduri, Piyush Kumar, Ashish Joshi, Rahul Kumar. Understanding Text to Image Generation Techniques. Journal of Software Engineering Tools & Technology Trends. 2020; 7(1): 18–24p.</p>2020-06-02T11:02:53+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2436Developing Intelligent Business Solutions Using Big Data2020-06-02T11:06:46+00:00Shivam Mishramishrashivam.226999@gmail.comAakash Shuklamishrashivam.226999@gmail.comHimandhu Kathuriamishrashivam.226999@gmail.comMandeep Singhmishrashivam.226999@gmail.com<p>Different types of industries and organizations are generating a large volume of data (known as big data). Analysis of such data has the potential to provide meaningful business insights and can be used to make various business decisions. However, the extraction of meaningful information from big data is not an easy task as it comes with different types of challenges. Production of actionable information and profitable decisions from big data is known as business intelligence. Business Intelligence and Analytics has emerged as an important area for researchers. A variety of big data analysis tools are available to perform different tasks like Apache Hive to analyze the data, Apache Sqoop to load data from RDBMS, etc. Our goal is to make a business intelligence solution for the retail environment by integrating different big data tools and extract some meaningful information which helps in decision making for some specific questions related to price optimization. We will store data in Hadoop from RDBMS and then perform data processing and query analysis using tools like spark and hive to produce information.</p><p>Keywords: Hadoop, Sqoop, Hive, Spark, Parquet</p><p>Cite this Article: Shivam Mishra, Aakash Shukla, Himandhu Kathuria, Mandeep Singh. Developing Intelligent Business Solutions Using Big Data. Journal of Software Engineering Tools & Technology Trends. 2020; 7(1): 12–17p.</p>2020-06-02T10:59:46+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2437Crawling, Indexing and Ranking in Search Engine2020-06-02T11:06:46+00:00Ramdas P. Bagawadesaniyadeshpande07@gmail.comSaniya Sunil Deshpandesaniyadeshpande07@gmail.comTejasvi D. Kalesaniyadeshpande07@gmail.com<p>The main objective of any Search Engine is to search appropriate and approximately accurate information. Search Engine Optimization (SEO) plays the primary and necessary role in the success of any business. Because SEO, not only increase the visibility and ranking, but also helps any organization to boost and increase sales by directing more and more traffic to the website. The three main tasks of the search engine are crawling, indexing and ranking. There are different techniques in SEO of crawling, indexing and ranking. Crawling, indexing and ranking are the important constituents of SEO for any website. These three constituents help to increase the online communication with the users.</p><p>Keywords: SE (Search Engine), SEO (Search Engine Optimization), URL (Uniform Resource Locator), Crawling, Indexing, Ranking, Web Crawler.</p><p>Cite this Article: Ramdas P. Bagawade, Saniya S. Deshpande, Tejasvi D. Kale. Crawling, Indexing and Ranking in Search Engine. Journal of Software Engineering Tools & Technology Trends. 2020; 7(1): 8–11p.</p>2020-06-02T10:56:37+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=2394Crack Assessment in Concrete Using Digital Image Processing: A Review2020-06-02T11:06:46+00:00Satnam Singhsatnamsingh517@gmail.comGurpreet Kaursatnamsingh517@gmail.comMandeep Kaursatnamsingh517@gmail.com<p>The health of civil structures is assessed continuously to avoid any kind of cracking in concrete that may lead to its sudden failure and not to mention, this kind of unfortunate situation is hazardous to all the civilians living in or around it. Thus, structural health monitoring becomes a vital process in structural engineering. The conventional practice of structural monitoring involves visual inspection of concrete structures by an inspector at the target site, which is very time consuming and prone to human errors. In recent years, the advancement in technology has introduced new ways of automating the process of structural monitoring and one such method is ‘Image Analysis’. Hence, this paper reviews various studies that propose the crack assessment in concrete using Digital Image Processing along with the major challenges and issues observed so far.</p><p>Keywords: Crack detection, Digital Image Processing, Structural Health Monitoring, image analysis, technology</p><p>Cite this Article: Satnam Singh, Gurpreet Kaur, Mandeep Kaur. Crack Assessment in Concrete Using Digital Image Processing: A Review. Journal of Software Engineering Tools & Technology Trends. 2020; 7(1): 1–7p.</p>2020-06-02T10:52:58+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=190Struts based Approach for the Development of Java Applications2021-07-17T12:23:08+00:00Ankur Saxenaasaxena1@amity.edu<p>This paper presents a procedural approach to develop a java based application using the Struts Framework. The struts framework is used to develop MVC based web application. The model view controller (MVC) is a fundamental design pattern for the separation between user interface logic and business logic. A strut is an elegant, extensible framework for creating enterprise Java applications. The framework is designed to streamline the full development cycle, from building, to deploying, to maintaining applications. Our research study shows that applying multiple frameworks to design the applications using MVC concepts makes applications easier compared to a single framework. In recent trends, more research papers have been proposed, which employs a new and fast process to implement web architecture and to avoid framework.</p><p><strong>Keywords</strong>: Java, Struts1, Struts2, MVC, Interceptor, POJO, ONGL, Web, Framework</p>2020-03-02T05:17:41+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=68Image Retrieval by Matching Sketches and Images2022-01-03T10:26:37+00:00Shashank TiwariShashank126tiwari@gmail.comSuhas GavhaneShashank126tiwari@gmail.comPramod GhuteShashank126tiwari@gmail.comAvinash MadpelliwarShashank126tiwari@gmail.comM.S. ShaikhShashank126tiwari@gmail.com<p>The proposed system provides a unique scheme for Content based image retrieval (CBIR) using sketches. CBIR is the application of computer vision to the image retrieval problem<br />is the problem of searching for digital images in the large database. Content based means; the search will analyze the contents of the images. The term ‘content’ may refer<br />to colors, shapes, textures or any other information that can be derived from the image itself. The main aim of CBIR is to extract visual content of an image automatically like color, texture, shape or any combination of them. The goal is to retrieve all the images whose content is similar to those of query image. Even a query sketch which is given as input will display related images from the frequently used database. Sketch will be drawn in a provided drawing area in the proposed system.</p><p><strong>Keywords</strong>: CBIR, query image, preprocessing, content</p>2020-02-29T07:19:00+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=86Image Interpolation and Object Recognition Approach based on SAI Algorithm with Normalized Cross Correlation2022-01-03T10:26:37+00:00Aruna Kumari Palisettyarunapalisetty@gmail.comR V Naga Suneetha Avvarusuneethaavvaru@gmail.com<p>This paper mainly deals with producing quality of an image using soft-decision interpolation technique and also identifying the particular object in that image with the help of Normalized Cross Correlation. the use of image interpolation, to reserve spatial details. Identifying the missing pixels in an image one by one for many times, we are proposing the new technique, identifying missing pixels in a group. This new technique can be applied to different screen structures by the use of 2-D piecewise autoregressive model. The result of this approach is similar to the 2-D interpolation filter. This approach is better than the existing approaches and it produces best results with visual quality. Some images may contain blurring, ridges, ringing are fully reduced in these<br />images. Now we have quality image, on this image we are recognizing a particular object in that image. To identify the object Normalized Cross Correlation is used. The aim of<br />object recognition is to identify object and estimate their location and orientation.</p><p><strong>Keywords</strong>: Autoregressive process, Image Interpolation, Soft-Decision Estimation, Object Recognition, Normalized Cross Correlation.</p>2020-02-29T07:10:27+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=89Image Encryption using Quadtree Compression Technique without any Key Management2022-01-03T10:26:37+00:00Pachigolla Srinivasnivas580@gmail.comPodili Srikanthnivas580@gmail.comAyinavalli Venkata Ramananivas580@gmail.com<p>Now-a-days maintaining the confidential data is a very tough task. When it comes to images, maintaining confidentiality and secrecy is equally difficult. In general there are two approaches being followed for image encryption. One is encrypting the image using encryption algorithms with keys and other is dividing the image into random shares. But<br />these approaches are having limitations like in first model, high computation cost and in second model poor quality. To overcome these problems we need to brainstorm another<br />approach, which is called Keyless Approach to Image Encryption. In this approach it involves Compression, Sieving, Division and Shuffling, reducing the computations and<br />also the image will be recovered without any loss of image quality.</p><p><strong>Keywords</strong>: Visual cryptography, sieving, division, shuffling, image quality,<br />compression.</p>2020-02-29T07:07:56+00:00https://computers.stmjournals.com/index.php?journal=JoSETTT&page=article&op=view&path%5B%5D=85Finest Round Robin Scheduling Algorithm using Effective Time Quantum2022-01-03T10:26:37+00:00K. Purushotam Naidukpnaidu@gvpcew.ac.inV.V.D. Prasad Chellurikpnaidu@gvpcew.ac.inS. Sumahasankpnaidu@gvpcew.ac.inR.D.D.V. Sivaramkpnaidu@gvpcew.ac.in<p>Scheduling is a most important task of operating-system function. Almost all computer resources are scheduled before use. CPU scheduling is the main task of multi -programmed operating systems. By switching the CPU among processes, the operating system can make the computer more effectively [1]. The CPU is one of the primary computer resources so its scheduling is central to operating-system design. In a simple computer system, the CPU then just sits idle. All this waiting time is wasted, no useful work is accomplished. With multiprogramming, we try to use this time productively. Several processes are kept in memory at one time. When one process has to wait, the operating system takes the CPU away from that process and gives the CPU to another process. Every time one process has to wait, another process can take over use of the CPU. In this paper, we have proposed an Finest Round Robin scheduling algorithm using Effective Time Quantum (FRRETQ) for Efficient CPU Utilization, less average waiting time and turnaround time of each process and minimum number of context switches taken to complete all processes than compare to Simple round robin and Adaptive round robin scheduling algorithms.</p><p><strong>Keywords</strong>: Scheduling, Multiprogramming, Simple round robin, Adaptive round<br />robin, waiting time, Context switch, Turnaround time</p>2020-02-29T07:04:22+00:00