https://computers.stmjournals.com/index.php?journal=JoWET&page=issue&op=feedJournal of Web Engineering & Technology2021-07-17T12:03:53+00:00Deeksha Sharmadeeksha.sharma@celnet.inOpen Journal Systems<p align="center"><strong><br /></strong></p><p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"><input style="width: 25px; height: 21px;" type="text" value="1" size="1" /></p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table><p> </p><p align="center"><strong>Journal of Web Engineering & Technology (JoWET)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2455-1880</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoWET&page=about&op=editorialTeam">here </a></strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 5.209<strong></strong></p><p><strong> </strong></p><p><strong>Journal of Web Engineering & Technology (JoWET)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Web Engineering & Technology. It's a triannual journal, started in 2014.</p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoWET</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Systems analysis and design</li><li>Hypermedia/hypertext engineering</li><li>Web Engineering tools & Methods</li><li>Modeling and model-based design and development</li><li>Navigation and hypermedia</li><li>Web design patterns and pattern mining</li><li>Web application evaluation, verification and validation</li><li>Web engineering for wireless platforms</li><li>Web standards, usability, universal accessibility, Semantic Web</li><li>Specification languages, management, negotiation and monitoring mechanisms.</li><li>Microsoft .NET, Sun One, IBM Web Sphere, Oracle Internet Application Server.</li><li>[Mobile] web services, service-based approaches</li><li>Performance monitoring, evaluation metrics</li><li>Application frameworks/architectures, processes, methodologies, testing</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: JoWET</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong><a href="/index.php?journal=JoWET&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p align="center"><strong> </strong></p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoWET&page=about&op=editorialTeam">Editorial Board</a></span></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong><br /></strong></p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong><br /></strong></p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p><p> </p>https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2710Live Health Monitoring System Using Internet of Things2021-06-25T11:19:39+00:00K Bharathbk.india2k@gmail.comM. Bharath Rajbk.india2k@gmail.comR. Gobinathbk.india2k@gmail.comK. Ilakkiyabk.india2k@gmail.comN. Kayalvizhibk.india2k@gmail.com<p><em>Health is a condition of complete physical, mental and social prosperity and not only the shortfall of infection or illness. Healthis the degree of valuable and metabolic power of a living organic entity. Nowadays death rates are increasing owing to sudden heart attack. Annually 7 lakhs sudden cardiac death (SCD) cases occur in India. Periodic medical check-up is required to monitor the heart patient’s body condition. The existing method only used inside the hospital and not portable and not wearable. The major drawback is some heart patients may die due to lateness in medication. Our main objective is to overcome this drawback by tracing heart patients live health details with the aid of sensors and internet. The live health monitoring system track the health details of heart patient's heart rate, oxygen level in the blood and temperature in the normal condition or abnormal condition and current location. Any abnormal changes the heart patient health details and location are send the Blynk server. Blynk app can also track the patient’s location using the map which is available in the Blynk application. The Blynk server is connected to Blynk app so we can see any time these details in our mobile. If system detects any abrupt changes in patient’s heart rate or temperature, the system will send the information and current location to patient’s relation or family doctor. If any emergency situation the message will send automatically to the heart patient caregivers. This project will helpful to reduce death rates and rescue those who are affected by sudden heart attack, safely medicated at correct time. This article explains about the idea in the field of health in order to save the peoples those who are in danger due to sudden heart attack by designing a wearable device which can sent the notification to the doctor or to his/her guardian when he/she is in danger with the help of Internet of Things.</em></p>2021-06-25T11:19:02+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2726Improved Double Layer Encryption Algorithm of Secret Codes in Steganography2021-06-25T11:19:39+00:00Dhiviya Rose Jdhiviyarj@ddn.upes.ac.inIsha Mittaldhiviyarj@ddn.upes.ac.inRamya Mihirdhiviyarj@ddn.upes.ac.inShubhangi Guptadhiviyarj@ddn.upes.ac.inSahil Vermadhiviyarj@ddn.upes.ac.in<p>Steganography is the way of hiding information to secure data for safer communication to take place. It is a process where the information is hidden in another format may be an image, voice, or video. Various other different file formats can be used, like JPG, JPEG, MP3, etc., but digital images are the<br />most popular and considered the best ones because of the frequency they provide on the Internet to the users. For hiding secret information in image format, various stenographic techniques can be used these days. Different applications require different options of the steganography technique that is used. Some applications that are used for this purpose require complete invisibility of the secret information while some of them require a large secret message that must be hidden. This project focuses on providing an overview of what is image steganography, its uses and the techniques used by steganography, and how it will provide double security to the user. For a more secure and a protected approach, the project encrypts the message using a two-level secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one with the help of the images. This project implementation will include hiding the text message/code in an image file, then encryption (the process of hiding) of the same message will be done, to support and make it more secure steganography and the decoding of the secret message, decryption and source message/code retrieval will be there with the help of the image.</p>2021-06-25T11:12:49+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2696Real-time Malicious URL Detection Using Machine Learning2021-06-25T11:19:39+00:00Suraj Prabhubsujata999@gmail.comSushant Pagambsujata999@gmail.comAdarsh Pednekarbsujata999@gmail.comSujata Bhairnallykarbsujata999@gmail.com<p><em>In malicious URLs (universal resource locators)discovery, antiquated classifiers are tested because of the information volume is enormous, designs are dynamical over the long haul, and furthermore the relationships among choices are modern. Feature engineering plays a crucial role in addressing these issues. To raised representation, the underlying the drawback and improve the performances of classifiers in characteristic malicious URLs.This paper proposes a mixture of linear and non-linear house transformation strategies. This paper proposes machine learning based mostly on the approach to scrutinizing universal resource locator instead of linear approaching of saving information and examination 33,1622 URLs with 62 options were collected to validate the planned feature engineering strategies.</em></p>2021-06-25T10:39:54+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2697Augmented Reality Navigation for College Campus2021-06-25T11:19:39+00:00Girish Gajanan Potepotegirish6@gmail.comVaibhav Shantaram Shindepotegirish6@gmail.comUttam Arjun Patropotegirish6@gmail.comVrushali Pankaj Thakurpotegirish6@gmail.com<p>We all already knows and used every time the outdoor navigation system which are based on GPS technology, but this is not possible for indoor navigation so with the help of augmented reality technology, we develop indoor navigation application which can be deployed in large buildings like hospital, college campus, airport and guide visitors to reach the desired destination point. With the help of this application, user get guided instructions like when he have to moved left, right or go straight and reach the destination location without any trouble. There is the navigation of the path in our system from starting position to the destination where the user wants to reach his destination with navigation system assistance. The user selects the location where he/she wants to reach in the campus, scans his/her current location and scans the beginning position. The 3D augmented visual pointing arrows on the device attendant the user to reach the desired location or destination point. The whole system was developed using Unity and Android Studio along with some other platforms, and will be ready to use in Android operating system. This is new thing and an innovation for the<br />local users of the Android and Unity. This project totally be used for simulations and user interactions as a developing platform.</p>2021-06-25T10:35:14+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2706Change in Education Scenario Due to COVID–192021-06-25T11:19:39+00:00Kajal Kumarikajubhardwajaecrc@gmail.comAnkita Jainkajubhardwajaecrc@gmail.comKomal Agarwalkajubhardwajaecrc@gmail.com<p><em>Challenges of Covid-19 and Changed Form of Education Process: An Exploration India not only the whole world is facing an unprecedented difficulty due to the 'Covid-19' epidemic.The lockdown led to the closure of all educational institutions, disrupting teaching. In order to ensure the smooth dissemination of knowledge, all educational institutions from school to university have to adopt alternative educational online learning, which is called digital learning, e-learning, web-based learning, virtual space learning, remote learning, distance learning or home education. Etc. are also known by names.In this way, Corona has forced us to work from the virtual platform (which is new to most) in place of the traditional real-world platform (in which we are more comfortable). A large number of students and teachers have shown eagerness in receiving new ways of online education, nevertheless many limitations. They are getting involved in online learning through forms of discussion, homework, providing digital study material and to some extent assessment, so they are eligible to be congratulated for accepting online education only to some level.</em></p>2021-05-26T08:38:01+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2628Quantum Cryptography: A New Approach in Cryptographic World2021-02-09T09:11:14+00:00Brindaba Zalazalabrindaba30@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>By applying the phenomena of quantum physics, this technology works. In quantum cryptography two parties can communicate via secure channel. When Stephen Wiesner wrote “Conjugate Coding” Quantum Cryptography was born in early seventies. Two components of quantum cryptography work under the Heisenberg uncertainty principle and the principle of photon polarization. The Heisenberg uncertainty principle states that “it is impossible to determine simultaneously and accurately the position and momentum of subatomic particle like electron in an atom.” In quantum mechanical era photon polarization is description of the classical polarized sinusoidal plan electromagnetic wave. This paper summarizes quantum cryptographic technology and future direction in which it forwards.</em></p>2021-02-09T09:08:43+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2611Survey on Web Analytics2021-02-09T09:11:14+00:00Jakanachari Kammarkjakanachari@gmail.comDr.Mohammed Rafikjakanachari@gmail.com<p> </p><p align="center"><strong><em>Abstract</em></strong></p><p><em>Web analytics</em><em> is the measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. However, Web analytics is not just a process for measuring web traffic but can be used as a tool for business and market research, and to assess and improve the effectiveness of a website. Web analytics applications can also help companies measure the results of traditional print or broadcast advertising campaigns. It helps one to estimate how changes traffic to a website after the launch of a new advertising campaign. Web analytics provides information about the number of visitors to a website and the number of page views. It helps gauge traffic and popularity trends which is useful for market research. A business needs it to collect the data about on-going activities, results, and effects of policies and strategies, etc., when it comes to online marketing. Web analytics comes to help to do this. Web analytics is used to determine the performance of investments assigned in terms of online advertises customers, and Business profitability, Web analytics plays an important role in calculating ROI of your business. This paper is intended to study the adoption of Business Intelligence (BI) with special emphasis on Mobile BI, in various fields during past 10 years and highlights the challenges faced by users in implementing the MBI in business intelligence. The study also emphasized on relationship between MBI and big data analytics, application of MBI, difficulties in using the MBI tools.</em></p>2021-02-09T09:00:54+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2613Review: IoT-based Real-Time Air Pollution Measurement for Jabalpur Smart City2021-02-09T09:11:14+00:00Santosh Kumar Pandeysantosh.juet@gmail.comShailesh Khaparkarsantosh.juet@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Humans are adversely affected by air pollution which is why health-based standards and objectives for the number of pollutants in the air are set by each country. Detection and measurement of the contents of the atmosphere is becoming increasingly important. Careful planning of measurements is essential. One of the major factors that influence the representation of data collected is the location of monitoring stations. The planning and setting up of a monitoring station are complex and incurs a huge expenditure. An IoT-based real-time air pollution monitoring system is proposed to monitor the pollution levels of various pollutants in Jabalpur city. The geographical areas are classified as industrial, residential, and traffic zones. This paper proposes an IoT system that could be deployed at any location and store the measured value in a cloud database, perform pollution analysis, and display the pollution level at any given location.</em></p>2021-02-09T08:51:45+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2615Opinion Mining through Enhanced Lexicon Approach2021-02-09T09:11:14+00:00Falak Janfalakmaraxi@gmail.comAfaq Alam Khanfalakmaraxi@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The World Wide Web’s rapid growth has enhanced online communication. One of the approaches to putting user views is the use of social networking sites. The user’s opinion needs to be analyzed by studying user’s input text using techniques of machine learning with subjectivity, emotion, sentiment analysis or polarity calculation. Most of the existing work in the field of opinion mining has largely focused on identifying sentiment polarity as positive, negative, or neutral. This paper presents an evaluation of sentiments from the 2016 Kashmir Unrest tweets to find people’s opinions as peace or protest during the unrest using enhanced lexicon approach. Lexicon-based approach has three methods of opinion mining: manual based method, dictionary-based method and corpus-based method. Dictionary-based method is used in this paper where two lexicons, the lexicon for peace and the lexicon for protest are created and then expanded using Word2Vec to determine opinion of general public during 2016 Kashmir Unrest.</em></p>2021-02-09T08:48:25+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2614A Review on Internet of Things and its Applications2021-02-09T09:11:14+00:00Sharmila Smcasharmi2007@gmail.comKanagaraj Amcasharmi2007@gmail.comFinny Belwin Amcasharmi2007@gmail.comLinda Sherin Amcasharmi2007@gmail.comDr. Antony Selvadoss Thanamanimcasharmi2007@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>We are entering a new age of technology in computing, i.e. From the Internet of Things (IoT). In the cloud, the IoT is a kind of universal global neural network that links different things. In order to address this new challenge, the IoT is an intelligently connected device and system consisting of smart machines that interact and communicate with other machines, environments, objects and infrastructures, and Radio Frequency Identification (RFID) and sensor network technologies. As a result, a large amount of data is generated, stored and processed into useful actions that can “command and control” stuff to make our lives much simpler and safer and reduce our environmental effects. The Internet of Things (IoT) is known to be an ecosystem comprising smart objects equipped with sensors, networking and processing technologies that integrate and work together to provide an environment in which end-users receive smart services. The IoT brings various advantages from the world into human life through which smart services are given to use any operation anywhere and at any time. All these services and facilities are transmitted via the various applications carried out in the IoT area. Monitoring and thus immediate decision-making for energy efficient management are the most significant utilities gained by the IoT applications. High business as well as social values are considered the huge data collected by the Internet of Things (IoT) and secret information is derived from raw data, different data mining algorithms can be applied to IoT data. In this paper, we survey systematic application analysis in the field of the Internet of Things (IoT) along with its merits and demerits.</em></p>2021-02-09T08:43:19+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2515Yojana Access: All schemes on one click2020-08-11T12:27:26+00:00Smriti Bharadwajsmritibhardwaj01@gmail.comNamrata Mishrasmritibhardwaj01@gmail.comRamneek Kalrasmritibhardwaj01@gmail.com<p>In a developing country like India, it becomes mandatory that every underprivileged member of the country is aware of the various schemes initiated by the government. Making use of the machine learning and web development, we propose an idea to develop an online portal that will serve as the direct link between the government and the citizens which is “Yojana Access”. This portal will reduce the paperwork and there will hardly be any need left to actually go on-site and take the survey in person. On the basis of the data collected the portal will be able to display nearly exact statistics by making use of machine learning algorithms whereas the web development will help us create an interactive interface for the portal.Improving the communication between the government and the citizens is one of the major assistances that this portal will provide. Besides that, we will be able to fight poverty in a strategic manner. Through this portal we will be able to convey the different schemes to the citizens by attaching a link to these schemes in the portal. This will be another step towards the making of digital India and towards reducing corruption by removing the third party/mediators.</p><p>Keywords: Machine Learning, Web development, Digital India, HTML, Firebase</p><p>Cite this Article: Smriti Bharadwaj, Namrata Mishra, Ramneek Kalra. Yojana Access: All Schemes on One Click.Journal of Web Engineering & Technology. 2020; 7(2): 32–38p.</p>2020-08-11T12:26:51+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2476Web Content Extraction Based on Tag-Row-Block Web Mining2020-08-11T12:27:26+00:00T. Velumanivelumani46@gmail.com<p>Information retrieval and Web mining are closely related to the content of Web pages. Due to the rapid development of Web technology, some previous automatic Web content extraction methods are no longer well suited to the current situation. Therefore, this paper proposes a universal content extraction method (CETRB) based on Tag-Row-Block, which is suitable for the current environment. The CETRB method, which combines the visual features and functional features of HTML tags with the row-block distribution function, further improves the precision, recall, and extraction efficiency of the existing Web content extraction methods, and solves the problems of manual threshold setting and universality of multi-source information. Our empirical study on different types of real-world Web pages demonstrates that the method we proposed has great extraction effect and high efficiency for single-content and multi-content pages, English and Chinese pages. It also supports the extraction of multimedia information, and the display effect is consistent with the original semantics, which can provide a comfortable reading experience. At the same time, we conducted the same experiments using the current popular Chinese extraction method Cx-Extractor and the English extraction method Readability. The conclusion is that our proposal outperforms them in terms of precision and recall, and is superior to the Readability method in terms of extraction efficiency. At the same time, it has great advantages in terms of universality and user reading experience.</p><p>Keywords:Content extraction, information retrieval, Web data mining, knowledge-based Systems, Web Content.</p><p>Cite this Article: T. Velumani. Web Content Extraction Based on Tag-Row-Block Web Mining. Journal of Web Engineering & Technology. 2020; 7(2): 18–31p.</p>2020-08-11T12:23:46+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2420Specific Search Engine Optimization2020-08-11T12:27:26+00:00Anjani Shrikant Patkianjipatki1998@gmail.comAishwarya Rajkumar Gandhiaishwaryagandhi1198@gmail.comRamdas Pandurang Bagawaderam.vish22@gmail.com<p>Search Engine Optimization (SEO) is the technique to improve website traffic by increasing the discoverability of websites. Generally, it takes in efforts to improve natural outputs and keep out the online advertising. The sites mostly visited or searched are at top rankings. SEO can perform various searches such as image, video, news or industry specific searches. As a point of view to web marketing, SEO considers how the search algorithm works and strategy for what do people generally search for. Using SEO, results can be presented in well formats as well as problems can be fixed that may cause due to search engine indexing performed by crawling sites. Also, it ensures unique contents to a site, proper indexing by bots and making site attractive to users. ACM</p><p>Keywords: SEO (Search Engine Optimization), URL (Uniform Resource Locator), HTTP (HyperText Transfer Protocol), SEM (Search Engine Marketing), SERPs (Search Engine Results Pages), SSEO (Specific Search Engine Optimization).</p><p>Cite this Article: Ramdas P. Bagawade, Aishwarya R. Gandhi, Anjani S. Patki.Specific Search Engine Optimization. Journal of Web Engineering & Technology. 2020; 7(2): 13–17p.</p>2020-08-11T12:21:34+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2475Awareness and Usage of Electronic Resources by the Faculty and Students of self-finance Post Graduate engineering colleges affiliated to GTU : A Study2020-09-03T07:17:24+00:00Nimesh Kantilal Jotangiank.jotangia@gmail.comJagdishchandra P. Gondaliank.jotangia@gmail.com<p>The study was conducted to find out the use of Electronic Resources by the students of Faculty members and students of self-finance post graduate engineering colleges affiliated to GTU. Objectives of the study were to determine the frequency of utilization, major problems users face while using e-resources, to study the purpose of use, to determine the advantages and disadvantages, and to find out the format which users usually prefer. The data was collected with the help of a questionnaire and analyzed by a simple statistical method. A total number of 625 users from the postgraduate engineering students and faculty members were selected and their response was obtained with the help of a questionnaire. According to the main findings of this research the students and faculty members seem to be very interested in using e-resources, because they use e-resources for their research, academic and teaching purpose. The main obstacles found during this study are slow internet speed, lack of ICT Infrastructure and Access has been restricted to Campus only, etc. It is also recommended that post graduate engineering colleges should arrange an orientation programme for the maximum usage of e-resources. Colleges should have to provide sufficient infrastructure and separate e-resource sections with high internet speed networks within campus.</p><p>Keywords: Electronic Resources, Library, GTU, Post Graduate Engineering Colleges, technology.</p><p>Cite this Article: Nimesh Kantilal Jotangia, Dr. Jagdishchandra P. Gondalia. Awareness and Usage of Electronic Resources by the Faculty and Students of Self-finance Post Graduate Engineering Colleges Affiliated to GTU: A Study.Journal of Web Engineering & Technology. 2020; 7(2): 5–13p.</p>2020-08-11T12:15:57+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2516Analyzing the User Experience of Mobile Instant Messaging Service2020-08-11T12:27:26+00:00Ruchika Kankarianilesh.uke@gmail.comNilesh Ukenilesh.uke@gmail.com<p>Due to widespread and ubiquitous availability of smartphones, we see many Instant Messaging Services (IMS) being used by today’s youths. Instant Messaging Services on mobile devices is becoming increasingly popular and have the potential to support effective social interactions. These applications provide functionality beyond traditional short message service (SMS). Even though various IMS has been expanding vastly along with mobile technology, current applications have not sufficiently addressed the needs of all the users. Despite their prevalence, many users have very limited knowledge on user behavior and data performance of different services provided. This paper suggests some improvements in the current versions of instant messaging services available in the market. These improvements are suggested to focus on how to make the user experience while using these services better. This work intends to determine what features influence their use of the application and how the relationship of these factors isarticulated.</p><p>Keywords: Smartphone; Instant Messaging Services; Whatsapp, Short Message Service, technology</p><p>Cite this Article: Ruchika Kankaria, Nilesh Uke. Analyzing the user Experience of Mobile Instant Messaging Service.Journal of Web Engineering & Technology. 2020; 7(2): 1–4p.</p>2020-08-11T12:12:14+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2464Sentiment Analysis Based Telecom Churn Prediction2020-05-27T09:09:05+00:00Sandeep Ranjanersandeepranjan@yahoo.comSumesh Soodersandeepranjan@yahoo.com<p>Predicting customer churn is a big challenge and a survival basic for Telecom operators. In a large and competitive market like India, it is very essential to gather real-time customer feedback as a health indicator. Social networks have evolved as a rich source of real-time sentiments and opinions of the general public. In this research, tweets for the Twitter handle of 5 major telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for six months to develop a prediction model for telecom subscriber churn prediction using the sentiment score. Naïve Bayes classifier implementation and TextBlob library of Python were used to assign polarities to user sentiments. Customer satisfaction represented by the overall monthly sentiment score has been used to predict customer churn. The predictions made by the model were validated using IBM SPSS and were within the acceptable limits. The results of the sentiment analysis based prediction model can be of great use for telecom operators to take timely actions for improving the future customer experience and avoiding customer churn.</p><p>Keywords: Customer Churn, Naive Bayes, Opinion Mining, Sentiment Analysis, Social Network.</p>Cite this Article: Sandeep Ranjan, Sumesh Sood. Sentiment analysis based telecom churn prediction. Journal of Web Engineering & Technology. 2020; 7 (1): 6–12.2020-05-27T09:08:23+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2385Credit Card Fraud Detection Using Deep Learning Techniques2020-05-27T09:09:05+00:00R. Suvarnasuvarna12jan@gmail.comA. Meena Kowshalyameenakowsalya@gct.ac.in<p>Credit card frauds have become very common nowadays and lot of cases has been reported in the recent past with the increase in cybercrimes. Online credit card frauds can be efficiently detected exploiting deep-learning techniques. This paper proposes two unsupervised learning algorithms namely Auto encoder and RBM (Restricted Boltzmann Machine) that acquire information from new transactions and estimate anomalous patterns from these transactions to accurately predict number of credit card fraudulent users. Auto encoder and Restricted Boltzmann Machine were applied to credit card datasets of two continents namely Australia with 690 instances and Europe with 284,807 transactions to find the number of fraudulent users. Python libraries such as numpy, tensor flow, and sklearn were exploited to predict the accuracy, model loss and area under curve for both the datasets and the respective confusion matrix was found. The average accuracy of Auto encoder is 73% and 99% and RBM is 96% and 92% for European and Australian datasets, respectively.</p><p>Keywords: Auto encoder, confusion matrix, credit card fraud, python library, restricted boltzmann machine</p><p>Cite this Article: R Suvarna, A Meena Kowshalya. Credit card fraud detection using deep learning techniques. Journal of Web Engineering & Technology. 2020; 7 (1): 30–47.</p>2020-05-27T07:20:34+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2446Optimization of Artifact Free Image Upscaling Using Genetic Algorithm2020-05-27T09:09:05+00:00Anismha M.K.aminamk98@gmail.comShamna A.R.aminamk98@gmail.comAsmin M.K.aminamk98@gmail.comAsmin M.K.aminamk98@gmail.com<p>Creating an upscaled image from a low-resolution (LR) image to high resolution (HR) is very interesting. The nature and texture of an image should be maintained during upscaling of an image. This upscaling is also termed as “super-resolution”. It is related to both, statistical relationships between low-resolution and high-resolution. Several methods have been proposed to obtain better results, involving simple heuristics, edge modeling or statistical learning. The most powerful ones, however, present a high computational complexity, while fast methods, even if edge-adaptive, are not able to provide artifacts free images. In this paper, a simple and effective scheme for image upscaling is proposed. To balance visual quality and complexity, an optimal weight allocation using genetic algorithm is proposed which interpolates local pixel values along the direction where second order image derivative is lower. The scheme keeps the images as sharp as the original while avoiding magnifying noise and artifacts in the image. The high quality of the images enlarged with the new method is demonstrated with objective and subjective tests, while the computation time is reduced.</p><p>Keywords: Super-resolution, image upscaling, low resolution, high resolution, genetic algorithm</p><p>Cite this Article: Anishma MK, Shamna AR, Asmin MK, Asmin MK. Optimization of artifact free image upscaling using genetic algorithm. Journal of Web Engineering & Technology. 2020; 7(1): 21–29.</p>2020-05-27T07:17:21+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2409New Technologies in Production Engineering2020-05-27T09:09:05+00:00Mrityunjay Kumarmrityunjay828@gmail.comAnil Kumar Sharmamrityunjay828@gmail.comRohit Kumar Sharmamrityunjay828@gmail.com<p>The advances of the Fourth Modern Revolution are obscuring the lines between the physical, computerized and natural circles of worldwide creation frameworks. The present pace of mechanical improvement is applying significant changes in transit individuals’ lives and work. It is affecting all controls, economies and enterprises, maybe none more than creation, and how, what, why and where people create and convey items and administrations. Creation exercises, characterized as the full chain to “source-make-convey devour reintegrate” items and administrations, will be adjusted and stretched out in manners that are hard to completely conceive – from start of information sources, item plan and assembling, to dispersion, client/shopper use and components of the roundabout economy/return/reuse. Achievements in key zones are reforming the fate of creation, including man-made brainpower, applied autonomy, the web of things, self-governing vehicles, 3D printing, nanotechnology, biotechnology, materials science, vitality stockpiling and quantum registering.</p><p>Keywords: Fourth modern revolution, IOT, source-make-convey devour reintegrate, smart production, technologies</p><p>Cite this Article: Mrityunjay Kumar, Anil Kumar Sharma, Rohit Kumar Sharma. New technologies in production engineering. Journal of Web Engineering & Technology . 2020; 7 (1): 1–5.</p>2020-05-27T06:35:35+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2384Improve the Performance of Proxy Caching Using LRU, AVL Tree and BST2020-05-27T09:09:05+00:00Jitendra Singh Kushwahjsk2474@gmail.comSitendra Tamrakardrsitendra@gmail.com<p>Proxy caching is increase the performance to access the web pages. Multiple computer in a network uses multiple cache for better performance. Caching of Multi-level normally works through testing the minimum load cache. Uncertainty you miss a lower level cache than the search for next level cache. This paper will study L1 cache such as the primary cache and L2 cache such as the secondary form of cache of the proxy server. LRU used as the replacement of cache algorithm. Previously LRU technique used to eliminate the cold caching pollution but it is not much efficiently work. So we overcome this problem with used other algorithm in LRU. In this paper, there we used three techniques such as LRU, AVL Tree and Binary Search Tree (BST). The performance has been increase using these techniques on the basis of access time. The result shows in the form of tables and graphs that shows, AVL tree is best among these techniques used with LRU.</p><p>Keywords: Access time, AVL tree, binary search tree, LRU, proxy server</p><p>Cite this Article: Jitendra Singh Kushwah, Sitendra Tamrakar. Improve the performance of proxy caching using LRU, AVL tree and BST. Journal of Web Engineering & Technology. 2020; 7 (1): 13–20.</p>2020-05-15T05:07:48+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=243A Survey on Different Clustering Algorithms with Their Major Features2021-07-17T12:03:53+00:00Pratishtha Singh Baghelpratishthasingh27@gmail.comDivakar Singhdivakar_singh@rediffmail.com<p>Data mining techniques make it possible to search large amounts of data for characteristic rules and patterns. Clustering is used to organize data for efficient retrieval. The aim is to create homogeneous subgroups of examples. The individuals in the same subgroup are similar; the individuals in different subgroups are as different as possible. One of the problems in clustering is the identification of clusters in given data. A popular technique for clustering is based on K-means such that the data is partitioned into K clusters. K‐means is a clustering (unsupervised learning) algorithm. In this method, the number of clusters is pre defined and the technique is highly dependent on the initial identification of elements that represent the clusters well. But we cannot change number of cluster at mid of execution of algorithm. But in k-mean, important factor is that how many clusters we should take, it may be less and it may be more. This paper gives an overview of different clustering algorithms used in large data sets. It describes about the general working behaviour, and the methodologies followed on these approaches and the parameters which used in these algorithms with large data sets.</p><p><strong>Keywords</strong>: Data-mining, association, clustering<br /><br /></p>2020-01-30T08:59:23+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=139A Survey Paper on Estimating the Online Social Networking Site2021-07-17T12:03:40+00:00Deepti Bhagwanideepti.mca07@gmail.comDr. Setu Kumar Chaturvedideepti.mca07@gmail.com<p>A social network is a set of people or organizations or other social entities connected by set of social relationships such as friendship, co-working or information exchange. Estimating the server load of online social network sites is the most challenging research topic of the network management system. Also the online social web servers are existing in various countries. This Paper provides the necessary background on the online social<br />networking sites and the Techniques that are applied on social networking sites to maintain them.</p><p><strong>Keywords</strong>: Online social media, online social networking, human Factor,<br />information System</p><p> </p>2020-01-30T08:24:58+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2270Accompanied between the Solar Panel and the Power Mains for Different Loads2019-11-14T09:53:00+00:00Mayank Kumar Laxkar2015pieteemayank024@poornima.orgMohit Gothwal2015pieteemayank024@poornima.orgShuchi Shukla2015pieteemayank024@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>Today, with rising fuel costs, expanding worries for worldwide environmental change, and a developing overall interest for power, using inexhaustible sources, for example, sun-based power progresses toward becoming a need instead of an extravagance. The primary spotlight is on giving vitality at the sensible cost; yet, soon the day will come when the utilities will concentrate on including manageable use and natural improvement into their plans. In contrast to ordinary age, the sunrays are accessible at no expense and create power contamination free. This study goes for building up a continuous, strong and clever network associated sunlight-based board so as to give capacity to the heaps from sun-based board at daytime and change the ability to the consistent DC sources when the sun-based power falls underneath a pre-characterized limit. This changing of intensity from sun-based board to a steady source is controlled through LabVIEW, utilizing data acquisition card and power hand-off. The framework can be conveyed for ensured access to control at home or industry, regardless of whether the sun-oriented vitality comes up short or is inadequate.</em></p><p><strong><em>Keywords: </em></strong><em>Renewable sources, insightful network associated sunlight-based board, Lab VIEW</em><em>, data acquisition card</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Mayank Kumar Laxkar, Mohit Gothwal, Shuchi Shukla. Accompanied between the Solar Panel and the Power Mains for Different Loads. Journal of Web Engineering & Technology. 2019; 6(3): 37–46p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T09:52:44+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2282Integrated System of 3D Printer and Wifi Remote Control2019-11-14T09:53:00+00:00Amish Garasiya2015pietecamish@poornima.orgAnshu Chandola2015pietanshu@poornima.orgGaurav Bhawariya2015pietecgaurav@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>3D printer is a fabrication of model through software. The idea for integrating a 3D printer having Wi-Fi feature is to make it cost efficient because in today’s era, due to the high cost of these printers, they are only limited to the industry but not to the ordinary people. The technology of 3D printing can be used in many industries for making construction work, toys, art and craft prototype, recyclable prototypes, engineering aerospace and automotive spare parts.<strong></strong></em></p><p><strong><em>Keywords: </em></strong><em>Integrating, technology, prototype, aerospace, STL format, micro-stepping</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Amish Garasiya, Anshu Chandola, Gaurav Bhawariya, Manish Singhal. Integrated System of 3D Printer and Wi-Fi Remote Control. Journal of Web Engineering & Technology. 2019; 6(3): 29–36p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T09:50:26+00:00https://computers.stmjournals.com/index.php?journal=JoWET&page=article&op=view&path%5B%5D=2276Energy Minimization by Nanotechnology Structures based on CNTFET GaAs2019-11-14T09:53:00+00:00Anshu Chandola2015pietecanshu@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>In this study, we will compare the carbon nanotube-based field effect transistors with the conventional MOSFET (metal–semiconductor field-effect transistor) on the basics of various parameters like effect of temperature, its channel length, its capacitance, and its operating frequency. The purpose of this comparison between these two transistors is that due to the reason of scaling down of size of the transistor in nanometers so that more components can be fabricated in a single chip with less power dissipation.</em></p><p><strong><em>Keywords: </em></strong><em>Conventional, capacitance, carbon, fabricated</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Anshu Chandola. Energy Minimization by Nanotechnology Structures based on CNTFET GaAs. Journal of Web Engineering & Technology. 2019; 6(3): 23–28p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T09:47:14+00:00