Recent Trends in Programming languages
https://computers.stmjournals.com/index.php?journal=RTPL
<p align="center"><strong> </strong></p><p align="center"><strong>Recent Trends in Programming Languages (RTPL)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2455-1821</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=RTPL&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong> </strong></p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 5.93</p><p><strong> </strong></p><p><strong> </strong></p><p><strong>Recent Trends in Programming Languages (RTPL)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Programming Languages. It's a triannual journal, started in 2014.</p><p><strong> </strong></p><p><strong> </strong><strong>Journal DOI no</strong>.: 10.37591/ RTPL</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>High - Level programming languages</li><li>Data Representation, Data Abstraction, Procedure activation</li><li>Programming Language C</li><li>IF- - THEN - ELSE, SWITCH, WHILE, FOR, DO</li><li>Parameter passing, Pointers, Arrays, Structures, C-Library</li><li>Program transformation techniques</li><li>Functional programming in different application areas: security, mobility, telecommunications applications, embedded systems, global computing, grids, etc.</li><li>Debugging for functional languages</li><li>Interoperability with imperative programming languages</li><li>Functional programming and multicourse / many-core computing</li><li>Programming Language Implementation</li><li>Programming Languages for Concurrency</li><li>Runtime Techniques for Programming Languages</li><li>Static and Dynamic Program Analysis</li><li>Software Model Checking</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong><br /></strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong></strong></p><p><strong>Abbreviation: </strong><strong>RTPL</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong> </strong></p><p><strong><a href="/index.php?journal=RTPL&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p> </p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=RTPL&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong><br /></strong></p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong><br /></strong></p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p><p> </p><p align="center"><strong><br /></strong></p><p align="center"><strong> </strong></p>en-USRecent Trends in Programming languages2455-1821<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>A Study of Hand Gesture Identification with Convolution Neural Network
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2759
<em>Human-Computer Interaction is the study of how the people interact with machine. Hand gesture technology is active research in computer vision and machine learning. Hand gesture recognition is used enormously in the recent years for Human Computer Interaction (HCI). In this research work, we study about hand gesture identification with machine learning technique. Basically implementation of hand gesture identification has three phases: Preprocessing, Feature extraction, and Classification. This study includes brief review on pre-processing, feature extraction, and classification</em>Rajesh Kumar SinghAbhishek Kumar MishraRamapati Mishra2021-06-182021-06-188Python: The Versatile Language
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2758
<p><em>Python is a deciphered at an undeniable level broadly useful programming language. Python develops just as its methodology would mean to assist software engineers with composing, sensible code for little and huge scope projects. Python programming language was developed by Guido van Rossum during 1985–90. In this research work, we have looked at some of the most exciting features of python: Why it is used so much and loved by most programmers and why it is considered the most powerful and fastest-growing programming language. Also we will see the comparison of python with other programming languages and in-depth knowledge about python why it is better than other programming languages.</em></p>Aditya DwivediAshish Jaiswal2021-06-182021-06-188Color Detection Using Open CV-Python
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2757
<p class="Abstract"><em>In this study, we will identify color of different mathematical figures in the example given paired pictures, utilizing Python 2.7, Open Source PC Vision Library (Open CV) and Numpy. Open Cv could be a computer vision library developed by Intel. It is a bunch of C capacities and a couple of C++ classes that carry out broad image cycle and PC vision calculations. Some of the basic image process capabilities embody filtering, edge detection, corner detection, sampling and interpolation, color conversion, morphological operations, histograms, image pyramids, contour processing, distance remodel, moments, model matching, Hough remodel, and polygonal approximation. The key capacities are utilized for preparing the pictures that include stacking them, and recognizing different colors inside the given example pictures.</em></p>Mohd Saif AbbasNamrata Dhanda2021-06-182021-06-188Extract Entity And Attributes From User Requirements by Applying On Natural Language Processing (NLP) Model.
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2691
<p>Automatic generation of entity and attributes from end user requirement reduces cost, time and complexity of software development process. The main aim of this research work is to transform user requirement to Natural Language Processing (NLP) for reducing the ambiguity, inconsistency and incompleteness, and finally extract entity and attributes. This study discusses some initial experiments which are encouraging further research to help in improving the software development process. It focuses on planning of software development, software requirement analysis and further it leads to design of software. During software development, it undergoes and seems to face different types of risks. As in planning phase, different user requirements need to be collected and next systems requirements are to be considered. As end user requirements are in the form of various shapes and sizes, proposed module NLP aims to automatically convert information stored in natural language to machine understandable form. The module mainly focuses on extraction of knowledge from unstructured data to structured format. Module tries to understand user requirements using NLP and lists out entity and attributes. Module is capable of creating SRS document and helps in knowing functional and non-functional requirements. A SRS document is nothing but template representing the structure of document which includes chapters, sections and practical guidelines. This study proposes a methodology that utilizes regular language handling to remove substances and properties. The approach begins by using NLP techniques to translate user requirement to words with its Part of Speech (POS). Thus, this study proposes a methodology that utilizes regular language handling to remove substances and properties.</p><p><em> </em></p>Bhoite Sudhakar D.Budake . R. D2021-06-182021-06-188Program Based Common Exams Evaluation System
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2739
<h1><em>A web-based software or examination system, where exams can be taken and given, is referred to as a common examination system. Using a computer system or an Android phone, you can access the internet or an intranet. The studies and comparisons for different web-based examination systems in individual field, introduced as a set of designed mode about general examination platforms which apply in universities and schools, analysis and research key technology, and introduced improved scheme made system perfect. Due to its precision and speed, the examining system is considered a rapidly developing examining method. In addition, less manpower is needed to conduct the test. Almost all companies now use an online assessment system to manage their tests because it saves students’ time during exams. Organizations can also easily monitor the success of students they assess using an assessment.</em><em></em></h1>Rayan SarfarazAyush SharmaManav Puri2021-05-312021-05-318Implementation of Metamorphic Testing for Fault Detection Ratio
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2660
<p><strong><em>Abstract</em></strong></p><p><em>Metamorphic Testing (MT) assumes an immense significance amongst the various sorts of testing techniques, as this technique doesn’t require test oracle, while the existence of an oracle is often presumed in software testing. This is because MT technique is based on the some vital properties which are known as Metamorphic Relations. In this paper, an endeavor has been made to explore the significance, integration of MT with other techniques and application of MT on different types of program and software. This study finds that this technique can significantly be implemented to test the various mathematical programs on which this testing technique has been auspiciously applied. The technique also administers better impacts when integrated with other testing techniques. The results show the benefits of Metamorphic testing compared with the blackbox testing. Metamorphic testing shows consistantly improved results compared to the blackbox testing. </em></p><p class="Default"><em> </em></p>Alok KumarJyoti *2021-03-052021-03-058Sustaining Under Water Life Using Robotics
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2657
<p><strong><em>Abstract</em></strong><strong></strong></p><p><em>From last few decade huge packaging plastic is been thrown away in city, beaches, sea transport and industries.by the statistics it has found that around 40% of plastic waste goes through landfills, 14% is recycled but 32% ends as litter in the marine environment. When the survey of Earth Oceans was done it found that water contains millions of tons of plastic mostly in the form of micro plastics. In research it is found that it takes years for the plastic to break down into pieces which drift into the marine under wind and surface currents which cause harmful for the aquatic animal. This research paper provides a view towards current waste of plastic material, robot technology and other initiatives underway to address the issue. </em></p><p><em> </em></p>Rupesh Prasad2021-03-052021-03-058Study and Analysis of Digital Counters for VLSI Applications
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2658
<p> </p><p align="center"><strong><em>Abstract</em></strong></p><p><em>The counter is a fundamental and essential component. It is used in most digital devices. A counter is a sequential circuit that is used as a counter. The counter is the most widespread application of flip-flops. It is a group of flip-flops in which a clock signal is placed. A counter stores the number of processes related to a clock. It is classified into two categories. The number of flip-flops used and the way they are connected determines the number of states called modulus and also describes how the counter moves during each complete cycle. Flip-flops are connected together to conduct counting operations. A group of flip-flops is called a counter. The purpose of this review and objective survey is to combine information on digital synchronous counters.</em></p>Bharti Singh ThakurSunil Shah2021-03-052021-03-058Software Approach for Implementing Production Fuzzy Inference Rules for a Hybrid Ensemble Model
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2659
<p align="center"><strong><em>Abstract</em></strong></p><p><em>This article provides an overview of the decision tree induction software and random forest ensemble. The general programmatic principles of building a fuzzy decision tree in the Microsoft Visual Studio integrated development environment using the object-oriented C # language on the. Net Framework platform are described. It can be used to develop a hybrid ensemble classifier model.</em></p>Sergey GorbachevMaxim V. BobyrNadezhda N. GorbachevaJinde CAOSiddhartha BhattacharyyaSandip A. Kale2021-03-052021-03-058Design and Analysis of Low Power, High Speed 64-Bit Alu Using Efficient Technique
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2656
<p align="center"><strong><em>Abstract</em></strong></p><p><em>The analysis of low power, high velocity a 64-cycle Arithmetic Logic Unit by effective methods Carry Look Ahead Technique utilizing VHDL language. The speed and zone of preparation boundaries are improved utilizing the convey look-forward strategy. It likewise lessens circuit intricacy. Number juggling rationale is a major structure square of the unit ALU. A convey look-forward joiner limits spread postponements by presenting more perplexing equipment. A convey look-ahead method improves speed by lessening the measure of time needed to decide bits. It likewise decreases the circuit intricacy. The proposed plan of the Arithmetic Logic Unit will play out the numerical, sensible, and moving tasks like Addition, Subtraction, Multiplication, Increment, Decrement, Logical AND, Logical OR, Logical XOR, and so forth within the computer. The efficient modules of the arithmetic logic unit are designed using Xilinx software and simulation results are verified on one platform employing a test bench. </em></p><p> </p>Sateesh kouravSunil Shah2021-03-052021-03-058Compact Security Algorithm
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2545
<p>This paper presents an analysis of Bernstein polynomial and its application to design the security systems. The polynomial has the various characteristics. The degree of the polynomial, the convergence of the sequence, recursive conditions, derivative etc. are the some noteworthy domain of the study of any polynomial.</p><p>Keywords: Bernstein Polynomial, Security Systems, Technology, Security, Algorithm.</p><p>Cite this Article: Aakanksha Dubey, Sunil Kumar Kashyap. Compact Security Algorithm. Recent Trends in Programming Languages. 2020; 7(2): 10–12p.</p>Sunil Kumar KashyapAakanksha Dubey2020-08-122020-08-128Pre-Execution check based Cyber-Physical System
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2547
<p>Physical objects with computational capabilities and connectivity performing programmable task are called Cyber-Physical System (CPS). These systems deal with real time physical objects like running car, automatic washing machine, pilotless aircraft, power grid etc. CPS's are influencing from domestic machines to critical infrastructure of a country like power grid, avionics, nuclear program etc. The failure or compromise of cyber-physical system causes critical infrastructure destruction to human lives casualties, artificial floods to chemical explosion to name the few. Most of the attacks and failures are due to the human factor rather than the machine factor. This Paper proposes a system-oriented method to create a grand strategy environment. Where every instruction before execution is checked for the potential threat for the post execution effects. The system takeover the control, if found potential risk. Discard or grant the command based on checks and ultimately monitor the whole system per-execution, in-execution and post-execution.</p><p>Keywords: Cyber-Physical System, Safety, Security, Sustainability, technology</p><p>Cite this Article: Muzammil M. Ahmad, Mahesh P. Yambal, Anand K. Pathrikar. Pre-Execution Check based Cyber-Physical System. Recent Trends in Programming Languages. 2020; 7(2): 13–17p.</p>Muzammil M. AhmadMahesh P. YambalAnand K. Pathrikar2020-08-122020-08-128Simple Imperative-Model Programming Language for Education - SIMPLE
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2543
<p>This work presents the development of a new programming language, Simple Imperative-Model Programming Language for Education – SIMPLE. The new language is compiled procedural language that aims to simplify programming syntax and relives beginners from advanced programming concepts. SIMPLE was designed and implemented as a significant set of a typical procedural programming language. Although it is not intended for serious industry-level programming but, we claim that it could be an effective education vehicle and demonstrational component in introductory, intermediate and advanced courses. SIMPLE has been extensively tested using50+ different test programs designed carefully to target the language elements and features and our final tests showed that the language is reliable and ready to be adopted in education.</p><p>Keywords: Programming languages, Simplifying programming, Language Implementation, SIMPLE, technology.</p><p>Cite this Article: Aaron Rasheed Rababaah. Simple Imperative-Model Programming Language for Education – SIMPLE. Recent Trends in Programming Languages. 2020; 7(2): 18–39p.</p>Aaron Rasheed Rababaah2020-08-122020-08-128Blockchain Technology ForSelling And Buying Animals-an Android Application(Krushi Bazaar)
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2546
<p>An Android application “Animal selling app” is to help farmers ensure greater profitability through direct farmer to supplier and farmer to farmer communication. This serviceboosts business communication andbrings transparency in the system. This innovative application allows for good farmer, retailer and supplier communication. It allows farmers to login and communicate to respective dealers. When dealers publish an advertisement or offer, the respective farmers can get to know through this application instead of travelling to the markets. Farmers can sell their Cows, Buffalos and seeds in this application.This Cows are categorized into Breed,Age,Skin,Weight,Milk,Hornand buffalos are categorized into Breed,Age,Skin,Weight,Milk,height,colour. So that the farmer who purchases this cow and buffalos gets a full detail aboutthese animals this makes the farmer to analyse easily. Duplication is avoided by using blockchain methodology in this application. One cannot post the products with same description. The main aim of this project is to maximize the profit for the farmers by avoiding the middle man or broker who consumes money for exchange of farmers products, this application is fully transparent Farmers can directly deal with their consumers for the price and product details.</p><p>Keywords: Krushi Bazaar, Animal, Stable or Shed(Tabela), technology, blockchain.</p><p>Cite this Article: Anil Haribhau Khade, Karishma Bhiungade, Ekta Kamble, Vaishali Jadhav. Blockchain Technology for Selling and Buying Animals-an Android Application (Krushi Bazaar). Recent Trends in Programming Languages. 2020; 7(2): 6–9p.</p>Karishma BhiungadeAnil Haribhau KhadeEkta Kamble KambleVaishali Jadhav2020-08-062020-08-068Application for Online College Voting System Using Android Device
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2548
<p>Online voting system is used to vote online by the authenticated voters in order avoid any type of dummy voting. Proposed system allows user to vote online after signing in on the app. Authentication is provided by email ID as username and general registered number (GR No.) as password. OTP is sent to registered mobile no and then only user can vote. By using this application we can elect the college committee without any manual efforts. This system is more secure than the current manual system.</p><p>Keywords: One Time Password (OTP), android devices, online college voting system, technology, mobile</p><p>Cite this Article: Ojas Uday Deo, Omkar Vaiti, Shubham Kale, Rina Bora. Application for Online College Voting System Using Android Device. Recent Trends in Programming Languages. 2020; 7(2): 1–5p.</p>Ojas uday deoOmkar VaitiShubham kaleRina Bora2020-08-062020-08-068A Medical Expert System to Manage Disease using Oversampling and Decision Tree
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2410
<p>Now-a-days modern technology is joining hands with traditional system of medical diagnosis and treatment to alleviate health related problems faced by modern age due to its lifestyle and hectic work pressure. Therefore, it is paramount to develop a system that can identify the major causes of health related problems beforehand, so that people can follow some precautionary measures to prevent those causes and can have hassle free life. Decision tree is one of the reliable and popular data mining tools to generate production rules to identify significant causes for a disease. However, imbalanced nature of the dataset makes it difficult for the decision tree to learn for the minority class. Therefore, this paper proposes a model called Balanced Medical Expert System for Managing Disease (BMESMD) using an oversampling technique with decision tree that identifies major cause (s) with ranges of the disease. Ranges of the major cause (s) may be controlled by medicine, food habit or exercise prescribed by the doctor. The proposed method is validated with three medical datasets taken from UCI repository. It is observed from the experimental results that the proposed model can manage the disease significantly by controlling one or two major causes.</p><p>Keywords: Medical Expert System; Machine learning; Decision tree; Imbalanced problem; oversampling</p><p>Cite this Article: Prabhudatta Kar, Trisha Bhattacharyya, Disha Mohanty, Sai Sachin Vutukuri, Manomita Chakraborty, Saroj Kr. Biswas. A Medical Expert System to Manage Disease using Oversampling and Decision Tree. Recent Trends in Programming Languages. 2020; 7(1): 27–33p.</p>Prabhudatta KarTrisha BhattacharyyaDisha MohantySai Sachin VutukuriManomita ChakrabortySaroj Kr. Biswas2020-06-022020-06-028Analysis of Different Routing Protocols in Vehicular Ad Hoc Network
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2457
<p>Due to recent advances in inter-vehicular communications and decreasing cost of related equipment, VANETs have received much attention. It has been proven to be useful in road safety, pedestrian safety and many other commercial applications. For instance, VANET can be used to make drivers aware of the forthcoming traffic jam. It can also be used to avoid accidents by alerting the driver about the speed and location of nearby vehicles. Vehicular ad-hoc networks (VANETs) are created by applying principles of mobile adhoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices- to the domain of vehicles. In this project we will generate traffic using SUMO (osmWebWizard.py) and create a scenario by selecting a location for traffic and adding number of cars, trucks, pedestrians, traffics side (left or right) and other road things and then start the simulation of traffic which will generate the data in form of xml file in which all the information and data about the traffic (time, location etc.) are present. After data generation, using this xml file, a tcl file will be generated using ns3 in which the nodes (cars, trucks etc) and data of mobility (location, from and to, etc.) are present. After that, we load the information from tcl file and simulate different routing protocols in VANET and analyze various metrics like goodput, receive rate, packets receive, overload in each protocol and then compare them. The entire goal of this project is to analyze and compare the performance of different routing protocols in VANET.</p><p>Keywords: routing protocols, ad-hoc network, VANET, inter-vehicular communication, traffic</p><p>Cite this Article: Sandeep Arora, Shivam Mishra, Aakash Shukla, Himanshu Kathuria, Ankit Kumar. Analysis of Different Routing Protocols in Vehicular Ad-hoc Network. Recent Trends in Programming Languages. 2020; 7(1): 20–26p.</p>Sandeep AroraShivam MishraAakash ShuklaHimanshu KathuriaAnkit Kumar2020-06-022020-06-028Smart Pen for Visually Challenged People
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2456
<p>Some of the main challenges faced by visually impaired people are navigation, reading, writing, sensing etc. So while they are navigating independently, any obstacle present above 150cm above ground cannot be detected with the help of a walking stick. So to detect any obstacle above 1.5m we can use a IR detector which is placed at the required height to sense the obstacle. There are many blind people with good talent to write poems, novels etc. And the language they use to write is using braille code. So a device with optical mouse technology can be used to help them. They can write English on their hand, palm etc. because they can sense through their skin. And those data can be stored.</p><p>Keywords: IR detector, Optical mouse, smart pen, Braille code, optical mouse technology</p><p>Cite this Article: Sachin S.S., Rahind M., Nandagopan G.L., Deepa D. Smart Pen for Visually Challenged People. Recent Trends in Programming Languages. 2020; 7(1): 16–19p.</p>Sachin S.S.Rahind M.Nandagopan G.L.Deepa D.2020-06-022020-06-028Development of Various Application of NLP for Mizo Language
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2411
<p>This paper presents a survey on Application of NLP (Natural language Processing) for Indian Language and we mainly focused on Mizo Language. Indian Languages are morphologically well-off and agglutinative that adds one extra fence. Mizo Languages known as Lushai language; it belongs to the branch of Sino-Tibetan language family. It is the official language of Mizoram, the North Eastern State of India. Moreover, it is a morphologically language with genetic features and it has object-subject-verb order. We discussed some important applications of NLP which had been developed such as E-Dictionary, Morphology Analyzer, Reduplicated Multi-word Expression (RMWE), Name Entity Recognition (NER), Part of Speech (POS) Tagging, Wordnet and Word Sense Disambiguation, Machine Translation (MT), Question Answering, Information Extraction and Text Summarization etc. In this paper, we study and compared the various application of NLP for Mizo languages.</p><p>Keywords: Natural Language Processing (NLP), Multiword Expression (MWE), E-Dictionary, Statistical Machine Translation (SMT), Neural Machine Translation (NMT), Part-Of-Speech (POS).</p><p>Cite this Article: Chanambam Sveta Devi, Bipul Syam Purkayastha. Development of Various Application of NLP for Mizo Language. Recent Trends in Programming Languages. 2020; 7(1): 7–15p.</p>Chanambam Sveta DeviBipul Syam Purkayastha2020-06-022020-06-028A Review on Heart Disease Monitoring System by Using Machine Learning
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2423
<p>Heart disease is one of the most popular diseases which can lead to reduce the lifespan of human beings now a day. Every year 17.5 million people are get dying due to heart disease. Researchers have been using various types of data mining techniques and machine learning algorithms to help in the diagnosis of heart disease and various other type of diseases. Health care Centre collects large amount of data. Data mining is the process of discovering or mining knowledge from a large amount of data and it also support exploring of data. This research determine whether a person is affected or not affected by heart disease which is based on their historical and real time data .In this paper Advance clustering algorithms (K means clustering algorithm) and A-priori algorithm is used for the analysis of heart disease and various type of other disease .This system is implemented on MATLAB software. MATLAB is introduced as better performance software.</p><p>Keywords: Machine learning, data mining, clustering algorithms, A-priori algorithms, Heart disease, data set, MATLAB.</p><p>Cite this Article: Manju Rani, Pooja Rani, Himanshi Sharma. A Review on Heart Disease Monitoring System by Using Machine Learning. Recent Trends in Programming Languages. 2020; 7(1): 1–6p.</p>Manju RaniPuja RaniHimanshi Sharma2020-05-112020-05-118A Proposed Hybrid Spatial Indexing: QX Tree
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=363
<p class="Abstract">Out of different spatial indexing structures available for accessing spatial data, none of them is suitable for high dimensions. This is because the performance of the spatial indexing structures become poorer with the increase in dimension. Thus there is a need for a better spatial indexing structure for the same. Here we have proposed a hybrid indexing structure by combining the Quad Tree and X Tree. We have considered the X Tree over R Tree used in the previous hybrid indexing structure, QR Tree. This is due to the better performance of X Tree over the R Tree in case of highly overlapped data.</p>Jnyanaranjan DashDipa PatraChittaranjan Pradhan2020-02-152020-02-158Decomposition of Dynamic Graphs in Memory Saving with Effective Programming
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=232
<p>This study proposes a simple and effective heuristic to save memory in effective programming on tree decompositions when solving a graph optimization problem. The introduced “anchor technique” is based on a tree-like set covering problem. We substantiated our findings by experimental results. Our strategy has negligible computational overhead concerning running time but achieves memory savings for nice tree decompositions and path decompositions between 60% and 98%.</p>Rishabh RauthanRohan KhanejaRohan KadamSwapnil Yadav2020-02-152020-02-158A Novel Approach of Image Restoration Based on Segmentation and Fuzzy Clustering
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=125
<p>Image restoration is the process of restoring or deblurring an image which had been undergone certain degradations. In this paper, we proposed a method for image restoration based on segmentation and fuzzy clustering. This method consider the similar image pair in which there is a clear part in one image corresponding to degraded one in another. This proposed method firstly partition the image into specified segments and then use fuzzy clustering to cluster the segment based on their peak signal-to-noise ratio (PSNR) value and provide the segments that needs to restore. The performance of the system is evaluated on the basis of PSNR value. The proposed method shows higher efficiency compared to the existing methods.</p>Siddharth SaxenaRajeev Kumar Singh2020-02-152020-02-158Food Maza: Online Platform to Buy Food Items
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2357
<p>Abstract: With this application, customers can purchase the food products with the help of web by sitting at home. Normally the client whenever they need to eat something, they should visit the places, and they wish to buy the things they do the payment and get the food to the home. To beat this manual visit to the restaurants we can utilize this application for all intents and purposes and make the payment of purchase.</p><p>Keywords: Food items, purchase, customer, product, user-friendly, virtual shop</p><p>Cite this Article: Vidya Kumari. Food Maza: Online Platform to Buy Food Items. Recent Trends in Programming Languages. 2019; 6(3): 11–15p.</p>Vidya Kumari2020-01-102020-01-108Big Data Technology: Valuable Impact of Big Data on Library and Information Science
https://computers.stmjournals.com/index.php?journal=RTPL&page=article&op=view&path%5B%5D=2352
<p>Abstract: With the advancement of technology Big data is an important technology with vast amount of data storing in it and used in library and information science. In recent time Big data technology is necessary requirement for storing, accessing, retrieving, processing and regenerating new data. In digital era with the help of big data to store variety, volume, velocity, veracity and valuable data. The generating data in the form of structured, unstructured and semi-structured form. The use of big data not only field of research but also used in working daily of library professional. Analysis of big data can be used by libraries Professionals, business and Academic instructions also. Numbers of big data tools which is used to handle and maintain storage and access of large amount of generated big data. Big data technology ushering astounding changes in the information technology and research process in which storing, accessing, retrieving and processing large amount of new generated data.</p><p>Keywords: Big data, types of big data, characteristics of big data, big data analytic tools, library</p><p>Cite this Article: Anoop Singh, Priyanka Sangwan, Nishchay Kumar. Big Data Technology: Valuable Impact of Big Data on Library and Information Science. Recent Trends in Programming Languages. 2019; 6(3): 26–32p.</p>Anoop SinghPriyanka SangwanNishchay Kumar2020-01-102020-01-108