Dr Sumesh Sood - Academia.edu (original) (raw)
Papers by Dr Sumesh Sood
International Journal for Research in Applied Science and Engineering Technology, Sep 29, 2023
In the realm of Advanced Driving Assistance Systems (ADAS), the accurate assessment of pedestrian... more In the realm of Advanced Driving Assistance Systems (ADAS), the accurate assessment of pedestrian proximity is of paramount importance. This paper introduces a qualitative methodology that integrates YOLOv7-pose for object detection and pose estimation with the MiDaS (Monocular Depth Estimation in Real-Time with Deep Learning) model for monocular depth estimation. The main objective is to qualitatively assess pedestrian proximity to the camera within the ADAS framework. This procedure involves classifying pedestrians as "near" or "far" based on an inverse depth threshold that has been predetermined. In addition, the paper performs a qualitative comparative analysis of the results produced by the MiDaS Small, Hybrid, and Large variants to learn more about the performance of depth estimation in these contexts, particularly in relation to the presence of pedestrians. The evaluation emphasises this approach's qualitative potential for achieving situationally appropriate and context-aware pedestrian proximity assessment. The safety and adaptability of ADAS systems can be improved with the help of such insights, which have numerous applications in robotics, surveillance, and autonomous vehicles.
International Journal for Research in Applied Science and Engineering Technology, Dec 30, 2023
This research paper conducts a comprehensive comparative study between blockchain-based electroni... more This research paper conducts a comprehensive comparative study between blockchain-based electronic voting systems and centralized solutions, focusing on their security and performance attributes. Acknowledging the significance of electronic voting in modern democracies, the study delves into blockchain's role in enhancing security and transparency while addressing potential challenges. Through an in-depth literature review, the paper examines the existing research landscape, highlighting security aspects, performance evaluations, and the impact of decentralization. The subsequent analyses dissect the security features, enhancements, vulnerabilities, and potential attacks in each system, followed by a thorough performance assessment encompassing transaction speed, scalability, and resource consumption. The interplay between security and performance tradeoffs is explored, culminating in a discussion of the research's implications, future directions, and ethical considerations. The study's significance lies in guiding decision-making, promoting balance, and fostering ongoing innovation in the pursuit of secure and efficient electronic voting systems.
International Journal for Research in Applied Science and Engineering Technology
: Today’s online world was fully filled up with blogs, views, comments, and posts through various... more : Today’s online world was fully filled up with blogs, views, comments, and posts through various websites and social surfaces. Sentiment analysis has emerged as a valuable tool in the film industry for automatically categorizing the polarity of thoughts expressed in movie reviews. By analyzing language patterns, sentiment analysis can determine whether a review contains a positive or negative assessment of a particular movie. This approach allows for both objective and subjective methods to predict the success of a movie. With this analysis, it is possible to evaluate audience reactions and identify trends in movie reviews, which can be valuable for filmmakers and movie studios seeking to gauge public opinion and make informed decisions about future projects. In order to perform sentiment analysis on movie reviews, machine learning algorithms are usually applied after natural language processing techniques have been used to extract pertinent features from the text, such as sentimentbearing words and phrases. Objective methods use statistical and machine learning techniques to analyze past movie data, such as budget, genre, and release date, to predict box office revenues.
International Journal for Research in Applied Science and Engineering Technology
: Sentiment analysis of product reviews has become an important research area in recent years. Wi... more : Sentiment analysis of product reviews has become an important research area in recent years. With the rise of ecommerce platforms, online reviews have become an essential part of the decision-making process for consumers. This paper presents a review of the recent advancements in sentiment analysis techniques for product reviews. The paper covers various aspects of sentiment analysis, such as feature extraction, sentiment classification, and aspect-based sentiment analysis. This paper is to analyse the strengths and weaknesses of different techniques, such as rule-based approaches, machine learningbased approaches, and deep learning-based approaches. The paper also highlights the challenges in sentiment analysis, such as handling negation, sarcasm, and irony in reviews. Furthermore, the paper discusses the future research directions in this field. Finally, this paper conclude with a discussion on the potential applications of sentiment analysis, such as market research, product development, and customer service. Overall, this paper provides an overview of the recent advancements in sentiment analysis techniques for product reviews and serves as a roadmap for future research in this field
International Journal of Latest Engineering and Management Research (IJLEMR), Jan 12, 2023
Software vulnerabilities have focused attention of many researchers in recent years because of it... more Software vulnerabilities have focused attention of many researchers in recent years because of its impact on software security. To protect software from vulnerabilities, it is important to understand the pattern or trends of these vulnerabilities over the years. This will help software vendors and developers to prepare better solutions for the vulnerabilities before they get exploited in future. In this paper the trend of different types of software vulnerability and severity of vulnerabilities in National Vulnerabilities Database (NVD) are examined from 2016 to 2021. In addition to this, trends of most exploited software products during the period of 2016 to 2020 are analyzed. This will help the software vendors to find if trends in vulnerabilities have any significant meaning or not. In this study results show that cross site scripting (CWE-79), improper privilege management (CWE-269), incorrect authorization (CWE-863) and deserialization of untrusted data (CWE-502) vulnerabilities follow an increasing trend from 2016 to 2021. While on the other hand buffer error (CWE-119) and access control (CWE-264) vulnerabilities follow an important decreasing trend. Results show that vulnerabilities with low severity follow an increasing trend and vulnerabilities with critical severity follow a decreasing trend. It has also been observed that most of the software products does not follow any trend.
International Journal of Advanced Research in Computer Science
The large deployment of Internet of Things (IoT) is actually enabling Smart City projects and ini... more The large deployment of Internet of Things (IoT) is actually enabling Smart City projects and initiatives all over the world. Objects used in daily life are being equipped with electronic devices and protocol suites in order to make them interconnected and connected to the Internet. According to a recent Gartner study, 50 billion connected objects have been deployed in smart cities by 2020. These connected objects will make our cities smart. However, they will also open up risks and privacy issues. As various smart city initiatives and projects have been launched in recent years, we have witnessed not only the expected benefits but the risks introduced. The current and future trends of smart city with respect to IoT have been described. It also discussed the interaction between smart cities and IoT. The drivers behind the evolution & development of IoT and smart cities have been explained. Finally, the IoT weaknesses and how they can be addressed when used for smart cities has been ...
Social networks are developing as a real-time feedback system which can be used by product makers... more Social networks are developing as a real-time feedback system which can be used by product makers and service providers to fetch instant user acceptance and take corrective actions to increase their brand popularity. Like-minded users form communities when they post their opinions on to the social networks which affect the decision making of prospective customers. Often the largest community within a network represents the essence of the entire network in terms of sentiments. In the study presented, sentiment analysis of the largest community of the tweets about Bollywood movies released from 1 st June 2017 and 17 th , August 2017 was performed. The overall sentiment score divided by the number of members in the community when compared to Box-office collection of movies yields fairly good results.
2018 4th International Conference on Computing Sciences (ICCS), 2018
Corporations have always desired prompt customer experience feedback about their products for ame... more Corporations have always desired prompt customer experience feedback about their products for amending current pricing and policies to stay ahead of their competitors. A positive customer experience can be created by analyzing customer sentiments and acting on them promptly. Social networks like Twitter represent collective intelligence and opinion of the general public and hence can be harnessed for real-time feedback. They have evolved as a resource for extracting sentiments for applications in various fields. Sentiment analysis can be used to obtain the overall customer experience of a large customer base on a real time. In this research, a total of 153,651 distinct tweets for Twitter handle of 5 popular telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for five months to develop a prediction model for telecom subscriber addition using the sentiment score. The results were validated statistically using correlation analysis. Positive customer sentiments about the brand which they prefer is reflected by higher growth rate of new subscribers added with that brand in the study period. The sentiment analysis results can be used by managements to take timely actions for improving the future customer experience and avoiding customer churn.
International Journal of Research in Engineering and Technology, 2014
The reusable software components can be defined in several ways. The reusable software components... more The reusable software components can be defined in several ways. The reusable software components possess a distinct functionality that does not affect the functionality of other components. It has also been specified precisely that for what the component reuse stands for and for what the component reuse does not stands for. It is required to characterize the components for better reuse. Characterization describes the features and characteristics of components. Distinct components show distinct characteristics in different domains of their usage and in different operating environments. The components can be classified on the basis of features it have, that facilitates with the better usage, better retrieval, better understanding and better cataloguing. Through component classification one gets the assurance of selecting right component and it suggests various ways in which a component can be reused. The paper explains for the need of characterization which ultimately is reflected from the above stated fact. It also provides with the criteria to characterize the reusable components. The criterion is laid down while keeping in mind the general specifications and formal specifications. These specifications in one way determine the feasibility of a reusable component at the initial level. The general and formal specifications depict the internal and external characteristics which play a significant role in the identification, selection, adoption and implementation of components in a particular application development. Specifications will tell the true character of a reusable component that helps to outline the required components. It also discusses the influence of characterization that it puts on the reuse of reusable components.
Developing new application softwares using proprietary softwares is a process which encounters wi... more Developing new application softwares using proprietary softwares is a process which encounters with the economic issues. Many times the budget gets overrun. And the govt. organizations and many times even private sector has no big amounts of budget to spend upon the proprietary softwares licences. In such scenario free and open source softwares is a good option to depend upon.
2018 4th International Conference on Computing Sciences (ICCS), 2018
Corporations have always desired prompt customer experience feedback about their products for ame... more Corporations have always desired prompt customer experience feedback about their products for amending current pricing and policies to stay ahead of their competitors. A positive customer experience can be created by analyzing customer sentiments and acting on them promptly. Social networks like Twitter represent collective intelligence and opinion of the general public and hence can be harnessed for real-time feedback. They have evolved as a resource for extracting sentiments for applications in various fields. Sentiment analysis can be used to obtain the overall customer experience of a large customer base on a real time. In this research, a total of 153,651 distinct tweets for Twitter handle of 5 popular telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for five months to develop a prediction model for telecom subscriber addition using the sentiment score. The results were validated statistically using correlation analysis. Positive customer sentiments about the brand which they prefer is reflected by higher growth rate of new subscribers added with that brand in the study period. The sentiment analysis results can be used by managements to take timely actions for improving the future customer experience and avoiding customer churn.
In 1983 Richard Stallman founded the free software movement. According to the founder this type o... more In 1983 Richard Stallman founded the free software movement. According to the founder this type of software respects user's freedom and social solidarity of development team called community in FOSS terminology. Whereas proprietary softwares take away the user's freedom and keep the users helpless. In free and open source software the concept of sharing the source code is used. Here all the participants are connected through internet. FOSS has grown now in a full fledged software development methodology thruought the world. This methodology cuts down or reduces the cost of software. Also no country of the world wants to waste crores of rupees on softwares which are proprietary as they have an option to divert to this new category of software. But all want to be safe by getting acquainted with various issues related with free and open source software. Therefore the main aim of this article is to highlight the important issues related with free and open source software KEYWORD...
Handling of reusable software components will be a step towards creating a discipline in the fiel... more Handling of reusable software components will be a step towards creating a discipline in the field of reusable software components. The concept of handling emerges from the idea that the reusable components should be used, transacted, stimulated, and retrieved by adhering to proper guidelines and standards. As the guidelines and standards are followed while handling with the other entities, the software components should also be dealt with the same way. If the guidelines and standards are not followed while handling the software components, there won't be any regularity on the components. Therefore, the study has provided with the standards and guidelines for handling of reusable software components. It would affect the quality of reusable software components. Consequently, the quality of software products composed from these components will be affected. Also, the lack of handling will have a negative impact on the whole market of reusable components. The study also stated the p...
Free and open source softwares like PHP are very useful to develop FOSS applications. This and ot... more Free and open source softwares like PHP are very useful to develop FOSS applications. This and other such plateforms are costfree and easily available on Internet. Developers can develop versatile applications using such softwares. Such a case study has been performed by self developing a web application. A teacher can supply the teaching lerning material to the students by this Application. The students can study large number of subjects. And students can be in large number not necessarily of same class but they can be of defferent classes also. Using this application the teacher can upload the study material easily and students can view as well as download the study material by going to web on http://kumarsushil.com/.
The free and open source software and its adoption is a worldover movement. Here India is also a ... more The free and open source software and its adoption is a worldover movement. Here India is also a part. Govt of India is also trying for its adoption in various spheres of life. However India is successful but partially as many countries are ahead to India. However if strategy for the same is updated time and again India will also lead the world in this movement.
A significant collection of software assets are used in all high-tech organizations and software ... more A significant collection of software assets are used in all high-tech organizations and software business. Today, the major concern is with the maintenance and reuse of software which can be further invested in such a manner that its value may increase with passage of time but not like accountability whose value diminishes with the time. It has been an issue of forceful debate and keen interest for more than two decades for the software engineers to make a choice between the software reengineering and software maintenance. Metric structure which has been discussed in this work can be helpful in calculating the required reengineering cost of system and its various modules. Its authenticity has been proved with the help of a case study. A choice can be made regarding the maintenance, reengineering and retirement need of software or parts of software after obtaining results by these metrics.
International Journal of Advanced Research in Computer Science, 2017
According to [1]Framework for Adoption of Open Source Software in e-Governance Systems Version 1.... more According to [1]Framework for Adoption of Open Source Software in e-Governance Systems Version 1.0 April 2015, prescribed by Department of Electronics and I. T., Ministry of Communications and I. T. , Government of India , Annexure-II Illustrative list of OSS includes Icedtea, PHP, HTML, libre office, open office, Koha, evergreen, Gimp, evince, clamav, Bresero, CloudStack, Meghdoot , Ubuntu and BOSS. As per the recommendations of Govt of India the organizations should prefer the softwares of FOSS category but according to [2] Red Hat – Georgia Tech study ranked the top countries in FOSS adoption. India is at twenty third rank out of 75 countries studied. It means that the apeal of our former scholar president APJ Abdul Kalam, to Embrace open source philosophy[3] has not been followed properly... It is being said that Government’s OS BOSS is dying a slow death due to lack of patronage[4]. In the above scenario BOSS (Bharat Opearting System Solution) , a free n open source software ha...
International Journal of Advanced Research in Computer Science, 2017
An improvement in maintainability of software components has the potential to affect the maintena... more An improvement in maintainability of software components has the potential to affect the maintenance practices. The maintainers are more likely to follow the maintenance process that improves the maintainability of software components. The study presents a method that is intended to improve the maintainability of reusable software components. The study floats the idea of improving maintainability of reusable software components through versioning. It states that on creating a new version of a reusable software component, the maintainability increases. It validates the concept through case study conducted on open source software. The reason for taking open source software as case study is that their probability to be reused is more as compared to other software components. The study makes use of metrics to calculate maintainability and other factors that affect it. The study is also compared with other related studies to exhibit its contribution. Keywords: Maintainability index, vers...
International Journal of Advanced Research in Computer Science, 2017
Cloud computing is emerging paradigm for provisioning services over the internet. It is the area ... more Cloud computing is emerging paradigm for provisioning services over the internet. It is the area of research where a cloud is used to access data, files, software etc. It allows sharing of networks servers, data applications, storage and services as computing resources. In cloud computing there is an interaction among various heterogeneous independent cloud platforms. This is possible only through interoperability which plays a key role in providing access to cloud computing in different environments. In other simple words it means the user needs interoperability to ship their assets from one cloud to other cloud. This paper emphasizes upon concerns and challenges emerging in Cloud Computing.
International Journal for Research in Applied Science and Engineering Technology, Sep 29, 2023
In the realm of Advanced Driving Assistance Systems (ADAS), the accurate assessment of pedestrian... more In the realm of Advanced Driving Assistance Systems (ADAS), the accurate assessment of pedestrian proximity is of paramount importance. This paper introduces a qualitative methodology that integrates YOLOv7-pose for object detection and pose estimation with the MiDaS (Monocular Depth Estimation in Real-Time with Deep Learning) model for monocular depth estimation. The main objective is to qualitatively assess pedestrian proximity to the camera within the ADAS framework. This procedure involves classifying pedestrians as "near" or "far" based on an inverse depth threshold that has been predetermined. In addition, the paper performs a qualitative comparative analysis of the results produced by the MiDaS Small, Hybrid, and Large variants to learn more about the performance of depth estimation in these contexts, particularly in relation to the presence of pedestrians. The evaluation emphasises this approach's qualitative potential for achieving situationally appropriate and context-aware pedestrian proximity assessment. The safety and adaptability of ADAS systems can be improved with the help of such insights, which have numerous applications in robotics, surveillance, and autonomous vehicles.
International Journal for Research in Applied Science and Engineering Technology, Dec 30, 2023
This research paper conducts a comprehensive comparative study between blockchain-based electroni... more This research paper conducts a comprehensive comparative study between blockchain-based electronic voting systems and centralized solutions, focusing on their security and performance attributes. Acknowledging the significance of electronic voting in modern democracies, the study delves into blockchain's role in enhancing security and transparency while addressing potential challenges. Through an in-depth literature review, the paper examines the existing research landscape, highlighting security aspects, performance evaluations, and the impact of decentralization. The subsequent analyses dissect the security features, enhancements, vulnerabilities, and potential attacks in each system, followed by a thorough performance assessment encompassing transaction speed, scalability, and resource consumption. The interplay between security and performance tradeoffs is explored, culminating in a discussion of the research's implications, future directions, and ethical considerations. The study's significance lies in guiding decision-making, promoting balance, and fostering ongoing innovation in the pursuit of secure and efficient electronic voting systems.
International Journal for Research in Applied Science and Engineering Technology
: Today’s online world was fully filled up with blogs, views, comments, and posts through various... more : Today’s online world was fully filled up with blogs, views, comments, and posts through various websites and social surfaces. Sentiment analysis has emerged as a valuable tool in the film industry for automatically categorizing the polarity of thoughts expressed in movie reviews. By analyzing language patterns, sentiment analysis can determine whether a review contains a positive or negative assessment of a particular movie. This approach allows for both objective and subjective methods to predict the success of a movie. With this analysis, it is possible to evaluate audience reactions and identify trends in movie reviews, which can be valuable for filmmakers and movie studios seeking to gauge public opinion and make informed decisions about future projects. In order to perform sentiment analysis on movie reviews, machine learning algorithms are usually applied after natural language processing techniques have been used to extract pertinent features from the text, such as sentimentbearing words and phrases. Objective methods use statistical and machine learning techniques to analyze past movie data, such as budget, genre, and release date, to predict box office revenues.
International Journal for Research in Applied Science and Engineering Technology
: Sentiment analysis of product reviews has become an important research area in recent years. Wi... more : Sentiment analysis of product reviews has become an important research area in recent years. With the rise of ecommerce platforms, online reviews have become an essential part of the decision-making process for consumers. This paper presents a review of the recent advancements in sentiment analysis techniques for product reviews. The paper covers various aspects of sentiment analysis, such as feature extraction, sentiment classification, and aspect-based sentiment analysis. This paper is to analyse the strengths and weaknesses of different techniques, such as rule-based approaches, machine learningbased approaches, and deep learning-based approaches. The paper also highlights the challenges in sentiment analysis, such as handling negation, sarcasm, and irony in reviews. Furthermore, the paper discusses the future research directions in this field. Finally, this paper conclude with a discussion on the potential applications of sentiment analysis, such as market research, product development, and customer service. Overall, this paper provides an overview of the recent advancements in sentiment analysis techniques for product reviews and serves as a roadmap for future research in this field
International Journal of Latest Engineering and Management Research (IJLEMR), Jan 12, 2023
Software vulnerabilities have focused attention of many researchers in recent years because of it... more Software vulnerabilities have focused attention of many researchers in recent years because of its impact on software security. To protect software from vulnerabilities, it is important to understand the pattern or trends of these vulnerabilities over the years. This will help software vendors and developers to prepare better solutions for the vulnerabilities before they get exploited in future. In this paper the trend of different types of software vulnerability and severity of vulnerabilities in National Vulnerabilities Database (NVD) are examined from 2016 to 2021. In addition to this, trends of most exploited software products during the period of 2016 to 2020 are analyzed. This will help the software vendors to find if trends in vulnerabilities have any significant meaning or not. In this study results show that cross site scripting (CWE-79), improper privilege management (CWE-269), incorrect authorization (CWE-863) and deserialization of untrusted data (CWE-502) vulnerabilities follow an increasing trend from 2016 to 2021. While on the other hand buffer error (CWE-119) and access control (CWE-264) vulnerabilities follow an important decreasing trend. Results show that vulnerabilities with low severity follow an increasing trend and vulnerabilities with critical severity follow a decreasing trend. It has also been observed that most of the software products does not follow any trend.
International Journal of Advanced Research in Computer Science
The large deployment of Internet of Things (IoT) is actually enabling Smart City projects and ini... more The large deployment of Internet of Things (IoT) is actually enabling Smart City projects and initiatives all over the world. Objects used in daily life are being equipped with electronic devices and protocol suites in order to make them interconnected and connected to the Internet. According to a recent Gartner study, 50 billion connected objects have been deployed in smart cities by 2020. These connected objects will make our cities smart. However, they will also open up risks and privacy issues. As various smart city initiatives and projects have been launched in recent years, we have witnessed not only the expected benefits but the risks introduced. The current and future trends of smart city with respect to IoT have been described. It also discussed the interaction between smart cities and IoT. The drivers behind the evolution & development of IoT and smart cities have been explained. Finally, the IoT weaknesses and how they can be addressed when used for smart cities has been ...
Social networks are developing as a real-time feedback system which can be used by product makers... more Social networks are developing as a real-time feedback system which can be used by product makers and service providers to fetch instant user acceptance and take corrective actions to increase their brand popularity. Like-minded users form communities when they post their opinions on to the social networks which affect the decision making of prospective customers. Often the largest community within a network represents the essence of the entire network in terms of sentiments. In the study presented, sentiment analysis of the largest community of the tweets about Bollywood movies released from 1 st June 2017 and 17 th , August 2017 was performed. The overall sentiment score divided by the number of members in the community when compared to Box-office collection of movies yields fairly good results.
2018 4th International Conference on Computing Sciences (ICCS), 2018
Corporations have always desired prompt customer experience feedback about their products for ame... more Corporations have always desired prompt customer experience feedback about their products for amending current pricing and policies to stay ahead of their competitors. A positive customer experience can be created by analyzing customer sentiments and acting on them promptly. Social networks like Twitter represent collective intelligence and opinion of the general public and hence can be harnessed for real-time feedback. They have evolved as a resource for extracting sentiments for applications in various fields. Sentiment analysis can be used to obtain the overall customer experience of a large customer base on a real time. In this research, a total of 153,651 distinct tweets for Twitter handle of 5 popular telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for five months to develop a prediction model for telecom subscriber addition using the sentiment score. The results were validated statistically using correlation analysis. Positive customer sentiments about the brand which they prefer is reflected by higher growth rate of new subscribers added with that brand in the study period. The sentiment analysis results can be used by managements to take timely actions for improving the future customer experience and avoiding customer churn.
International Journal of Research in Engineering and Technology, 2014
The reusable software components can be defined in several ways. The reusable software components... more The reusable software components can be defined in several ways. The reusable software components possess a distinct functionality that does not affect the functionality of other components. It has also been specified precisely that for what the component reuse stands for and for what the component reuse does not stands for. It is required to characterize the components for better reuse. Characterization describes the features and characteristics of components. Distinct components show distinct characteristics in different domains of their usage and in different operating environments. The components can be classified on the basis of features it have, that facilitates with the better usage, better retrieval, better understanding and better cataloguing. Through component classification one gets the assurance of selecting right component and it suggests various ways in which a component can be reused. The paper explains for the need of characterization which ultimately is reflected from the above stated fact. It also provides with the criteria to characterize the reusable components. The criterion is laid down while keeping in mind the general specifications and formal specifications. These specifications in one way determine the feasibility of a reusable component at the initial level. The general and formal specifications depict the internal and external characteristics which play a significant role in the identification, selection, adoption and implementation of components in a particular application development. Specifications will tell the true character of a reusable component that helps to outline the required components. It also discusses the influence of characterization that it puts on the reuse of reusable components.
Developing new application softwares using proprietary softwares is a process which encounters wi... more Developing new application softwares using proprietary softwares is a process which encounters with the economic issues. Many times the budget gets overrun. And the govt. organizations and many times even private sector has no big amounts of budget to spend upon the proprietary softwares licences. In such scenario free and open source softwares is a good option to depend upon.
2018 4th International Conference on Computing Sciences (ICCS), 2018
Corporations have always desired prompt customer experience feedback about their products for ame... more Corporations have always desired prompt customer experience feedback about their products for amending current pricing and policies to stay ahead of their competitors. A positive customer experience can be created by analyzing customer sentiments and acting on them promptly. Social networks like Twitter represent collective intelligence and opinion of the general public and hence can be harnessed for real-time feedback. They have evolved as a resource for extracting sentiments for applications in various fields. Sentiment analysis can be used to obtain the overall customer experience of a large customer base on a real time. In this research, a total of 153,651 distinct tweets for Twitter handle of 5 popular telecom brands in India: Aircel, Bharti Airtel, Idea Cellular, Reliance Jio and Vodafone India were extracted for five months to develop a prediction model for telecom subscriber addition using the sentiment score. The results were validated statistically using correlation analysis. Positive customer sentiments about the brand which they prefer is reflected by higher growth rate of new subscribers added with that brand in the study period. The sentiment analysis results can be used by managements to take timely actions for improving the future customer experience and avoiding customer churn.
In 1983 Richard Stallman founded the free software movement. According to the founder this type o... more In 1983 Richard Stallman founded the free software movement. According to the founder this type of software respects user's freedom and social solidarity of development team called community in FOSS terminology. Whereas proprietary softwares take away the user's freedom and keep the users helpless. In free and open source software the concept of sharing the source code is used. Here all the participants are connected through internet. FOSS has grown now in a full fledged software development methodology thruought the world. This methodology cuts down or reduces the cost of software. Also no country of the world wants to waste crores of rupees on softwares which are proprietary as they have an option to divert to this new category of software. But all want to be safe by getting acquainted with various issues related with free and open source software. Therefore the main aim of this article is to highlight the important issues related with free and open source software KEYWORD...
Handling of reusable software components will be a step towards creating a discipline in the fiel... more Handling of reusable software components will be a step towards creating a discipline in the field of reusable software components. The concept of handling emerges from the idea that the reusable components should be used, transacted, stimulated, and retrieved by adhering to proper guidelines and standards. As the guidelines and standards are followed while handling with the other entities, the software components should also be dealt with the same way. If the guidelines and standards are not followed while handling the software components, there won't be any regularity on the components. Therefore, the study has provided with the standards and guidelines for handling of reusable software components. It would affect the quality of reusable software components. Consequently, the quality of software products composed from these components will be affected. Also, the lack of handling will have a negative impact on the whole market of reusable components. The study also stated the p...
Free and open source softwares like PHP are very useful to develop FOSS applications. This and ot... more Free and open source softwares like PHP are very useful to develop FOSS applications. This and other such plateforms are costfree and easily available on Internet. Developers can develop versatile applications using such softwares. Such a case study has been performed by self developing a web application. A teacher can supply the teaching lerning material to the students by this Application. The students can study large number of subjects. And students can be in large number not necessarily of same class but they can be of defferent classes also. Using this application the teacher can upload the study material easily and students can view as well as download the study material by going to web on http://kumarsushil.com/.
The free and open source software and its adoption is a worldover movement. Here India is also a ... more The free and open source software and its adoption is a worldover movement. Here India is also a part. Govt of India is also trying for its adoption in various spheres of life. However India is successful but partially as many countries are ahead to India. However if strategy for the same is updated time and again India will also lead the world in this movement.
A significant collection of software assets are used in all high-tech organizations and software ... more A significant collection of software assets are used in all high-tech organizations and software business. Today, the major concern is with the maintenance and reuse of software which can be further invested in such a manner that its value may increase with passage of time but not like accountability whose value diminishes with the time. It has been an issue of forceful debate and keen interest for more than two decades for the software engineers to make a choice between the software reengineering and software maintenance. Metric structure which has been discussed in this work can be helpful in calculating the required reengineering cost of system and its various modules. Its authenticity has been proved with the help of a case study. A choice can be made regarding the maintenance, reengineering and retirement need of software or parts of software after obtaining results by these metrics.
International Journal of Advanced Research in Computer Science, 2017
According to [1]Framework for Adoption of Open Source Software in e-Governance Systems Version 1.... more According to [1]Framework for Adoption of Open Source Software in e-Governance Systems Version 1.0 April 2015, prescribed by Department of Electronics and I. T., Ministry of Communications and I. T. , Government of India , Annexure-II Illustrative list of OSS includes Icedtea, PHP, HTML, libre office, open office, Koha, evergreen, Gimp, evince, clamav, Bresero, CloudStack, Meghdoot , Ubuntu and BOSS. As per the recommendations of Govt of India the organizations should prefer the softwares of FOSS category but according to [2] Red Hat – Georgia Tech study ranked the top countries in FOSS adoption. India is at twenty third rank out of 75 countries studied. It means that the apeal of our former scholar president APJ Abdul Kalam, to Embrace open source philosophy[3] has not been followed properly... It is being said that Government’s OS BOSS is dying a slow death due to lack of patronage[4]. In the above scenario BOSS (Bharat Opearting System Solution) , a free n open source software ha...
International Journal of Advanced Research in Computer Science, 2017
An improvement in maintainability of software components has the potential to affect the maintena... more An improvement in maintainability of software components has the potential to affect the maintenance practices. The maintainers are more likely to follow the maintenance process that improves the maintainability of software components. The study presents a method that is intended to improve the maintainability of reusable software components. The study floats the idea of improving maintainability of reusable software components through versioning. It states that on creating a new version of a reusable software component, the maintainability increases. It validates the concept through case study conducted on open source software. The reason for taking open source software as case study is that their probability to be reused is more as compared to other software components. The study makes use of metrics to calculate maintainability and other factors that affect it. The study is also compared with other related studies to exhibit its contribution. Keywords: Maintainability index, vers...
International Journal of Advanced Research in Computer Science, 2017
Cloud computing is emerging paradigm for provisioning services over the internet. It is the area ... more Cloud computing is emerging paradigm for provisioning services over the internet. It is the area of research where a cloud is used to access data, files, software etc. It allows sharing of networks servers, data applications, storage and services as computing resources. In cloud computing there is an interaction among various heterogeneous independent cloud platforms. This is possible only through interoperability which plays a key role in providing access to cloud computing in different environments. In other simple words it means the user needs interoperability to ship their assets from one cloud to other cloud. This paper emphasizes upon concerns and challenges emerging in Cloud Computing.