i-manager's Journal on Software Engineering (JSE)


Volume 17 Issue 2 October - December 2022

Research Paper

Using Open-Source Sentinel-1A Images for Flood Susceptibility Mapping in North Bihar, India

Ashish Aggarwal* , Anjali**
*-** Petroleum & Earth Sciences Department, University of Petroleum & Energy Studies (UPES), Bidholi, Dehradun, Uttarakhand, India.
Aggarwal, A., and Anjali. (2022). Using Open-Source Sentinel-1A Images for Flood Susceptibility Mapping in North Bihar, India. i-manager’s Journal on Software Engineering, 17(2), 1-10. https://doi.org/10.26634/jse.17.2.19191

Abstract

Natural calamities such as floods are a severe menace, causing huge socio-environmental threats. Remote sensing technologies have proven to be a boon in precisely mapping the spatiotemporal effects and spread of floods, allowing remedial measures to be implemented on time. This paper aims to demarcate the extent of flooded areas in the study area by the application of remote sensing techniques that involve combining temporal images acquired during the flood (crisis images) with images acquired before the flood (archive images). In disaster mapping applications, the image that is acquired before the event takes place is referred to as the archive image, while the image that is acquired at the time of the event is referred to as the crisis image. The research objectives were achieved through the analysis of freely available Sentinel-1A data to delineate the extent of flooded areas in the European Space Agency's-Sentinel Applications Platform (ESA-SNAP) environment. Multi-looking, radiometric calibration, and range doppler terrain correction (geometric) were applied to the temporal images for better visualization and distinction and for projecting the pixels onto the proper map system. Later, the archive and crisis images were overlaid to form a Red Green Blue (RGB) composite that showed the extent and spread of floods in north Bihar, where each color represented areas of different significance. Further, the flood map was overlaid onto the Google Earth optical layer for better visualization and comparison. The work demonstrated the applicability and use of remote sensing and GIS technology to quickly gain insight into the spatial and temporal distribution of floods in a given region and could be used as a precursor for efficient flood management and relief measures.

Research Paper

Blasting Optimization using O-Pitblast Software

Nirlipta P. Nayak*
Energy Cluster, UPES, Dehradun, Uttrakhand. India.
Nayak, N. P. (2022). Blasting Optimization using O-Pitblast Software. i-manager’s Journal on Software Engineering, 17(2), 11-19. https://doi.org/10.26634/jse.17.2.19193

Abstract

The optimal cost of blasting is a major factor in the surface mining industry and must be addressed properly. The project will include the variability of components of blast design, such as change in azimuth of the holes intended for blasting to reduce explosive consumption and have a major role in controlling ground vibrations; pattern of holes (diameter of holes); electric and non-electric initiation; toe burden analysis; type of explosive used (slurry and ANFO); and adopting an efficient design by mathematical cost analysis using O-Pitblast software. The damage to temporary structures in surface mining that are located within close proximity of blasting faces is a serious problem and has to be countered using an alternating blast design in correspondence to the permissible Post-Production Verification (PPV) that a structure can withstand. The estimation of the PPV graph using seismographic data of the face must comply with different ground vibration equations to check whether the predicted model of blasting is up to safety norms and the demarking of the blasting zone.

Review Paper

Blockchain Technology: Opportunities and Challenges in Various Domains

Aman Kumar Dhiman* , Ajay Kumar**
*-** Department of Computer Science and Informatics, Central University of Himachal Pradesh, Dharamsala, Himachal Pradesh, India.
Dhiman, A. K., and Kumar, A. (2022). Blockchain Technology: Opportunities and Challenges in Various Domains. i-manager’s Journal on Software Engineering, 17(2), 20-26. https://doi.org/10.26634/jse.17.2.19175

Abstract

Blockchain has been used in non-financial applications since it was first introduced with Bitcoin. Bitcoin uses peer-topeer technology to operate without a central authority or banks; the management of transactions and the issuance of bitcoins is carried out collectively by the network. Bitcoin is open source; its design is public, no one owns or controls bitcoin, and anyone can participate. In blockchain technology, no intermediaries are used to establish a decentralized system. Based on literature reviews, this paper discusses blockchain technology concepts, mechanisms, applications, opportunities, and other relevant solutions for real-world problems. Blockchain concepts are discussed in this paper using healthcare, education, and logistics examples. Finally, it will discuss the various blockchains, their permissions, architectures, and emerging features.

Review Paper

Introducing Security Configuration for gRPC in Microservices with Application Load Balancer

Isarar Khan* , Mohammad Kalamuddin Ahmad**
*-** Department of Computer Application, Integral University, Lucknow, India.
Khan, I., and Ahmad, M. K. (2022). Introducing Security Configuration for gRPC in Microservices with Application Load Balancer. i-manager’s Journal on Software Engineering, 17(2), 27-30. https://doi.org/10.26634/jse.17.2.19107

Abstract

The primary goals of this paper is to contribute a useful method and present the advantages of Google Remote Procedure Calls (gRPC) for real-time two-way data transfer as well as to improve the security of microservices that use gRPC. The communication between two or more services is one of the key difficulties in splitting a monolithic application into microservices. When it utilizes gRPC to transmit in real-time, it responds quickly and with greater security. The gRPC protocol is now supported by application load balancing.

Review Paper

Review on Software Dependability and Exception Handling for the Object-Oriented Design Phase

Syed Saif Ahmad Abidi*
Department of Computer Science, Shia Post Graduate College, Uttar Pradesh, India.
Abidi, S. S. A. (2022). Review on Software Dependability and Exception Handling for the Object-Oriented Design Phase. i-manager’s Journal on Software Engineering, 17(2), 31-36. https://doi.org/10.26634/jse.17.2.19182

Abstract

The issue of dependability and exception handling is very important, and it is best to address the dependability of software at the very early stage or beginning of the development life cycle. The Object-Oriented Design (OOD) phase works as a base. The object-oriented approach is used to represent the problem domain and clearly understand the design. This paper defines dependability and exception handling that must be addressed during the design phase. Dependability can be achieved through the proper placement or management of design characteristics and the establishment of relationships between them and to develop an exception-handling model that provides a distinct and transparent separation between a component's regular activity and its exceptional action.