INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2016

PAST ISSUE


Vol. 4, Jan-Dec 2018

Research Article

 Page no: 001-040

AN ANALYTIC STUDY OF PERFORMANCE TUNED SQOOP TO MONITOR THE EFFICACIOUS TRANSFORM BETWEEN SQL AND NOSQL

Aayush Goel

Transferring data to and from relational databases is testing and relentless. Since data exchange requires watchful taking care of, Apache Sqoop, another way to say "SQL to Hadoop,...

Research Article

 Page no: 041-068

CONSTRUCTION AND TESTING OF COMPRESSED AIR VEHICLE

Shobhit Mishra, Shubham Tokas, Jatinder Pal Singh

                     Download PDF

Research Article

 Page no: 069-077

ANALYZING THE USABILITY OF ONTOLOGY LINKED NAIVE BAYESIAN TO CHECK PERVASIVE ONLINE SPAM REVIEW

Vishal Duhan

Now a days, lots of people in current era using social media for making their mindset to buy some products or services. Opinion mining spam investigation is a challenging errand to...

Research Article

 Page no: 078-086

INTELLIGENT INFORMATION RETRIEVAL SYSTEM: EMPLOYABILITY OF NATURAL LANGUAGE UNDERSTANDING & KNOWLEDGE ACQUISITION AS AN INFLUENCER TO ENHANCE CREDIBIL...

Pushkar Garg

The purpose of this article is to describe explores ways to solve the difficult problems in the study of the intelligent information retrieval system. This paper first discusses th...

Research Article

 Page no: 087-101

DEVELOPING AN INTEGRATED MODEL USING SIGNAL AND SPEECH PROCESSING, CONTENT AND ACOUSTIC ANALYSIS TO ENHANCE THE EFFICACY OF SER USING PREDICTIVE STATI...

Karan Gupta

Different authorities have coordinated examinations on the affirmation of feeling from human talk with different examination designs. Speech Emotion Recognition (SER) is a specific...

Research Article

 Page no: 102-108

ENHANCING THE PERFORMANCE OF APACHE HADOOP IN MINING SORTING AND NORMALISING LARGE DATA SETS

Sahil Kapoor

Big knowledge refers to varied types of massive info sets that need special machine platforms so as to be analyzed. analysis on huge knowledge emerged within the Nineteen Seventies...

Research Article

 Page no: 109-118

QUANTUM CRYPTOGRAPHY – EXPLORING THE APPLICABILITY OF BB84 AND EPR ALGORITHMS IN ENHANCING THE QKD

Divyashi Agrawal

Today secure communications are increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutionize...

Research Article

 Page no: 119-135

INFORMATION MINING: EMPLOYABILITY OF ID3 & C4.5 ALGORITHMS IN ENHANCING CLASSIFICATION CRITERIAS

Karan Sablok

An instructive foundation needs an inexact earlier learning of selected understudies to foresee their execution in future scholastics. This encourages them to distinguish promising...

Research Article

 Page no: 136-144

EXPLORING THE EMPLOYABILITY OF DENSE NET AND RECURRENT NEURAL NETWORK IN THE EFFICACIOUS DEVELOPMENT OF BRAIN TUMOUR CLASSIFICATION

Adarsh Dhiman

We present a comprehensive Braintumours screening and arrangement strategy for identifying and recognising different kinds of cerebrum tumours on MR pictures. The difficulties emer...

Research Article

 Page no: 145-152

EVALUATING THE EFFECTIVENESS OF KEY ALGORITHMS OF PATTERN MATCHING TO ENHANCE THE EFFICACY OF BOYER-MOORE-HORSPOOL ALGORITHM AND RABIN KARP ALGORITHM ...

Ruchika Goel

Computer viruses are serious threats to society. There are numerous procedures that are used for resolving this downside. Our purpose here is to create a collective look on numerou...

Research Article

 Page no: 153-159

EXPLORING THE APPLICATION OF MACHINE LEARNING STRATEGIES AND TOOLS IN THE DIAGNOSIS AND PROGNOSIS OF BREAST CANCER

Raj Verma

One of the major widespread disease in these days for women is breast cancer. right treatment and early detection is a major step to take to prevent this disease. however, it's not...

Research Article

 Page no: 160-170

ANALYZING AND IDENTIFYING THE RAW RICE GRAIN SORTING TECHNIQUES EMPLOYING MATLAB TO DEVELOP AN EFFICIENT SORTING ALGORITHM FOR COMMERCIAL EXPLOITATION...

Rahul Garg

                     Download PDF

Research Article

 Page no: 171-179

ATTEMPTING AN IN-DEPTH ANALYSIS OF SMARTPHONE USER DEMOGRAPHICS TO DEVELOP THE EMPLOYABILITY OF AN ANALYTICS MODEL IN PREDICTING USER BEHAVIOUR

Rashmi Panchal

                     Download PDF

Research Article

 Page no: 180-191

ATTEMPTING A FRAMEWORK FOR THE INFERENTIAL ANALYTICS TO CREATE AN ONLINE SHOPPING DATA WAREHOUSE FOR REAL TIME PREDICTIONS

Nishita Lamba

                     Download PDF

Research Article

 Page no: 192-195

AN EXPLORATION, EVALUATION OF SOFTWARES AND DATABASE MODELS IN THE EFFICACIOUS APPLICATION OF MODERN BIOINFORMATICS TECHNIQUES IN THE EARLY DETECTION ...

Saksham Rai

Epigenetic modifications, and in particular the acetylation and deacetylation of histones are major contributors to carcinogenesis and form an increasingly important area in cancer...

Research Article

 Page no: 196-206

RFID ADAPTOR FOR DETECTING AND HANDLING DATA/ OCCASIONS IN THE INTERNET OF THINGS

Madhav Sehgal

The Internet of Things (IoT) remains that things will have the option to distinguish data from the environment and distribute with the physical world. We recently proposed middlewa...

Research Article

 Page no: 207-217

AN EXPLORATION OF THE KEY INFLUENCER TO SECURITY FEATURES IN CLOUD COMPUTING FRAMEWORK AND PLATFORMS

Saumya Shikhar Raj

Objective: This paper focuses around the approaches to start specialist co-ops to make a more secure cloud platform by just verifying distributed computing servers, contributing a ...

Research Article

 Page no: 218-227

EMPLOYABILITY OF HYBRID EXTREME LEARNING AND NEURAL NETWORKS IN THE EFFICACIOUS DIAGNOSIS AND MANAGEMENT OF DIABETES MELLITUS

Saumya Shikhar Raj

Objectives: To design a classifier for the detection of Diabetes Mellitus with optimal cost and precise performance. Method and Analysis: The diagnosis and interpretation of the di...

Research Article

 Page no: 228-231

EMPLOYBILITY OF INTRUSION DETECTION USING IP AND MAC ADDRESS TRACING IN CLOUD COMPUTING NETWORK

Raghav Mittal

Intrusion and attack continue to happen in a network by exploiting vulnerabilities.The fortification at several layers has been carried out in order to strengthen the security, yet...

Research Article

 Page no: 232-238

EMPLOYABILITY OF DIGITAL IMAGE PROCESSING APPLICATION IN FPGA AND ASIC IMPLEMENTATION OF SYSTOLIC ARRAYS FOR THE DESIGN OF OPTIMIZED MEDIAN FILTER

Anoushka Gupta

Background/Objectives: A new systolic algorithm for median filtering is analyzed in this paper; this algorithm is suitable for VLSI implementation to design an optimized median fil...

Research Article

 Page no: 239-246

ATTEMPTING AN ANALYSIS OF THE KEY INFLUENCES OF BUSINESS INTELLIGENCE AND ITS EFFICACY IN CLOUD COMPUTING ENVIRONMENTS

Shubham Aggarwal

Cloud computing is one of the most demanding technology in recent times. Though it is costly and having lots of challenges in managing cloud servers, still it is demanding and used...

Research Article

 Page no: 247-257

DEVELOPING A MODEL BASED ON PRIVACY PRESERVING DATA MINING (PPDM) SYSTEMS TO ENHANCE THE SECURITY SAFEGUARD ON MEDICAL DATABASES

Vipul Goyal

For both the generation and utilization of information, the web is turning into a standard though the security for private information is progressively diminishing. In this way, to...

Research Article

 Page no: 258-262

DEVELOPING A MODEL BASED ON GEOGRAPHICAL DATA TO IMPLEMENT MAP ANALYSIS IN REAL TIME

Aryaman Chopra

Spatial databases are continuously used to set examples, models, by giving information parameters to spatially unequivocal methodology test frameworks. Worldwide geographic, Bioche...

Research Article

 Page no: 263-279

APPLICABILITY OF SVM, RANDOM FOREST, AND DECISION TREE ALGORITHMS IN TEXT MINING FOR EFFECTIVE DETECTION OF ABUSIVE LANGUAGE IN ASSIGNED DATASETS

Romharsh Mittal

Objectives: To provide related literature on the detection of Abusive language on Twitter using natural language processing (NLP). Methods: In this study, the survey has been con...

Research Article

 Page no: 280-288

LEVERAGING THE RECURRENT NEURAL NETWORK AND DENSE NET IN THE CLASSIFICATION OF BRAIN TUMORS

Chakshu Gupta

We present a comprehensive Brain tumours screening and arrangement strategy for identifying and recognizing different kinds of cerebrum tumors on MR pictures. The difficulties emer...

Research Article

 Page no: 289-294

DEVELOPING AN INTEGRATED SYSTEM BASED ON INTERNET OF THINGS (IOT) AND WIRELESS SENSING NETWORK (WSN) IN THE EFFICACIOUS EARLY DETECTION AND PREVENTION...

Stuti Garg

Jungles are the reason for supporting the biological system and clears the earth and gives cover nourishment to life reliant on it. People owe an incredible obligation in protectin...

Research Article

 Page no: 295-300

DEVELOPMENT OF A PROGRAMMED MODULATION CLASSIFICATION BASED ON IN-PHASE QUADRATURE DIAGRAM CONSTELLATION LINKED TO DEEP LEARNING MODEL

Janit Puri

Programmed tweak characterization (AMC) is a methodology that can be utilized to distinguish a watched sign's most probable utilized tweak conspire with no from the earlier informa...

Research Article

 Page no: 301-306

USING JADE (JAVA AGENT DEVELOPMENT FRAMEWORK) FOR COORDINATION OF INTEGRATED AGENT SYSTEM IN EMAIL

Rahul Ohlan

With the developing use of PC applications, there is developing reliance on business over PC helped administrations like messages. The CRM or E-Mail based advertising organizations...

Research Article

 Page no: 307-316

LEVERAGING THE DATA MINING TOOLS AND TECHNIQUES FOR ENHANCING THE EFFICACY OF SENTIMENT ANALYSIS AND COMMENSURATE CROWD MANAGEMENT

Bhavay Bajaj

Today, numerous clients utilize informal communication locales, for example, Facebook, Twitter, Linked In, and so forth, where client's offer their viewpoint on a specific occasion...

Research Article

 Page no: 317-323

DEVELOPING A COLLABORATIVE FILTERING SYSTEM FOR AN EFFICACIOUS MOVIE RECOMMENDATION

Ram Khanna

A recommendation framework helps individuals in changing a thing/individual. Recommender frameworks are presently unavoidable and try to gain clients or effectively address their i...