Research Article
Page no: 1 - 40
Aayush Goel
Transferring data to and from relational databases is testing and relentless. Since data exchange requires watchful taking care of, Apache Sqoop, another way to say "SQL to Hadoop,...
Research Article
Page no: 41 - 68
Shobhit Mishra, Shubham Tokas, Jatinder Pal Singh
Development of new technologies in the field of locomotion in automobiles is crucial in the quest to find new ways to make a vehicle perform. The current state of automobiles requi...
Research Article
Page no: 69 - 77
Vishal Duhan
Now a days, lots of people in current era using social media for making their mindset to buy some products or services. Opinion mining spam investigation is a challenging errand to...
Research Article
Page no: 78 - 86
Pushkar Garg
The purpose of this article is to describe explores ways to solve the difficult problems in the study of the intelligent information retrieval system. This paper first discusses th...
Research Article
Page no: 87 - 101
Karan Gupta
Different authorities have coordinated examinations on the affirmation of feeling from human talk with different examination designs. Speech Emotion Recognition (SER) is a specific...
Research Article
Page no: 102 - 108
Sahil Kapoor
Big knowledge refers to varied types of massive info sets that need special machine platforms so as to be analyzed. analysis on huge knowledge emerged within the Nineteen Seventies...
Research Article
Page no: 109 - 118
Divyashi Agrawal
Today secure communications are increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutionize...
Research Article
Page no: 119 - 135
Karan Sablok
An instructive foundation needs an inexact earlier learning of selected understudies to foresee their execution in future scholastics. This encourages them to distinguish promising...
Research Article
Page no: 136 - 144
Adarsh Dhiman
We present a comprehensive Braintumours screening and arrangement strategy for identifying and recognising different kinds of cerebrum tumours on MR pictures. The difficulties emer...
Research Article
Page no: 145 - 152
Ruchika Goel
Computer viruses are serious threats to society. There are numerous procedures that are used for resolving this downside. Our purpose here is to create a collective look on numerou...
Research Article
Page no: 153 - 159
Raj Verma
One of the major widespread disease in these days for women is breast cancer. right treatment and early detection is a major step to take to prevent this disease. however, it's not...
Research Article
Page no: 160 - 170
Rahul Garg
To prepare an efficient algorithm to sort rice grains in with respect to the differences in grain size. The raw rice available in the market consists of anomalies in its size, shap...
Research Article
Page no: 171 - 179
Rashmi Panchal
Development of science and technology is enormously blistering. Nowadays, smartphones such as iPhone, Blackberry, Samsung Galaxy, HTC, and of course Nokia series etc are most deman...
Research Article
Page no: 180 - 191
Nishita Lamba
Web based shopping or web based retailing is a type of electronic trade enabling customers to specifically purchase products or administrations from a merchant over the Internet wi...
Research Article
Page no: 192 - 195
Saksham Rai
Epigenetic modifications, and in particular the acetylation and deacetylation of histones are major contributors to carcinogenesis and form an increasingly important area in cancer...
Research Article
Page no: 196 - 206
Madhav Sehgal
The Internet of Things (IoT) remains that things will have the option to distinguish data from the environment and distribute with the physical world. We recently proposed middlewa...
Research Article
Page no: 207 - 217
Saumya Shikhar Raj
Objective: This paper focuses around the approaches to start specialist co-ops to make a more secure cloud platform by just verifying distributed computing servers, contributing a ...
Research Article
Page no: 218 - 227
Saumya Shikhar Raj
Objectives: To design a classifier for the detection of Diabetes Mellitus with optimal cost and precise performance. Method and Analysis: The diagnosis and interpretation of the di...
Research Article
Page no: 228 - 231
Raghav Mittal
Intrusion and attack continue to happen in a network by exploiting vulnerabilities.The fortification at several layers has been carried out in order to strengthen the security, yet...
Research Article
Page no: 232 - 238
Anoushka Gupta
Background/Objectives: A new systolic algorithm for median filtering is analyzed in this paper; this algorithm is suitable for VLSI implementation to design an optimized median fil...
Research Article
Page no: 239 - 246
Shubham Aggarwal
Cloud computing is one of the most demanding technology in recent times. Though it is costly and having lots of challenges in managing cloud servers, still it is demanding and used...
Research Article
Page no: 247 - 257
Vipul Goyal
For both the generation and utilization of information, the web is turning into a standard though the security for private information is progressively diminishing. In this way, to...
Research Article
Page no: 258 - 262
Aryaman Chopra
Spatial databases are continuously used to set examples, models, by giving information parameters to spatially unequivocal methodology test frameworks. Worldwide geographic, Bioche...
Research Article
Page no: 263 - 279
Romharsh Mittal
Objectives: To provide related literature on the detection of Abusive language on Twitter using natural language processing (NLP). Methods: In this study, the survey has been con...
Research Article
Page no: 280 - 288
Chakshu Gupta
We present a comprehensive Brain tumours screening and arrangement strategy for identifying and recognizing different kinds of cerebrum tumors on MR pictures. The difficulties emer...
Research Article
Page no: 289 - 294
Stuti Garg
Jungles are the reason for supporting the biological system and clears the earth and gives cover nourishment to life reliant on it. People owe an incredible obligation in protectin...
Research Article
Page no: 295 - 300
Janit Puri
Programmed tweak characterization (AMC) is a methodology that can be utilized to distinguish a watched sign's most probable utilized tweak conspire with no from the earlier informa...
Research Article
Page no: 301 - 306
Rahul Ohlan
With the developing use of PC applications, there is developing reliance on business over PC helped administrations like messages. The CRM or E-Mail based advertising organizations...
Research Article
Page no: 307 - 316
Bhavay Bajaj
Today, numerous clients utilize informal communication locales, for example, Facebook, Twitter, Linked In, and so forth, where client's offer their viewpoint on a specific occasion...
Research Article
Page no: 317 - 323
Ram Khanna
A recommendation framework helps individuals in changing a thing/individual. Recommender frameworks are presently unavoidable and try to gain clients or effectively address their i...
Research Article
Page no: 324 - 328
Dr. Anju Pathak
According to FAO “Organic farming is a unique production management system which promotes and enhances agro-ecosystem health, including biodiversity, biological cycles and soil b...