Research Article
Page no: 1 - 4
Aryan Marwah
Data mining is the technique in which data is to be extracted from heap of data’s which is previously unknown.This paper gives a brief overview of data mining techniques related ...
Research Article
Page no: 5 - 10
Rishit Kalra
Detection of various facial expression like OCR and gender has been broadly observed,persons profile and age group has been investigated. with the change of people’s age, face fe...
Research Article
Page no: 11 - 15
Simran Narang
The education system has a significant role in keeping up the Economic development of a nation. Recently candidates are more into the remote study as compare to the classroom. Henc...
Research Article
Page no: 16 - 24
Atul Antil
Now a day there is a huge demand of face detection for security like banking, phone lock and other devices. Due to huge demand of machine learning technique to train and test data....
Research Article
Page no: 25 - 36
Omar T Sheta, Anajah Rahile, Adelbast Amer, Khaled Turky
In this study, solidification/stabilization (S/S) of heavy metals (HMs) (lead, (Pb); copper, (Cu); zinc, (Zn); nickel, (Ni); and chromium, (Cr)) using mixture of Portland cement (P...
Research Article
Page no: 37 - 42
Raghav Mittal
From the last few years, the scope of cloud computing is increased more. With the improvement in the field of distributed computing, there is additionally the need to verify the in...
Research Article
Page no: 43 - 47
Sarthak Mendiratta
The usage of a Genetic calculation in the symmetric square figure Advanced Encryption Standard - 128 (AES-128) calculations to improve the exhibition of cryptographic tasks. The ge...
Research Article
Page no: 48 - 52
Amardeep Chahal
A remote sensor coordinate with a huge number of sensor hubs can be utilized as a successful instrument for social event information in different circumstances. Remote sensor syste...
Research Article
Page no: 53 - 71
Veronica Singh
Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues r...
Research Article
Page no: 72 - 78
Akshata Rahul Pathak
The term, Big Data' has been begat to allude to the tremendous main part of information that can't be managed by conventional information dealing with methods. Huge Data is as yet ...
Research Article
Page no: 79 - 86
Hardik Chaudhary
Extracting information from large amount of data is known as data mining which contains structured and semi structured data formats. Data mining includes prediction and analysis of...
Research Article
Page no: 87 - 93
Pavit
The Internet of Things (IoT) and Big Data have made the leap to turn into a mainstream issue and maintains board level priorities. Both IoT and big data are continuously creating h...
Research Article
Page no: 94 - 98
Chaitanya Sachdeva
For the explanation of enormous scale proteins, computational techniques or apparatuses are utilized. One of the disadvantages of these comment instruments is that they are not exp...
Research Article
Page no: 99 - 107
Aashima Bansal
Information mining and AI systems help us to better and more profound comprehension of gathered information. Meta-learning strategies expand this idea by giving techniques to infor...
Research Article
Page no: 108 - 119
Drishti Arora
To structure effective half and half design for information security is applied for verifying correspondence interface between two clients/senders by thinking about symmetric key c...
Research Article
Page no: 120 - 123
Shreya Ahuja
An epic quantum parallel democratic plan that utilizations just a solitary qubit is proposed. In particular, the convention is planned by altering a solitary qubit based plan for c...
Research Article
Page no: 124 - 128
Hardik Chaudhary, Vipul Goyal
The major objective of textual information retrieval is to process, search, and analyse the factual data from various applications. There are various textual contents, however, whi...
Research Article
Page no: 129 - 133
Anirudh Dahiya
The upgrading capacities and dispersal of versatile innovation increment the chance to assess possibly flimsy moveable gadgets as sources into lattices. Right now, we examined by p...
Research Article
Page no: 134 - 142
Mukul Ganghas
Objective: With the emergence of the belief of the "Internet of Things (IoT)," an enormous quantity of Data is being generated through the sensors and other computing gadgets and c...
Research Article
Page no: 143 - 151
Unnati Gupta
As the worldwide population is increasing rapidly, so it is obvious that the demand for food also increase—likewise, nations like India whose 1/third capital originated from cult...
Research Article
Page no: 152 - 158
Aditya Goel
As the web develops rapidly, social networking interpersonal communications have become an essential part of day to day life where individuals can chat with one another, spreading ...
Research Article
Page no: 159 - 165
Tejas Vaid
Finance managers or the move towards self‐employment is and will continue transforming into, an unyieldingly huge part of money related turn of events and progression. It is righ...
Research Article
Page no: 166 - 172
Ghanisht Aggarwal
To improve the farmers' salary through smart farming. Cultivating is improved either by expanding profitability or by diminishing the expense. In this investigation, the expense ac...
Research Article
Page no: 173 - 183
Arya Jhamb
Humans are used to classifying whatever they have around them, and what they see, there are many ways to classify objects that we see all around us, there are many categories in wh...
Research Article
Page no: 184 - 189
Mohika Nagpal
This paper analyses what microfinance organizations are doing to ensure their customers – generally, ladies having a place with more vulnerable segments - from mis-spelling, over...
Research Article
Page no: 190 - 206
Gitesh Budhiraja
Gigantic development of web information makes an amazing fantasy in the field of PC and data innovation for extricating important substance from the web. Numerous associations and ...
Research Article
Page no: 207 - 214
Deeya Tangri
Facial shape, hand shape, fingerprint, iris, voice are widely used in biometric devices for human identity detection. Iris recognition is commonly used in security verification and...
Research Article
Page no: 215 - 223
Rishita Tyagi
Telephonic selling campaigns are perhaps the best approaches to contact people to sell items, however numerous a periods or more often than not are squandered on clients that needn...
Research Article
Page no: 224 - 229
Vedant Chhibber
Distributed storage is an alluring idea in the IT field since it permits the assets to be provisioned by the client needs. It offers assistance on virtual machines whereby the clie...
Research Article
Page no: 230 - 236
Devansh Balhara
The development of the web has helped E-Commerce (internet shopping). These days, web-based shopping is exceptionally well known with the expanded number of people associated with ...
Research Article
Page no: 237 - 242
Sehaj Bedi
Robotic Process Automation has turned into a popular expression and transforms practically all fields in helping computerize dull human-serious undertakings more easily. RPA is onl...
Research Article
Page no: 243 - 248
Lakshit Dua
Price is an important figure in monetary exercises. Unexpected cost fluctuations demonstrate flaws. AI offers different systems for foreseeing item costs to manage market unpredict...
Research Article
Page no: 249 - 255
Shreyansh Balhara
In this review, Various machine learning methods are used for opinion analysis. For the most part, did feeling examination by using AI classifiers like SVM (support vector machine)...