INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

(By Aryavart International University, India)

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2015

Impact Factor(2021): 5.246 | Impact Factor(2022): 5.605

PAST ISSUE


Vol. 6, Jan-Dec 2020

Research Article

 Page no: 1 - 8

DEVELOPING A MACHINE LEARNING REGRESSION MODEL RELYING ON INSTANCE-BASED LEARNING STREAMS FOR EFFICACIOUS DATA MINING

Pranshul Pahwa

Information mining is concerned about the investigation of information for discovering examples and regularities in the informational collections. Mathematical science is concerned...

Research Article

 Page no: 9 - 17

USING UNIMODAL FRAMEWORK WITH BIOMETRIC CLASSIFICATION TO ENHANCE MULTI-MODEL SECURITY SYSTEM

Hardik Chaudhary

The usage of Biometric devices nowadays is very common in every field. It helps to identify the persons by their behavioural or physiological features. Multi biometric system has t...

Research Article

 Page no: 18 - 23

DEVELOPING AN AUTOMATED COUNTERFEIT CURRENCY RECOGNITION SYSTEM BY EMPLOYING SVM WITH NOTE TO COIN EXCHANGER FEATURE

Atul Kalkhanda

The normal citizens are the most noticeably terrible hit as fake banknotes have gotten so profoundly inserted in the Indian economy that even banks and ATMs are dispensing fake cas...

Research Article

 Page no: 24 - 27

Risks in Adolescence for Clustered Cardiovascular: A Factor Analysis

Jaspreet Singh

The research concludes that risk clusters of cardiovascular diseases (CV), even though the onset of atherosclerotic heart diseases, can not be seen before adulthood, start early in...

Research Article

 Page no: 28 - 32

Analysis of Data Mining Clustering Technique using Knowledge Discovery (KDD) process

Sara Dahiya

Data mining is a technique that helps in extracting important data from a huge amount of unwanted data. There are three types of data mining technique namely clustering, classifica...

Research Article

 Page no: 33 - 36

Developing an Integrated Model Based on Tetrad Algorithm to Leverage Econometrics Devices for Price Casual Relation of OPEC and Non-OPEC Oil Markets

Yatharth Chandna

Raw petroleum value elements decide the request for the world oil market in which OPEC and Non-OPEC nations assume significant function as exporters and shippers. The co-mix and da...

Research Article

 Page no: 37 - 42

Developing A Smart Accounting System by Leveraging the Big Data Analytics to Meet Futuristic Requirements

Archit Dahiya

The motivation behind this examination is to contemplate and break down the Big Data, to recognize the difficulties which confronting Big Data in business associations, and to expl...

Research Article

 Page no: 43 - 48

Leveraging Bi Analytics Tools for Enhancing the Usage of ICT in E-Governance in India

Archit Dahiya

The real target of this exploration work is to build up an E-Governance model dependent on bi-investigation brings about a standard information base condition with the help of SWOT...

Research Article

 Page no: 49 - 55

Quantum Cryptography Enhancement of QKD-EPR Protocol and Allied Identity

Ghanisht Aggarwal

Today secure correspondences are progressively more essential to the proposed communicators without being captured by programmers. Quantum cryptography vows to unrest the dire conv...

Research Article

 Page no: 56 - 60

An Analytical Study of The Effect of The Acquisition on Operating and Performing in The Indian Pharmaceutical Industry

Prithvi Singh Lamba

The current examination exhibits the adequacy of methodologies in drugs for understanding the ideal destinations. The effect of acquisitions on the working presentation of these or...

Research Article

 Page no: 61 - 66

Integration of Machine Learning Techniques for Effective Sentiment Analysis on Stock Market News

Sakshi Borah, Shallu Bashambu

Stock market forecasting is very important in the planning of business activities. Stock price prediction has attracted many researchers in multiple disciplines including computer ...

Research Article

 Page no: 67 - 72

The Managing of Big Data in Internet of Things Environment to Enhance its Security Safeguard

Nipun Arora

The Internet of Things (IoT) and Big Data have jumped to transform into a standard-issue and keep up board-level needs. Both IoT and considerable information are always making feat...

Research Article

 Page no: 73 - 82

LEVERAGING EFFICIENT ALGORITHMIC TECHNIQUES IN EFFICIENT FEATURE SELECTION IN IOT BASED IDS

Prachi Juneja

IoT is an arising innovation that includes checking the climate, and the IoT networks are generally powerless against assaults because of the number of devices incorporated with th...

Research Article

 Page no: 83 - 90

AN IN-DEPTH ANALYSIS OF SECURING THE BIG DATA APPLICATIONS IN THE INTERNET OF THINGS (IOT) PLATFORM

Muskan Talreja

The volatile development in the number of devices associated with the Internet of Things (IoT) and the proposed expansion in information utilization reflect how the story of ample ...

Research Article

 Page no: 91 - 94

COMPARATIVE ANALYSIS OF DATA HIDING TECHNIQUES

Sneha Dahiya

Information or data is an uncommonly pressing resource for us. As such, getting the information transforms into even more convenient. The program by which we used to send data does...

Research Article

 Page no: 95 - 99

DEVELOPING A ‘SMART WASTE MANAGEMENT SYSTEM’ USING THE IOT BASED TOOLS AND TECHNIQUES

Mridul Sharma

Authorities in cities have the challenge of managing solid waste. As per the Municipal Solid, Waste Management and Handling Rules of 2000 in India, squander assortment and dumping ...

Research Article

 Page no: 100 - 106

AN IN-DEPTH STUDY OF THE INDIAN PETRO-RETAIL TO LEVERAGE THE TOOLS AND TECHNIQUES OF INTERNET OF THINGS (IOT) AND ARTIFICIAL INTELLIGENCE (AI) FOR DEL...

Devansh Balhara

To investigate the relevance and effect of conveying an IoT and AI arrangement (CCTV-based arrangement) on client experience at a fuel retail outlet. CCTV-based IoT and AI arrangem...

Research Article

 Page no: 107 - 113

An In-Depth Analysis of the Implementation of the Hybrid Cloud for Deduplication and Enhancing of the Secure Cloud Features and Safeguards

Ishaan Gupta

Information Deduplication is a procedure for reducing the extra space an affiliation needs to save its information. In numerous associations, the limit structures contain copy copi...

Research Article

 Page no: 114 - 117

Employability of Machine Learning tools and techniques in the prediction and Analysing of Key indication of Global Warming

Saatvik Wadhwa

An unnatural weather change alludes to an expansion in normal worldwide temperature. Regular Events and human exercises are accepted to be adding to increment in normal worldwide t...

Research Article

 Page no: 118 - 127

An In-Depth Study of The Visual Sentiment Analysis in Images

Sourav Malik

Visual opinion examination is the best approach to naturally perceive positive and negative feelings from pictures, recordings, illustrations and stickers. To assess the extremity ...

Research Article

 Page no: 128 - 132

EMPLOYABILITY OF BIG DATA ANALYTICS ON THE E-COMMERCE PLATFORMS

Anoushka Gupta

This time of globalization has caused a great revolution in e-commerce everywhere. Indian economy is correspondingly becoming quicker with an online business. Numerous web-based bu...

Research Article

 Page no: 133 - 139

ANALYSIS OF DATA STREAM ANONYMIZATION DISTRIBUTION AS LINKED TO PRIVACY PRESERVING

Ruchika Chakravarti

Sustainable stream handling analyses have acquired prevalence as of late. Stream control is an approach to looking at and changing constant information streams. Missing qualities a...

Research Article

 Page no: 140 - 143

A COMPREHENSIVE ANALYSIS ON THE APPROACHES OF DATA ANALYSIS ON CYBER-CRIME AND RECOMMENDATION FOR THE ADOPTION OF AN EFFECTIVE STRATEGY IN FUTURE

Apoorva Khera

Even with the rapid growth of cyber threats, there have been few studies on the groundwork of the topic or principles that could direct Information Systems analysts and experts who...

Research Article

 Page no: 144 - 147

EMPLOYABILITY OF MULTIPLE CLOUD ENVIRONMENTS TO ACCOMPLISH DUAL ENCRYPTION WITH ENHANCED SECURITY SAFEGUARDS

Samriti Dhamija

DNA cryptography is one of the recent research techniques. DNA can be used to do calculations and encrypt information for capacity and transmission. Making DNA succession plays a c...

Research Article

 Page no: 148 - 156

A COMPREHENSIVE REVIEW OF BIG DATA APPLICATIONS IN ENHANCING THE EFFICACY OF SECURITY AND PRIVACY SAFEGUARDS

Swayam Jain

Recently, a huge amount of information has always been created. Such a lot of information created from our traditional data management tool is insufficient. The information is deve...

Research Article

 Page no: 157 - 159

Developing A Smart Integrated Enterprise Resource Planning (ERP) System

Archit Chawla

ERP is one of the powerful collections of modules of the large business system being carried out in different organizations across the globe. It looks to normalize, smooth out, and...

Research Article

 Page no: 160 - 167

Employability of the Internet of Things (IoT) Tools and Techniques in Developing a Smart Integrated Farming

Shubham Bhardwaj

This paper suggests a smart irrigation system based on the Internet of Things (IoT). This paper addresses the issue of farm water waste by automating the irrigation system. IoT ref...

Research Article

 Page no: 168 - 172

Leveraging the Image Processing Tools and Techniques for the Early Detection, Diagnosis and Classification of Fruit Diseases

Gaurav Chhikara

Because it will impact the agricultural field, early disease detection is essential. This project focuses primarily on the detection and analysis of fruit infections that can be fo...

Research Article

 Page no: 173 - 177

An In-Depth Analysis of the Key Drivers and Influences of the Microfinance Institutions

Teesha Ahuja

Microfinance development is crucial to financially disadvantaged individuals' upward mobility. Their contribution to enhancing financial inclusion demonstrates this, particularly i...

Research Article

 Page no: 178 - 182

A Comprehensive Analysis of the Big Data Key Influences That Make it’s Tactical and Competitive Advantage

Shreya Bhardwaj

This report gives an understanding of the big data investigation. The procedure utilized in it and a few definitions related to it. It indicates the strategies, innovation, and bou...

Research Article

 Page no: 183 - 185

Application of the Artificial Intelligence Tools and Techniques in the Efficacious Detection of Phishing Unique Resource Locator (URL)

Somya Panchal

Phishing is one of the most common methods for launching cyberattacks. Recent statistics indicate that 97% of users could not recognize sophisticated phishing emails. With the mont...

Research Article

 Page no: 186 - 192

Developing an Efficacious System of Prediction of Loan Eligibility by Combining Artificial Intelligence (AI) and Data Analysis Tools and Techniques

Diksha Choudhary

Banks serve the necessities of everybody close to emergency clinics and schools. Individuals contact banks for different purposes. Yet, one of the most widely recognized administra...