INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2016

PAST ISSUE


Vol. 6, Jan-Dec 2020

Research Article

 Page no: 001-008

DEVELOPING A MACHINE LEARNING REGRESSION MODEL RELYING ON INSTANCE-BASED LEARNING STREAMS FOR EFFICACIOUS DATA MINING

Pranshul Pahwa

Information mining is concerned about the investigation of information for discovering examples and regularities in the informational collections. Mathematical science is concerned...

Research Article

 Page no: 009-017

USING UNIMODAL FRAMEWORK WITH BIOMETRIC CLASSIFICATION TO ENHANCE MULTI-MODEL SECURITY SYSTEM

Hardik Chaudhary

The usage of Biometric devices nowadays is very common in every field. It helps to identify the persons by their behavioural or physiological features. Multi biometric system has t...

Research Article

 Page no: 018-023

DEVELOPING AN AUTOMATED COUNTERFEIT CURRENCY RECOGNITION SYSTEM BY EMPLOYING SVM WITH NOTE TO COIN EXCHANGER FEATURE

Atul Kalkhanda

The normal citizens are the most noticeably terrible hit as fake banknotes have gotten so profoundly inserted in the Indian economy that even banks and ATMs are dispensing fake cas...

Research Article

 Page no: 024-027

Risks in Adolescence for Clustered Cardiovascular: A Factor Analysis

Jaspreet Singh

The research concludes that risk clusters of cardiovascular diseases (CV), even though the onset of atherosclerotic heart diseases, can not be seen before adulthood, start early in...

Research Article

 Page no: 028-032

Analysis of Data Mining Clustering Technique using Knowledge Discovery (KDD) process

Sara Dahiya

Data mining is a technique that helps in extracting important data from a huge amount of unwanted data. There are three types of data mining technique namely clustering, classifica...

Research Article

 Page no: 033-036

Developing an Integrated Model Based on Tetrad Algorithm to Leverage Econometrics Devices for Price Casual Relation of OPEC and Non-OPEC Oil Markets

Yatharth Chandna

Raw petroleum value elements decide the request for the world oil market in which OPEC and Non-OPEC nations assume significant function as exporters and shippers. The co-mix and da...

Research Article

 Page no: 037-042

Developing A Smart Accounting System by Leveraging the Big Data Analytics to Meet Futuristic Requirements

Archit Dahiya

The motivation behind this examination is to contemplate and break down the Big Data, to recognize the difficulties which confronting Big Data in business associations, and to expl...

Research Article

 Page no: 043-048

Leveraging Bi Analytics Tools for Enhancing the Usage of ICT in E-Governance in India

Archit Dahiya

The real target of this exploration work is to build up an E-Governance model dependent on bi-investigation brings about a standard information base condition with the help of SWOT...

Research Article

 Page no: 049-055

Quantum Cryptography Enhancement of QKD-EPR Protocol and Allied Identity

Ghanisht Aggarwal

Today secure correspondences are progressively more essential to the proposed communicators without being captured by programmers. Quantum cryptography vows to unrest the dire conv...

Research Article

 Page no: 056-060

An Analytical Study of The Effect of The Acquisition on Operating and Performing in The Indian Pharmaceutical Industry

Prithvi Singh Lamba

The current examination exhibits the adequacy of methodologies in drugs for understanding the ideal destinations. The effect of acquisitions on the working presentation of these or...

Research Article

 Page no: 061-066

Integration of Machine Learning Techniques for Effective Sentiment Analysis on Stock Market News

Sakshi Borah, Shallu Bashambu

Stock market forecasting is very important in the planning of business activities. Stock price prediction has attracted many researchers in multiple disciplines including computer ...

Research Article

 Page no: 067-072

The Managing of Big Data in Internet of Things Environment to Enhance its Security Safeguard

Nipun Arora

The Internet of Things (IoT) and Big Data have jumped to transform into a standard-issue and keep up board-level needs. Both IoT and considerable information are always making feat...

Research Article

 Page no: 073-082

LEVERAGING EFFICIENT ALGORITHMIC TECHNIQUES IN EFFICIENT FEATURE SELECTION IN IOT BASED IDS

Prachi Juneja

IoT is an arising innovation that includes checking the climate, and the IoT networks are generally powerless against assaults because of the number of devices incorporated with th...

Research Article

 Page no: 083-090

AN IN-DEPTH ANALYSIS OF SECURING THE BIG DATA APPLICATIONS IN THE INTERNET OF THINGS (IOT) PLATFORM

Muskan Talreja

The volatile development in the number of devices associated with the Internet of Things (IoT) and the proposed expansion in information utilization reflect how the story of ample ...

Research Article

 Page no: 091-094

COMPARATIVE ANALYSIS OF DATA HIDING TECHNIQUES

Sneha Dahiya

Information or data is an uncommonly pressing resource for us. As such, getting the information transforms into even more convenient. The program by which we used to send data does...

Research Article

 Page no: 095-099

DEVELOPING A ‘SMART WASTE MANAGEMENT SYSTEM’ USING THE IOT BASED TOOLS AND TECHNIQUES

Mridul Sharma

Authorities in cities have the challenge of managing solid waste. As per the Municipal Solid, Waste Management and Handling Rules of 2000 in India, squander assortment and dumping ...

Research Article

 Page no: 100-106

AN IN-DEPTH STUDY OF THE INDIAN PETRO-RETAIL TO LEVERAGE THE TOOLS AND TECHNIQUES OF INTERNET OF THINGS (IOT) AND ARTIFICIAL INTELLIGENCE (AI) FOR DEL...

Devansh Balhara

To investigate the relevance and effect of conveying an IoT and AI arrangement (CCTV-based arrangement) on client experience at a fuel retail outlet. CCTV-based IoT and AI arrangem...

Research Article

 Page no: 107-113

An In-Depth Analysis of the Implementation of the Hybrid Cloud for Deduplication and Enhancing of the Secure Cloud Features and Safeguards

Ishaan Gupta

Information Deduplication is a procedure for reducing the extra space an affiliation needs to save its information. In numerous associations, the limit structures contain copy copi...

Research Article

 Page no: 114-117

Employability of Machine Learning tools and techniques in the prediction and Analysing of Key indication of Global Warming

Saatvik Wadhwa

An unnatural weather change alludes to an expansion in normal worldwide temperature. Regular Events and human exercises are accepted to be adding to increment in normal worldwide t...

Research Article

 Page no: 118-127

An In-Depth Study of The Visual Sentiment Analysis in Images

Sourav Malik

Visual opinion examination is the best approach to naturally perceive positive and negative feelings from pictures, recordings, illustrations and stickers. To assess the extremity ...

Research Article

 Page no: 128-132

EMPLOYABILITY OF BIG DATA ANALYTICS ON THE E-COMMERCE PLATFORMS

Anoushka Gupta

This time of globalization has caused a great revolution in e-commerce everywhere. Indian economy is correspondingly becoming quicker with an online business. Numerous web-based bu...

Research Article

 Page no: 133-139

ANALYSIS OF DATA STREAM ANONYMIZATION DISTRIBUTION AS LINKED TO PRIVACY PRESERVING

Ruchika Chakravarti

Sustainable stream handling analyses have acquired prevalence as of late. Stream control is an approach to looking at and changing constant information streams. Missing qualities a...

Research Article

 Page no: 140-143

A COMPREHENSIVE ANALYSIS ON THE APPROACHES OF DATA ANALYSIS ON CYBER-CRIME AND RECOMMENDATION FOR THE ADOPTION OF AN EFFECTIVE STRATEGY IN FUTURE

Apoorva Khera

Even with the rapid growth of cyber threats, there have been few studies on the groundwork of the topic or principles that could direct Information Systems analysts and experts who...

Research Article

 Page no: 144-147

EMPLOYABILITY OF MULTIPLE CLOUD ENVIRONMENTS TO ACCOMPLISH DUAL ENCRYPTION WITH ENHANCED SECURITY SAFEGUARDS

Samriti Dhamija

DNA cryptography is one of the recent research techniques. DNA can be used to do calculations and encrypt information for capacity and transmission. Making DNA succession plays a c...

Research Article

 Page no: 148-156

A COMPREHENSIVE REVIEW OF BIG DATA APPLICATIONS IN ENHANCING THE EFFICACY OF SECURITY AND PRIVACY SAFEGUARDS

Swayam Jain

Recently, a huge amount of information has always been created. Such a lot of information created from our traditional data management tool is insufficient. The information is deve...