Past Issue: Vol 7, Jan-Jun 2018



Research Article

Vol 7, Jan-Jun 2018  Page no: 1-6

BIOGAS PRODUCTION-REVIEW

Prem Kumar Dara, KetemaTilahun Gelaye, Jemberu Alemu Megenase

Biogas is a gas produced by the breakdown of organic matter. It contains methane (50-75%), carbon dioxide (25-50%), hydrogen (0-2%), ammonia, hydrogen sulphide (0-3%) and some trac...

Research Article

Vol 7, Jan-Jun 2018  Page no: 7-12

EMPLOYABILITY OF TF-IDF AND BOYER-MOORE IN DEVELOPING HEURISTIC TECHNIQUE OF MACHINE LEARNING ON REVIEW PLATFORM

Vishal Duhan

The following research paper represents the review of opinion mining using Tf-idf and Boyer Moore. Opinion mining is known as a kind of common dialect preparing if there should ari...

Research Article

Vol 7, Jan-Jun 2018  Page no: 13-24

AUTOMATIC TEXT CLASSIFICATION- EFFICACIOUSLY EMPLOYING THE CONVOLUTED NEURAL NETWORKS TO HARNESS THE NATURAL LANGUAGE PROCESSING TOOLS & TECHNIQUES

Pushkar Garg

Automatic text classification is a fundamental task in the field of natural language processing and it can help users select vital information from massive text resources. To bette...

Research Article

Vol 7, Jan-Jun 2018  Page no: 25-33

SINGULAR VALUE DECOMPOSITION: EMPLOYABILITY OF INDEPENDENT COMPONENT ANALYSIS –TOPIC DETECTION, CLUSTERS, LATENT SEMANTIC INDEXING IN ENHANCING DATA...

Karan Gupta

Concept detection plays an important role if there is a huge amount of data available. We know that cluster analysis, topic detection, opinion mining has got a major role in the pr...

Research Article

Vol 7, Jan-Jun 2018  Page no: 34-40

CLOUD COMPUTING : LEVERAGING CRYPTOGRAPHY TO DEVELOP THE EFFICACY OF AN ADAPTABLE AND SEALABLE MODEL

Divyansh Gupta, Ujjwal Jain

Distributed computing is a savvy, adaptable and adaptable model of giving system administrations to a scope of clients including individual and business over the Internet. It has a...

Research Article

Vol 7, Jan-Jun 2018  Page no: 41-50

CRYPTOGRAPHY AND DATA TRANSFER- EMPLYOBILITY OF RSA ALGORITHM AND RGB MATRIX IN ENHANCING ENCRYPTION FOR DATA TRANSFERABILITY

Sahil Kapoor

Data collected by each individual is increasing day by day and so is the rate of transfer of that data. Hence, there is a need to protect this data while the transfer is being done...

Research Article

Vol 7, Jan-Jun 2018  Page no: 51-63

INTERNET BANKING PROTOCOLS AND SECURITY RISKS- DEVELOPING AN INTEGRATED MODEL TO MITIGATE PHISHING AND BUILD SECURITY SAFEGUARDS IN E-TRANSACTON PROCE...

Divyashi Agrawal

Recognizing and distinguishing any phishing sites continuously, especially for e-keeping money, is extremely an unpredictable and dynamic issue including numerous components and cr...

Research Article

Vol 7, Jan-Jun 2018  Page no: 64-76

DEVELOPING A FRAMEWORK FOR BUYING BRANDED JEWELRY BASED ON THE CONTENT, SYSTEMS AND AFFILIATION FOR ATTRIBUTES CONSIDERATION FOR BUYING MARKED ORNAMEN...

Rashmi Panchal

The Indian adornments showcase is one of the biggest on the planet, with a market size of $13 billion. It is second just to the US market of $ 40 billion and is trailed by China at...

Research Article

Vol 7, Jan-Jun 2018  Page no: 77-84

AN INVESTIGATION OF DISTANCE, MACHINE AND KERNEL LEARNING SIMILARITY METHODS FOR VISUAL SEARCH IN CONTENT BASED IMAGE RETRIEVAL

Sarthak Garkhel

Background/Objectives: The major objective of this work is to increase the retrieval accuracy of medical images by measuring the visual similarity of Content-Based Image Retrieval ...

Research Article

Vol 7, Jan-Jun 2018  Page no: 85-90

EMPLOYABILITY OF VARIOUS CLASSIFICATION AND DATA ENCRYPTION TECHNIQUES IN MITIGATING SECURITY RISKS TO ENSURE STORAGE AND RETRIEVAL OF BIG DATA ON CLO...

Unnati Gupta

Distributed computing gives the various kinds of assistance to the customer over an organisation which is conveyed by the outsider, and it reduces the load from the user-side. Howe...

Research Article

Vol 7, Jan-Jun 2018  Page no: 91-102

DEVELOPING AN ANALYTICAL MODEL TO MEASURE RECENT BIASED TIME SERIES DATABASE BY EMPLOYING IDENTIFIED CLUSTERING ALGORITHMIC MEASURES

Poonam Devi

Time Series information are ordinarily utilized in information mining. Bunching is the most often utilized technique for exploratory information investigation. In this paper, a mod...

Research Article

Vol 7, Jan-Jun 2018  Page no: 103-107

DEVELOPING AN INTEGRATED FRAMEWORK FOR ENHANCED SECURITY FEATURES BASED ON COLOUR SELECTION COMBINATION

Saatvik Wadhwa

In previous days there was not much utilization of PCs. As improvements occurred in software engineering, every and huge business or even every individual began utilizing PCs. PCs ...

Research Article

Vol 7, Jan-Jun 2018  Page no: 108-116

A COMPREHENSIVE REVIEW OF MACHINE LEARNING TOOLS AND TECHNIQUES RELATING TO CUSTOMER PRODUCTS

Ruchika Chakravarti

Sentiment analysis is defined as the process of mining of data, view, review or sentence to Predict the emotion of the sentence through natural language processing (NLP) or Machine...

Research Article

Vol 7, Jan-Jun 2018  Page no: 117-130

EXPLORING THE PARADIGM SHIFT: 5G AND BEYOND IN WIRELESS NETWORK EVOLUTION

Ashalatha P.R

This research article delves into the paradigm shift unfolding in the domain of wireless network evolution, underscored by the emergence of 5G and its subsequent evolutionary traje...