ISSN ( ONLINE ) : 2278 - 3091
6 issues per year (February , April, June , August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article - 1 | Title | Group-based Authentication Methodologies | 904 – 913 |
Authors | Pathan Mohd Shafi, Vijaykumar S Bidve, Vinod V Kimbahune and Yogesh B Gurav |
Article - 2 | Title | Knowledge-Based Semantic Relatedness measure using Semantic features | 914 – 924 |
Authors | Ali Muttaleb Hasan, Noorhuzaimi Mohd Noor, Taha. H. Rassem and Ahmed Muttaleb Hasan |
Article -3 | Title | Attendance Automation by Facial Recognition Using OpenCV | 925 – 929 |
Authors | P.Pandiaraja,G. Muralidharan, V. Vigneshwaran, A. Vijay Prasanth and S. Santhosh Sivan |
Article - 4 | Title | An Unsupervised approach for Predicting the Breast Cancer using K-Means with Compound Feature Generation | 930 – 934 |
Authors | Rhagini A, Dhanush Narayanan T, Santhosh M, Sharmila C and Swetha G |
Article - 5 | Title | Software Tools for Ontology Development | 935 – 941 |
Authors | Valeriy Nikolaevich Dolzhenkov, Isa Daudovich Maltzagov, Aleksandra Igorevna Makarova, Nagbdu Sultahsikhkyzy Kamarova and Petr Viktorovich Kukhtin |
Article - 6 | Title | Interactive Computer Technologies in the Educational Process | 942 – 950 |
Authors | I.E. Korotaeva |
Article - 7 | Title | Finite Element Analysis and Comfort Assessment Conducted on the Visual Aid Design for Monocular Vision Patients | 951 – 955 |
Authors | Nirvenesh Ravindran and Hassan B. Mohamed |
Article - 8 | Title | Assessment of Learners' learning about Temperature and Heat concepts | 956 – 962 |
Authors | Iman ELKABABI, Azzeddine ATIBI, Mohammed RADID, Said BELAAOUAD and Souad TAYANE |
Article - 9 | Title | Gamification for Recruitment: A New Tool to Attract Talent | 963 – 968 |
Authors | Aep Apandi Saleh, Vian Endramanto and Gunawan Wang |
Article - 10 | Title | IoT based Smart Trash Pail Disposal | 969 – 972 |
Authors | Prabavathi.S, Karan kanna.K, Karuppasamy.P, Priyadharshini.V and Sowmiya.S |
Article - 11 | Title | A Review: Music Feature Extraction from an Audio Signal | 973 – 980 |
Authors | Mukkamala S N V Jitendra and Dr Y. Radhika |
Article - 12 | Title | Breast Cancer Detection Using Machine Learning | 981 – 984 |
Authors | Karthikeyan B, Sujith Gollamudi,Harsha Vardhan Singamsetty, Pavan Kumar Gade and Sai Yeshwanth Mekala |
Article - 13 | Title | Prediction of Diabetes using Neural Networks | 985 – 990 |
Authors | P. Santhi , N. Deeban , N. Jeyapunitha , B. Muthukumaran and R. Ravikumar |
Article - 14 | Title | Analysis of the factors that affecting Intention to use Tourism Online Booking | 991 – 996 |
Authors | Adele Mailangkay, Eko Indrajit, Raymond Kosala and Acep Hidayat |
Article - 15 | Title | Density based Traffic Management System using Image Processing | 997 – 1001 |
Authors | Vikram R, Kalaivani T, Kanimozhi A, Ranjani V and Reena D |
Article -16 | Title | Enhancing Operational Performance through ERP Performance | 1002 – 1004 |
Authors | Julbintor Kembaren, Dyah Budiastuti, Harjanto Prabowo and Ford Lumban Gaol |
Article - 18 | Title | AI approach with increased accuracy to extract the tabular content from PDF and Image files | 1013 – 1019 |
Authors | Shriram K Vasudevan, Vamsee Krishna Kiran M, Sini Raj P and Thangavelu S |
Article - 19 | Title | Performance Comparison of applications with and without Web Frameworks | 1020 – 1028 |
Authors | Venubabu Rachapudi, Nerusu Nitish, Sreeramaneni Samaikya, Unnava Pearl Sathvik and S Anjali Devi |
Article - 20 | Title | Autism Detection using r-fMRI: Subspace Approximation and CNN Based Approach | 1029 – 1036 |
Authors | Daya Gupta, Ishani Vij and Mansi Gupta |
Article - 21 | Title | Design and Implementation of Efficient Cryptographic Arithmetic based on Reversible logic and Vedic Mathematics | 1037 – 1044 |
Authors | Kiran Kumar V G and Shantharama Rai C |
Article - 22 | Title | No Escape: A 2D Top-Down Shooting Roguelike Game Embedded with Drunkard Walk Algorithm | 1045 – 1049 |
Authors | Handy Goandy, Julio Christian Young and Seng Hansun |
Article - 23 | Title | The Role of Artificial Intelligence in Supporting the Supply Chain, According to the Kingdom's Vision 2030 | 1050 – 1055 |
Authors | Abdulnaser S. H. Al-MSloum |
Article - 24 | Title | Business Policy Violation in Web Service Integration of QoS-Aware Web Service using Hybrid Genetic Algorithms for Security in SOA | 1056 – 1062 |
Authors | G. Amirthayogam and C. Anbu Ananth |
Article - 25 | Title | The Disaster Notification System Based SMS to Students at the School Vulnerable Flood Disaster using Single Board Computer of Raspberry Pi | 1063 – 1067 |
Authors | Dedi Satria, Saifuddin Muhammad Jalil and Elin Yusibani |
Article - 26 | Title | Imbalanced Data Classification Using Auxiliary Classifier Generative Adversarial Networks | 1068 – 1075 |
Authors | Indrajani Sutedja, Yaya Heryadi, Lili Ayu Wulandhari, Bachtiar Abbas4 |
Article - 27 | Title | Optimization of Debtor Credit Quality Determining Prediction using Decision Tree | 1076 – 1081 |
Authors | Abba Suganda Girsang and Abner |
Article- 28 | Title | Smart Irrigation and Agriculture Monitoring system using Cloud Server based on IOT | 1082 – 1085 |
Authors | Sumathi K , Adchaya P, Jayasri M , Nandhini B and Pavithra J T |
Article - 29 | Title | Towards Effective Multisink Support in IPv6-based IoT Networks | 1086 – 1094 |
Authors | Mohammed Alreshoodi |
Article - 30 | Title | A Hybrid Quartile deviation-based Support vector regression model for software reliability datasets | 1095 – 1100 |
Authors | Y. Geetha Reddy and Dr. Y Prasanth |
Article - 31 | Title | Image Processing Techniques and Data Mining Algorithms for Coffee Plant’s Leaves Classification | 1101 – 1106 |
Authors | Khenilyn P. Lewis, Mary Ann F. Quioc and Juancho D. Espineli |
Article - 32 | Title | Purchase Order Information System using Feature Driven Development Methodology | 1107 – 1112 |
Authors | Johanes Fernandes Andry, Hendy Tannady and Fergyanto E. Gunawan |
Article - 33 | Title | Method of sustainable detection of augmented reality markers by changing deconvolution | 1113 – 1120 |
Authors | Ihor Ruban, Nataliia Bolohova, Vitalii Martovytskyi , Nataliia Lukova-Chuiko and Valentyn Lebediev |
Article - 34 | Title | Credit Based Scheduling with Load Balancing in Cloud Environment | 1121 – 1127 |
Authors | Abhikriti Narwal and Sunita Dhingra |
Article - 35 | Title | The Use of Big Data in Supporting Customer Profiling | 1128 – 1133 |
Authors | Gunawan Wang, Lazuardi Ridho Maulana, Nico Leonardi and Emil Robert Kaburuan |
Article - 36 | Title | Hybrid image registration methods: A Review | 1134 – 1142 |
Authors | Taruna Kumari, Poonam Syal, Ashwani K. Aggarwal and Vikrant Guleria |
Article - 37 | Title | Calculation of the Profile of a Horizontally Branched Well | 1143 – 1146 |
Authors | Nurlan Aldamzharov, Bayan Almatova, Fatyma Balmaganbetova, Dameli Uteulieva, Saltanat Dauletova and Bakutgyl Toksanbaeva |
Article - 38 | Title | Compressive Sensing For Speech Signals | 1147 – 1150 |
Authors | N.Durga Indira, K Sony, Gutti Dhamar Sai Kiran, Kankara Lavanya and Dirisipamu Pushpa Sashank |
Article - 39 | Title | Client Audits through Sentiment Analysis | 1151 – 1158 |
Authors | Bhavin Kumar, Dr. Dayanand Lal.N, Deepak D.M, Swasthika Jain.T.J and Anusha N |
Article - 40 | Title | A Study on Segmentation Algorithms for Liver Disorder Analysis in Medical Images | 1159 – 1165 |
Authors | A. Joel Dickson, Dr.J.Arul Linsely and Dr. A. Justin Diraviam |
Article - 41 | Title | Energy Optimization of Residential Energy Management in Micro Grid using Cyber Physical Controller | 1166 – 1171 |
Authors | R. Karthikeyan, Dr.A.K. Parvathy and S. Priyadharshini |
Article - 42 | Title | Measurement Degree of Acceptance of Information Technology Implementation in Higher Education | 1172 – 1177 |
Authors | Mahmud Mahmud, Rosihon Anwar, Tedi Priatna, Ah. Fathonih, Ulfiah Ulfiah and Muhammad Ali Ramdhani |
Article - 43 | Title | Diabetic Prediction Using Kernel Based Support Vector Machine | 1178 – 1183 |
Authors | Annavarapu Naga Prathyusha and M.R.Narasinga Rao |
Article - 44 | Title | Analysis of Mammography for Identifying Cancer Cells using Convolution Neural Networks | 1184 – 1188 |
Authors | KollaBhanu Prakash , Lakshmi Kalyani. N, Pradeep Kumar Vadla and Naga Pawan YVR |
Article - 45 | Title | Educational Personnel and Information Technology in Higher Education Governance | 1189 – 1194 |
Authors | Hamdan Sugilar, Aan Hasanah, Ahmad Ali Nurdin, Agus Abdul Rahman, Dudang Gojali and Setia Gumilar |
Article - 46 | Title | An Early Assessment of Open Angle and Normal Tension Glaucoma based on Visual Field Test using Correlation and Association Mapping | 1195 – 1200 |
Authors | V.Sathya Aruna and B.Chaitanya Krishna |
Article - 47 | Title | Digital Native on Information Technology Acceptance in Higher Education | 1201 – 1206 |
Authors | Dian Sa’adillah Maylawati, Tedi Priatna, Ahmad Sarbini, Wahyudin Darmalaksana, Hasniah Aliah and Fauzan Ali Rasyid |
Article - 48 | Title | Some aspects with the use of improved slide attack to the standard Encryption algorithm GOST 28147-89 | 1207 – 1211 |
Authors | Akhmedov B.B. and Aloev R.D. |
Article - 49 | Title | An IoT solution for prediction and Indication of probable region of fall of heavyweights lifted by Cranes in Industries | 1212 – 1217 |
Authors | J Anudeep, Shriram K Vasudevan, Papini Balasai and AK Sumesh |
Article -50 | Title | On Feature Selection Stability and Privacy Preserving Data Mining: A Data Perspective | 1218 – 1233 |
Authors | Mohana Chelvan P and Dr. Perumal K |
Article -51 | Title | Review of Dynamic Voltage Restorer (DVR) Using Various Control Topologies | 1234 – 1238 |
Authors | Ch. Srivardhankumar and Dr. Z. Mary livinsa |
Article - 52 | Title | Performance of Gate Engineered Symmetric Double Gate MOS Devices and circuits for ultra-low power Analog and RF applications | 1239 – 1246 |
Authors | N. Mohankumar, Girish Shankar Mishra, M. Arun Kumar and R. Poornachandran |
Article - 53 | Title | Big Data Analytics Application Model Based on Data Quality Dimensions and Big Data Traits in Public Sector | 1247 – 1256 |
Authors | Muslihah Wook, Zam Zarina Abdul Jabar, Muhammad Hakiem Halim, Noor Afiza Mat Razali, Suzaimah Ramli, Nor Asiakin Hasbullah and Norulzahrah Mohd Zainuddin |
Article - 54 | Title | Speech Emotion recognition feature Extraction and Classification | 1257 – 1261 |
Authors | Chandupatla Deepika and Swarna Kuchibhotla |
Article - 55 | Title | Efficient and Accurate Hybrid Deep Learning Model for Multimodal Disease Risk Prediction | 1262 – 1267 |
Authors | A Veena Reddy, Hari Kiran Vege and Kolla Bhanu Prakash |
Article - 56 | Title | Machine Learning in Dam Water Research: An Overview of Applications and Approaches | 1268 – 1274 |
Authors | Farashazillah Yahya, Bashirah Fazli, Hasimi Sallehudin and Mohd Izham Mohd Jaya |
Article - 57 | Title | Fuzzy Logic Based Proportional Integral Control of Frequency for Small | 1275 – 1279 |
Authors | Dr. Kiran Ramaswamy, Dr. Dayanand Lal.N, Parikshith Nayaka S K , Veena.R.C and Dr. Brahmananda S H |
Article - 58 | Title | Virtual Reality Acceptance in Classrooms: A Case Study in Teaching Science | 1280 – 1294 |
Authors | Megat Aman Zahiri Megat Zakaria, Hassan Abuhassna and Kavipriya A/P Ravindaran |
Article - 59 | Title | Securing ATM Transactions using Face Recognition | 1295 – 1299 |
Authors | Murugesan M, Santhosh M, Sasi Kumar T, Sasiwarman M and Valanarasu I |
Article - 60 | Title | Application of Matrices in Flipping the Image Using Python Program | 1300 – 1302 |
Authors | Vinitha Navis Varuvel and A.Kanchana |
Article -61 | Title | Design Information System Order Fulfillment Using Archimate Modelling | 1303 – 1310 |
Authors | Bernadus Gunawan Sudarsono, Johanes Fernandes Andry and Nirwan |
Article - 62 | Title | Deepfake Video Detection Using Convolutional Neural Network | 1311 – 1315 |
Authors | Aarti Karandikar, Vedita Deshpande, Sanjana Singh, Sayali Nagbhidkar and Saurabh Agrawal |
Article - 63 | Title | An early-stage classification of Lung Nodules by an Android based application using Deep Convolution Neural Network with Cost-sensitive loss function and Progressive scaling approach | 1316 – 1323 |
Authors | Mrudang D. Pandya, Dr. Sunil Jardosh and Dr. Amit R. Thakkar |
Article - 64 | Title | Hospital Recommendation System using Machine Learning | 1324 – 1327 |
Authors | Mani V , GokulPrasath R , Jegatha S , Kannathal K and MadhuMitha K |
Article - 65 | Title | Age and Gender prediction using Convolution, ResNet50 and Inception ResNetV2 | 1328 – 1334 |
Authors | Avuthu Sai Meghana, Sudhakar S, Arumugam G, Srinivasan P and Kolla Bhanu Prakash |
Article - 66 | Title | Effective Handwritten Digit Recognition using Deep Convolution Neural Network | 1335 – 1339 |
Authors | Yellapragada SS Bharadwaj, Rajaram P, Sriram V.P, Sudhakar S and Kolla Bhanu Prakash |
Article - 67 | Title | Speech Emotion Recognition using State-of-Art Learning Algorithms | 1340 – 1345 |
Authors | Donepudi Babitha, Jayasankar.T, Sriram V.P, Sudhakar S and Kolla Bhanu Prakash |
Article - 68 | Title | High Security Distributed MANETs using Channel De-noiser and Multi-Mobile-Rate Synthesizer | 1346 – 1351 |
Authors | Murugan G, Syed Musthafa.A,Mohanraj.B, Priyanga.S and Krishnan.C |
Article - 69 | Title | Hybrid Recommendation System with Clustering and Classification Method Based on Case of Clinic XYZ | 1352 – 1357 |
Authors | Febrillian Pemisindo and Nilo Legowo |
Article - 70 | Title | Tourist Spot Proposal System Using Text Mining | 1358 – 1364 |
Authors | Murugan G, Syed Musthafa A, Abdul Jaleel D, Sathiya Kumar C and Sudhakar S |
Article - 72 | Title | Effective and Secure Approach for Multi-Keyword Quest Graded over Authenticated Data | 1371 – 1374 |
Authors | Shobharani D A, Parikshith Nayaka S K, Swasthika Jain T J and Dr. Dayanand Lal N |
Article - 73 | Title | Mathematical Packages Application in The Process of Energy-Saving Technology Development of Metal Structures with Rod Elements Production | 1375 – 1382 |
Authors | Ospanova S.M., ShalamberidzeM. Sh., LakhnoV.A. and Osypova T. Yu |
Article - 74 | Title | Tumor Net (T-Net) for Classification of multi Tumors in Brain MR Images | 1383 – 1393 |
Authors | Anil Kumar B and P. Rajesh Kumar |
Article - 75 | Title | A Comparison of Scheduling parallel program tasks based on Java Applet | 1394 – 1403 |
Authors | Haleema Essa Solayman |
Article - 76 | Title | Employ Twitter Data to Perform Sentiment Analysis in the Malay Language | 1404 – 1412 |
Authors | Abdul Karim Mohamad, Mailasan Jayakrishnan and Nurnajwa Hazwani Nawi |
Article - 77 | Title | Knowledge Management Point Incentive System Implementation: A Case Study | 1413 – 1417 |
Authors | Karto Iskandar, Harvianto, Muhammad Taufiq Zulfikar, Gredion Prajena and Elidjen |
Article - 78 | Title | Automatic Toll Collection using Global Navigation Satellite System | 1418 – 1421 |
Authors | Kamala L, Chandrika C N, Rajesh S M and Hema K |
Article - 79 | Title | An Information Security Awareness Investigation of E-commerce Users: A Case Study of Traveloka | 1422 – 1429 |
Authors | Candiwan and NaidaHauraZafira |
Article - 80 | Title | Inter-Networking Heterogeneous Embedded Networks through Universal Bus | 1430 – 1439 |
Authors | S. Sairohith, B. Naga Kalki Venkatesh, Dr. JKR Sastry and J. Rajasekhar |
Article - 81 | Title | Genetic Optimization in Hybrid Level Sentiment Analysis for Opinion Classification | 1440 – 1445 |
Authors | Gatta Sravya and Marriboyina Sreedevi |
Article - 82 | Title | Counterfeit Currency Detection on Indonesian Banknotes Based on Latent Image Security Feature | 1446 – 1452 |
Authors | Andrean Limanto and Gede Putra Kusuma |
Article - 83 | Title | Comprehensive study and Analysis of Extreme Multi-Label Classification Approach in Large Scale Recommendation System | 1453 – 1459 |
Authors | Purvi Prajapati and Dr. Amit Thakkar |
Article - 84 | Title | Classification of Pepper Seeds Using Data Mining Algorithms | 1460 – 1464 |
Authors | Jesusimo L. Dioses Jr. |
Article - 85 | Title | Enterprise Architecture Artifacts Enablers for IT Strategy and Business Alignment in Forwarding Services | 1465 – 1472 |
Authors | Hendy Tannady, Johanes Fernandes Andry, Fergyanto E. Gunawan and Jordy Mayseleste |
Article - 86 | Title | Algorithm and analysis of the construction of the geometry of the Movement of Vehicles | 1473 – 1478 |
Authors | Amosov Alexey Germanovich |
Article - 87 | Title | Solutions fornonlinear System of Fractional Integro–differential Equations with Non-separated Integral Coupled Boundary Conditions | 1479 – 1485 |
Authors | Raad N.Butris and Ava Sh.Rafeeq |
Article - 88 | Title | Statistical Evaluation of Task Scheduling Algorithms in Cloud Environments | 1486 – 1490 |
Authors | Vidya Kantale and Jignyasa Sanghavi |
Article - 89 | Title | Predicting and Preventing Transport Accidents with Fuzzy Relationships | 1491 – 1494 |
Authors | Truong Thanh Trung |
Article - 90 | Title | Web Security in "Digital Prison" Management | 1495 – 1498 |
Authors | Vu Anh Tuan |
Article - 91 | Title | Empirical Study of Work Efficiency in Upstream Oil and Gas Industry of State Company | 1499 – 1504 |
Authors | Muhammad Munir , Edi Abdurachman , Dyah Budiastuti and Firdaus Alamsjah |
Article - 92 | Title | Applying Communication Theory to Structure and Evaluate the Social Media Platforms in Academia | 1505 – 1517 |
Authors | Qusay Al-Maatouk, Mohd Shahizan Othman , Alhuseen Omar Alsayed , Ali Mugahed Al-Rahmi , Hassan Abuhassna and Waleed Mugahed Al-Rahmi |
Article - 93 | Title | Forced Shifting to e-Learning during the COVID-19 Outbreak: Information Quality, System Quality, Service Quality, and Goal Orientation influence to e-Learning Satisfaction and Perceived Performance | 1518 – 1525 |
Authors | Diena Dwidienawati, Sri Bramatoro Abdinagoro, David Tjahjana, Dyah Gandasari and Munawaroh |
Article - 94 | Title | Natural Disaster Risk Prediction in Indonesia: H-WEMA Approach | 1526 – 1530 |
Authors | Seng Hansun |
Article - 95 | Title | Feature Level Fusion of Seven Neighbor Bilinear Interpolation Data Sets of Finger Vein and Iris for Multimodal Biometric Recognition | 1531 – 1536 |
Authors | Arjun B. C and H. N. Prakash |
Article - 96 | Title | Properties Enhancement of Electrodeposit-n-Cu2O Thin Film by Annealing Treatment | 1537 – 1542 |
Authors | AnisZafirahMohd Ismail, Fariza Mohamad, Bong Liang Thung,Nurliyana Mohamad Arifin, Norazlina Ahmad, Nik HisyamudinMuhd Nor and Masanobu Izaki |
Article - 97 | Title | Edugame Application as Vocabulary Learning Media for Deaf Children | 1543 – 1550 |
Authors | Endah Sudarmilah, Wyne Habsari, Fatah Yasin Al Irsyadi and Wiwien Dinar Pratisti |
Article - 98 | Title | A Simplified Implementation of the Fixed-Function Graphics Pipeline: DRM Approach | 1551 – 1555 |
Authors | Nakhoon Baek |
Article - 99 | Title | A Novel Hybrid Framework for Cuff-Less Blood Pressure Estimation based On Vital Bio Signals processing using Machine Learning | 1556 – 1561 |
Authors | Santosh. A. Shinde and Dr. P. Raja Rajeswari |
Article - 100 | Title | Text Detection and Recognition Techniques from Images using React Native | 1562 – 1567 |
Authors | Rutuja Kherde and Jignyasa Sanghavi |
Article - 101 | Title | Speech Recognition-based Billing System: A multi-model design and implementation | 1568 – 1573 |
Authors | Aditya Dhinavahi, Prashant R Nair, Sundeep V V S Akella and Aneeswar K S S |
Article - 102 | Title | Mitral Regurgitation Classification using MrNetDeep Learning Model | 1574 – 1582 |
Authors | Vishal Chandra, Prattay Guha Sarkar and Vinay Singh |
Article - 103 | Title | Information Technology Security Infrastructure Malware Detector System | 1583 – 1587 |
Authors | Jaevier A. Villanueva, Luisito L. Lacatan and Albert A. Vinluan |
Article - 104 | Title | Analytical determination of Currents from Shunt Transformer Flux with losses used in the Magnetron Power Supply for Industrial Microwave Generators | 1588 – 1592 |
Authors | H. ELKHATAT, M. DERRHI and B. BAHANI |
Article - 105 | Title | The Current State of Social Commerce Fraud in Malaysia and the Mitigation Strategies | 1593 – 1599 |
Authors | Yurita Yakimin Abdul Talib and FarizaHanim Rusly |
Article - 106 | Title | Human Computer Interaction using Hand Gesture Recognition | 1600 – 1603 |
Authors | C.Selvarathi, P.Indu , B. Kavyadharshini, S. Logesh kumar and R. Mohamed yasher |
Article - 107 | Title | Unsupervised Learning for Spam Email Filtering | 1604 – 1609 |
Authors | Sambhangi Chandrahasa , Sai Durga Gade, Sujith, Sai Vineela and Dr.M.S.R Prasad |
Article - 108 | Title | Residue Based Adaptive Resource Provisioning through Multi-Criteria Decision and Horizontal Scaling of VM’s in Agent-Based Model for Federated Cloud | 1610 – 1622 |
Authors | Pradeep Kumar Vadla and Kolla Bhanu Prakash |
Article - 109 | Title | Blockchain Technology, Use cases and Content Delivery Network | 1623 – 1627 |
Authors | Vijaya Murari T and Dr. Ravishankar K.C. |
Article - 110 | Title | An Effective Method to Secure Electronic Health Record Based on Block Chain Technology | 1628 – 1632 |
Authors | Ch. Himaja, Y. Sriram Chowdary, Dr Amarendra K and Dr S Ananthakumaran |
Article -111 | Title | Aspect Oriented Concept Drift Detection in High Dimensional Data Streams | 1633 – 1640 |
Authors | M. Sankara Prasanna Kumar, A. P. Siva Kumar and K. Prasanna |
Article - 112 | Title | Detecting Emotions of Student and Assessing the Performance by using Deep Learning | , 1641 – 1645 |
Authors | Shanmuk Srinivas Amiripalli, Rampay Venkatarao, Mukkamala S N V Jitendra and Naga Modha Jyothi Mycherla |
Article - 113 | Title | BLDC motor based CUK converter using model predictive controller for low power applications | 1646 – 1649 |
Authors | T BHARGAVA RAMU, CH SRIVARDHAN KUMAR and A SHUBHANGI RAO |
Article - 114 | Title | Multi-Labelled Emotion with Intensity Based Sentiment Classification Model in Tweets using Convolution Neural Networks | 1650 – 1656 |
Authors | V. Ganesh and Dr. M. Kamarason |
Article - 115 | Title | Part based clothing invariant Gait Recognition | 1657 – 1661 |
Authors | Manjunatha Guru V G and Kamalesh V N |
Article - 116 | Title | Base Station Positioning in Wireless Networks Using Self-Adaptive Particle Swarm Optimization Approach | 1662 – 1667 |
Authors | Dr.E.Sivanantham1 |
Article - 117 | Title | Blockchain-based Net Asset Value (NAV) calculation for Mutual Funds | 1668 – 1673 |
Authors | Vijaya Killu Manda, Vedavathi Katneni, VijayaramarajuPoosapati and Vijaya Kittu Manda |
Article - 118 | Title | Human Computer Interaction using Hand Gesture Recognition | 1674 – 1677 |
Authors | C.Selvarathi, P.Indu, B. Kavyadharshini, S. Logesh Kumar and R. Mohamed Yasher |
Article - 119 | Title | Software Effort Classification with Multilayer Perceptron Neural Networks | 1678 – 1689 |
Authors | Ahmed Fawzi Otoom, Alaa Alzaben, Razan Tlailan and Maen Hammad |
Article - 120 | Title | M-Learning History of Malacca by Using Animated Video for Primary School Standard Curriculum (KSSR) | 1690 – 1695 |
Authors | Ahmad, F. , Rosli, D.I. , Hamzah, N. , Wan Hassan, W.A.S. and Z, Zubir |
Article - 121 | Title | The Effect of Website Design, Website Security, Information Quality, and Perceived Ease of Use on Customer Satisfaction and Online Purchase Intention in Indonesia E-Commerce in Jakarta | 1696 – 1703 |
Authors | Fredy Fernandus and Nilo Legowo |
Article - 122 | Title | Detection of Multi-Class Website URLs Using Machine Learning Algorithms | 1704 – 1712 |
Authors | B.Pandu Ranga Raju, B.Vijaya Lakshmi and C.V.Lakshmi Narayana |
Article - 123 | Title | Continuous Testing Real-Time Health Analytics Dashboard | 1713 – 1719 |
Authors | Jayasri Angara and Srinivas Prasad |
Article - 124 | Title | Design and Analysis of high security ECC based Cryptography by Holomorphic and data storage in Cloud | 1720 – 1728 |
Authors | Dhananjaya. V and Dr. Balasubramani. R |
Article -125 | Title | Feature Selection in Recognizing Daily Living Activities Based on Metabolic Equivalent | 1729 – 1731 |
Authors | Nhan D. Nguyen, Binh A. Nguyen, Viet Q. Tran, Khoa D. Ta, Manh Hoang and Giao N. Pham |
Article - 126 | Title | Performance Analysis of Polar Codes and LDPC Codes in Optical Satellite Communication Systems | 1732 – 1737 |
Authors | Thong D. Nguyen, Binh A. Nguyen, Viet Q. Tran, Manh Hoang,Nhan D. Nguyen, Giao N. Pham and Yong-il Park |
Article - 127 | Title | Effective Use of Multimedia Materials Mathematics Module 25 on Student Achievement | 1738 – 1743 |
Authors | Zubir, Z , Ismail, A , Razali, S.S Md Noh, N and Ana, A |
Article - 128 | Title | SENTIPUBLIKO: Sentiment Analysis of Repost Jejemon Messages using Hybrid Approach Algorithm | 1744 – 1751 |
Authors | Adomar L. Ilao and Arnel C. Fajardo |
Article - 129 | Title | A Novel Framework for Simulation of Quantum Information System | 1752 – 1756 |
Authors | Binh A. Nguyen, Viet Q. Tran, Khoa D. Ta, Manh Hoang, Thien V. Truong, Nhan D. Nguyen and Duc M. Nguyen |
Article - 130 | Title | Simulation of Quantum Computation via MAGMA Computational Algebra System | 1757 – 1761 |
Authors | Binh A. Nguyen, Viet Q. Tran, Khoa D. Ta, Manh Hoang,Thien V. Truong, Nhan D. Nguyen and Duc M. Nguyen |
Article - 131 | Title | IoT based Water Monitoring and Alerting System | 1762 – 1766 |
Authors | D. Ram Pralad, B. Harinath Reddy, G. Naveen Varma, V. Sai Kiran and Shobharani D.A |
Article - 132 | Title | Automated Road Safety Surveillance System using Hybrid CNN-LSTM Approach | 1767 – 1773 |
Authors | Babitha D , Mohammed Ismail, Subrata Chowdhury, Ramya Govindaraj and Kolla Bhanu Prakash |
Article -133 | Title | Cloud-Based Indoor Positioning Service for Indoor Navigation System | 1774 – 1781 |
Authors | David William, Felix Andrian Nugroho and Gede Putra Kusuma |
Article - 134 | Title | Improving the Correctness of Chatbots using Multi-Response-Based Aggregation for Big-Data | 1782 – 1787 |
Authors | Umme Ayeman Khan, Dr. Ramchand Hablani and Sarang Jain |
Article - 135 | Title | IoT Based Coloured Products Sorting Machine | 1788 – 1792 |
Authors | Saranu Jhansi, Shobharani D A, P. Sai Jyothi G. Chandra Mohith goud and S. Naga Sahith |
Article - 136 | Title | Wave Analogies in The Quantitative Interpretation of Potential Fields | 1793 – 1799 |
Authors | Igor Borisovich Movchan and Alexandra Anatol'evna Yakovleva |
Article - 137 | Title | Efficient Cloud Authentication Scheme using Single Sign-On Nature in Hands with Branca Strategy | 1800 – 1807 |
Authors | Remya Chandran and Dr.A.Sasi Kumar |
Article - 138 | Title | Digital Virtualization Technologies in Distance Learning | 1808 – 1813 |
Authors | Irina Anatolyevna Skripak, Svetlana Nikolaevna Aynazarova, Ekaterina Vladimirovna Ukhanova, Anastasia Evgenievna Tkachenko and Larisa Sergeevna Erina |
Article - 139 | Title | Algorithm for Searching and Analyzing Abnormal Observations of Statistical Information Based on The Arnold – Kolmogorov – Hecht-Nielsen Theorem | 1814 – 1819 |
Authors | Leonid N. Yasnitsky |
Article -140 | Title | Web Description Logic Rule Generation And Other Machine Learning Algorithms – A Comparative Study | 1820 – 1824 |
Authors | Revathi. S and Dr. M. Suriakala |
Article -141 | Title | Location Specific Rice Crop Variant Suitability using Data Mining Technique | 1825 – 1831 |
Authors | Arvin N. Natividad and Luisito L. Lacatan |
Article - 142 | Title | iSSON- Intelligent Single Sign on Key Authentication Strategy using Powerful JWT Norms | 1832 – 1839 |
Authors | Remya Chandran and Dr.A.Sasi Kumar |
Article - 143 | Title | Secure and Lightweight Encryption Model for IoT Surveillance Camera | 1840 – 1847 |
Authors | Mohammed Abbas Fadhil Al-Husainy and Bassam Al-Shargabi |
Article - 144 | Title | Brain Region Segmentation using Low MSE based Active Contour Model and Convolutional Neural Network | 1848 – 1853 |
Authors | Ayushi Sharma and Sachin Jain |
Article - 145 | Title | An Intelligent Neural Model for Assessing Web Systems Performance | 1854 – 1860 |
Authors | Ala Aldeen Al-Janabi, Kamal M. Alhendawi and AbdulRahman A. Alsewari |
Article - 146 | Title | Artificial Neural Network Architecture Optimization for Heart Disease Classification using Genetic Algorithm | 1861 – 1865 |
Authors | Dicky Liegar, Steven Ivander Junaidi and Sani M. Isa |
Article - 147 | Title | Design and Implementation of Forensics Process Workflow on Compromised Linux Based Systems | 1866 – 1872 |
Authors | T.NagaDivya Sirisha and Dr.S.Srinivasa Rao |
Article - 148 | Title | Machine learning Structural Equation Modeling Algorithm to Measure Performance | 1873 – 1881 |
Authors | Dr.A.M.Mahaboob Basha, Dr.P.Chenchu Reddy, Dr.G.Radha Krishna Murthy, B.Ankaiah and U.Dadakalandar |
Article -149 | Title | State Variable based Tow Thomas Biquad filter using Gm-C Universal design using 180nm CMOS Technology | 1882 – 1887 |
Authors | Beer Singh, Asheesh Kumar Tiwari and Dr. Sushil kumar Agrawal |
Article - 150 | Title | A High-Performance Computing of Internal Rate of Return using a Centroid-based Newton-Raphson Iterative Algorithm | 1888 – 1892 |
Authors | Narene M. Nagares and Dr. Ariel M. Sison |
Article - 151 | Title | Application of Innovative Technologies and Computer Aided Approach in a Resilient Teaching Practice for Engineering Students | 1893 – 1897 |
Authors | Amin Chegenizadeh, Mahdi Keramatikerman and Hamid Nikraz |
Article - 152 | Title | Short Term Load Forecasting using Regression Trees: Random Forest, Bagging and M5P | 1898 – 1902 |
Authors | Ankit Kumar Srivastava, Devender Singh and Ajay Shekhar Pandey |
Article - 153 | Title | Two Stage Miller Compensated Op-Amp design in 180 nm CMOS for High Gain Methodology | 1903 – 1908 |
Authors | Asheesh Kumar Tiwari, Beer Singh and Sumit Kumar Gupta |
Article - 154 | Title | Use of Information Technology in Crime Investigation | 1909 – 1912 |
Authors | Nguyen HuyBinh |
Article - 155 | Title | Efficacy of a Flipped-Classroom on Learning and Confidence of Engineering Students | 1913 – 1915 |
Authors | Amin Chegenizadeh, Mahdi Keramatikerman and Hamid Nikraz |
Article - 156 | Title | Petri Nets Generating Array Languages | 1916 – 1921 |
Authors | M.I.Mary Metilda and D.Lalitha |
Article - 157 | Title | Design and Development of IOT, Web-Server and ML-AVPR based Intelligent Humanoid Robot for Traffic Assistance | 1922 – 1929 |
Authors | Kantilal P Rane |
Article - 158 | Title | Drowsiness Detection System for Online Courses | 1930 – 1934 |
Authors | Umang Lahoti, Rakshita Joshi, Nupur Vyas, Kashmira Deshpande and Sweta Jain |
Article - 159 | Title | Social media use for educational purposes: Systematic Literature Review in higher education of Middle East Countries (MEC) | 1935 – 1944 |
Authors | Mohammed Abdullatif Almulla |
Article - 160 | Title | Automatic Summarization and Keyword Extraction from Multiple Wiki Articles and Books | 1945 – 1951 |
Authors | Dr. S. Pitchumani Angayarkanni |
Article - 161 | Title | From digital images to barcodes | 1952 – 1958 |
Authors | Ismail MAMOUNI and Hajar CHAWQI |
Article - 162 | Title | An Improved Framework for Sentiment Analysis for College Reviews | 1959 – 1963 |
Authors | T. Sri Devi, R. Dhanalakshmi and S. Sankar |
Article - 163 | Title | Vehicle Information Retrieval by Number Plate Detection | 1964 – 1967 |
Authors | Kavya G, Manjushree S, RanjithaV and Mamatha E |
Article- 164 | Title | Improving Travel Recommendation Accuracy using Fusion of Machine Learning Techniques | 1968 – 1972 |
Authors | ZainabKahid Jouhar and Ashwini V.Zadgaonkar |
Article - 165 | Title | Image Analysis of PLC Diagnosis System | 1973 – 1977 |
Authors | Karthik Raman, Ramchand Hablani and Swapnil Randive |
Article - 166 | Title | The Mechanics of the Blockchain Technology | 1978 – 1980 |
Authors | Nakonechnyi V.S., SteshenkoG.M., BuchykS.S., KresinaI.O. and RusnakA.V.5 |
Article - 167 | Title | Observing User Interface Design Patterns for Websites from a User-experience Point-of-View | 1981 – 1985 |
Authors | Ashwini G. Varma and Prof. Jignyasa B. Sanghavi |
Article - 168 | Title | Real Time Attendance System using One Shot Learning for Face Recognition | 1986 – 1990 |
Authors | Parikshit Pawde, Anjali Bhargava, Anuradha Dubey, Sheetal Hablani and Sweta Jain |
Article - 169 | Title | SLSort (Smallest-Largest Swap Sort) – A Sorting Algorithm | 1991 – 1995 |
Authors | Hirkani Padwad |
Article - 170 | Title | UWB Coherent Receiver Performance in a Vehicular Channel | 1996 – 2001 |
Authors | D. Daghouj, M. Fattah, S. Mazer, Y. Balboul and M. El Bekkali |
Article - 171 | Title | Performing Forensic Analysis on Network to Identify Malicious Traffic | 2002 – 2009 |
Authors | Jonnadula Bala Harika and Dr B. Chaitanya Krishna |
Article - 172 | Title | Analyzing the Use of P2P Lending Mobile Applications in Greater Jakarta | 2010 – 2020 |
Authors | Nancy Adistyasari, Refi Kautsar Firmansyah and Willy Gunadi |
Article - 173 | Title | An Ensemble DeepBoost Classifier for Software Defect Prediction | 2021 – 2028 |
Authors | K. Sri Kavya and Dr. Y. Prasanth |
Article - 174 | Title | A Review of Critical Security Challenges in SQL-based and NoSQL Systems from 2010 to 2019 | 2029 – 2035 |
Authors | Wilson Nwankwo |
Article - 175 | Title | Sleep Disorder Diagnosis through Frequency based EEG Energy Level Patterns | 2036 – 2042 |
Authors | Shivam Tiwari, Deepak Arora, PuneetSharma and Barkha Bhardwaj |
Article - 176 | Title | Luminescence efficiency Enhancement for different solar cells designs | 2043 – 2048 |
Authors | Kirti Saraswat, Dr. T. Usmani and Dr. Savita Maurya |
Article - 177 | Title | Stock Price Prediction Using Tech News Based Soft Computing Approach | 2049 – 2054 |
Authors | R.Suganya and Dr.A.Sasi Kumar |
Article - 178 | Title | Enhancing the Security of Online Card Payment System | 2055 – 2059 |
Authors | Srivani Bobba and Renu Deepti Surapaneni |
Article - 179 | Title | Higher Education Institution (HEI) Enrollment Forecasting Using Data Mining Technique | 2060 – 2064 |
Authors | Adeline P. Dela Cruz, Ma. Leslie B. Basallo, Benjamin A. Bere, III, Jerome B. Aguilar, Cheneta Kenny P. Calvo, Jan Carlo T. Arroyo and Allemar Jhone P. Delima |
Article - 180 | Title | Design of Enhanced RTP-RTCP Protocols for Heterogeneous Wireless Ad-hoc Networks to Enhance Channel Coverage and Capacity | 2065 – 2077 |
Authors | Mohan Babu.C, Dr.B.Sivakumar, Pradeep Kumar S and Sridhar C S |
Article - 181 | Title | Deep Convolutional Networks based on encoder-decoder architecture for automatic Optic Disc segmentation in retina images | 2078 – 2084 |
Authors | MohamedChala, Benayad Nsiri, Abdelmajid Soulaymani, Abdelghani Mokhtari and Brahim Benaji |
Article - 182 | Title | Automation of information security audit in the Information System on the example of a standard “CIS Palo Alto 8 Firewall Benchmark” | 2085 – 2088 |
Authors | Petr Perminov, Tatiana Kosachenko, Anton Konev and Alexander Shelupanov |
Article - 183 | Title | An Optimized and Unique Methodology for Software Test Case Automation Strategy | 2089 – 2095 |
Authors | Dr. Balika J Chelliah, K. Shreya, Arka Raha and M. Sravya |
Article - 184 | Title | On improving fault tolerance of IoT networks through Butterfly Networks implemented at Services Layer | 2096 – 2115 |
Authors | Amirapu Anjana, G. Gopi Chand, K. Sai Kiran, Dr.JKR Sastry and Bhpathi |
Article - 185 | Title | Classification Model for Prediction of Heart Disease using Correlation Coefficient Technique | 2116 – 2123 |
Authors | Sireesha Moturi, Dr. Srikanth Vemuru and Dr.S.N.Tirumala Rao |
Article - 186 | Title | Study and Design of a MMIC Voltage Controlled Oscillator for 5G mm-wave band Applications | 2124 – 2129 |
Authors | A. ES-SAQY, M. ABATA, M. FATTAH, S. MAZER, M. MEHDI and M. EL BEKKALI |
Article - 187 | Title | An Empirical combination of Machine Learning models to Enhance author profiling performance | 2130 – 2137 |
Authors | Roobaea Alroobaea |
Article - 188 | Title | Using Clustering techniques and Classification Mechanisms for Fault Diagnosis | 2138 – 2146 |
Authors | Sonika Dahiya, Harshit Nanda, Jatin Artwani and Jatin Varshney |
Article - 189 | Title | An Efficient VLAN Implementation to decrease Traffic Load in a Network | 2147 – 2153 |
Authors | Nimmagadda Lakshmi Sowjanya and Dr Raju Anitha |
Article - 190 | Title | Malaysians’ Popular Online Shopping Websites during Movement Control Order (MCO) | 2154 – 2158 |
Authors | K. Isa,J. M. Shah, S. T. Palpanadan and F. Isa |
Article - 191 | Title | Information System for Integrative and Dynamic Railway Supply Chain Management | 2159 – 2167 |
Authors | Mailasan Jayakrishnan, Abdul Karim Mohamad and Mokhtar Mohd Yusof |
Article - 192 | Title | Biofuz: A Takagi Sugeno Fuzzy Expert-Based Rice Straw Enhanced Decomposition System | 2168 – 2172 |
Authors | Cherry D, Casuat,Alvin Sarraga Alon,Jennalyn N. Mindoro, Mon Arjay F. Malbog and Julie Ann B. Susa |
Article - 193 | Title | “SolveMe” Website Development using Problem-based Learning Approach in Technical and Vocational Education | 2173 – 2177 |
Authors | Wan Hassan, W.A.S., Ariffin, A., Ahmad, F., Mohamad, N. and Anuar, R. |
Article - 194 | Title | A Static Analysis of Android Source Code for Design Patterns Usage | 2178 – 2186 |
Authors | Diaeddin Rimawi and Samer Zein |
Article - 195 | Title | A Cooperative Vehicle Intelligence for Smart Transport Services | 2187 – 2195 |
Authors | Veena R C, Dayanand LalN, Brahmananda S H, Sahana D S and Mala B M |
Article - 196 | Title | Problems of Development of a Cloud-Oriented Educational Environment of the University | 2196 – 2203 |
Authors | Akhmetov B., Lakhno V., Tkach Y., Adranova A. and Zhilkishbayeva G. |
Article - 197 | Title | Assessment on Tubalan Marine Sanctuary in Conserving Existing Coastal Habitat Using Data Mining Techniques | 2204 – 2207 |
Authors | Orlando E. Ang, Allemar Jhone P. Delima and Jan Carlo T. Arroyo |
Article - 198 | Title | Automatic Room Humidifier and Dehumidifier Controller using Arduino Uno | 2208 – 2212 |
Authors | Julie Ann B. Susa, Mon Arjay F. Malbog, Jennalyn N. Mindoro, Cherry D. Casuat and Alvin Sarraga Alon |
Article - 199 | Title | Risk Level Prediction of Life Insurance Applicant using Machine Learning | 2213 – 2220 |
Authors | B. Junedi Hutagaol and Tuga Mauritsius |
Article - 200 | Title | Drowsy or Not?Early Drowsiness Detection utilizing Arduino Based on Electroencephalogram (EEG) Neuro-Signal | 2221 – 2226 |
Authors | Jennalyn N. Mindoro,Cherry D. Casuat,Alvin Sarraga Alon,Mon Arjay F. Malbog and Julie Ann B. Susa |
Article - 201 | Title | Evaluating performance of different grammar checking tools | 2227 – 2233 |
Authors | Subham Sahu, Yogesh Kumar Vishwakarma, Jeevanlal Kori and Jitendra Singh Thakur |
Article - 202 | Title | Enhancing Online Supervision Practice for Improving Final Year Industrial Based Project in Technical Programs | 2234 – 2240 |
Authors | A. Ismail , A. Masek , S. Hashim , A. W. Abdul Rahman and A. H. AhmadShakir |
Article - 203 | Title | Performance analysis of Synchronous Network on Chip (NoC) for High speed and Low Power Multiprocessor on FPGA | 2241 – 2252 |
Authors | Amaresh. C and Dr.Anand Jatti |
Article - 204 | Title | A Machine Learning Approach for Cleaning CRM Data | 2253 – 2258 |
Authors | Anurag Deshmukh and Jitendra Singh Thakur |
Article - 205 | Title | An Inference Approach of Flood Level Detection and Alert System: Flood-Induced Simulated Environment | 2259 – 2264 |
Authors | Alvin Sarraga Alon, Jennalyn N. Mindoro, Cherry D. Casuat, Mon Arjay F. Malbog and Julie Ann B. Susa |
Article - 206 | Title | Automatic Text Summarization from Unstructured Text using Natural Language Processing | 2265 – 2269 |
Authors | Mamta Aswani and Ashwini V Zadgaonkar |
Article - 207 | Title | Development of Three Dimensional Simulation on Colon Cancer | 2270 – 2279 |
Authors | Sarni Suhaila Rahim, Cybill Anak Pedrik and Shahril Parumo |
Article - 208 | Title | Knowledge Extraction from Text Document Using Open Information Extraction Technique | 2280 – 2283 |
Authors | Payal Kadu and Ashwini V Zadgaonkar |
Article - 209 | Title | Hybrid Method for Improving Accuracy of Crop-Type Detection using Machine Learning | 2284 – 2288 |
Authors | Ankit.Arun.Mahule and Dr.A.J.Agrawal |
Article - 210 | Title | Feature Based Sentiment Analysis of Mobile Product Reviews using Machine Learning Techniques | 2289 – 2296 |
Authors | Minu P Abraham and Udaya Kumar Reddy K R |
Article - 211 | Title | Orange Fruit Disease Classification using Deep Learning Approach | 2297 – 2301 |
Authors | Rupali Saha and Dr. Shubhangi Neware |
Article - 212 | Title | A New Faster, Better Pixels Weighted Don’t Care Filter for Image Denoising and Deblurring | 2302 – 2309 |
Authors | Rachana Dhannawat and Dr. Archana B. Patankar |
Article - 213 | Title | Semantic Similarity Measures for Medical Information Retrieval | 2310 – 2319 |
Authors | Karim Gasmi and Mouna Torjmen |
Article - 214 | Title | A Framework for English-Odia Cross-Language Information Retrieval System | 2320 – 2325 |
Authors | Gouranga Charan Jena and Siddharth Swarup Rautaray |
Article -215 | Title | Improving Customer Segmentation in E-Commerce using Predictive Neural Network | 2326 – 2331 |
Authors | Himanshu Singh and Dr. Shubhangi Neware |
Article - 216 | Title | A Fuzzy Rule-Based Approach for Automatic Irrigation System through Controlled Soil Moisture Measurement | 2332 – 2337 |
Authors | Mon Arjay F. Malbog, Julie Ann B. Susa, Alvin Sarraga Alon, Cherry D. Casuat and Jennalyn N. Mindoro |
Article -217 | Title | Suitable Business Site Selection Using GIS | 2338 – 2342 |
Authors | Pragya L. Bopche and Dr. Shubhangi Neware |
Article - 218 | Title | The Use of Strong and Ordinal Scales during the Synthesis of Reference Images for Vehicle Correlation-Extreme Navigation Systems | 2343 – 2349 |
Authors | NataliiaYeromina, Sergey Petrov, Anatolii Tarasenko, Nataliia Antonenko, Oleh Semenenko, Oleh Pavlovskyi, Maryna Sliusarenko and Vadym Telehin |
Article - 219 | Title | Use of Big data to Measure Attentiveness of the Student | 2350 – 2352 |
Authors | G. Sowmya, N.Sirisha and G. Divya Jyothi |
Article - 220 | Title | A framework to succeed planning of IT projects through the Machine Learning | 2353 – 2361 |
Authors | Rachida HASSANI and Younès EL BOUZEKRI EL IDRISSI2 |
Article - 221 | Title | A Novel Approach to Load Balancing and Cloud Computing Security using SSL in IaaS Environment | 2362 – 2370 |
Authors | Bholanath Mukhopadhyay, Dr. Rajesh Bose and Dr. Sandip Roy |
Article- 222 | Title | A Classification Process for Detection Lung Cancer at Early Stage using Machine Learning Techniques | 2371 – 2376 |
Authors | Kavita Srivastava and Dr. Brijesh Kumar Bhardwaj |
Article - 223 | Title | A Theoretical Framework for implementation of Cloud Computing in Malaysian Hospitality Industry | 2377 – 2386 |
Authors | Riyad Mohammed Mansour, Muhammad Ehsan Rana and Qusay Al-Maatouk |
Article - 224 | Title | Graduate Prediction in University using Fuzzy Logic | 2387 – 2392 |
Authors | Ainul Yaqin Ibnu Abdul Wahid and Abba Suganda Girsang |
Article - 225 | Title | Intelligent Framework for Long-text Political Speeches Summarization and Visualization Using Sentiment Lexicons: A Study Directed at King Abdullah II Discussion Papers | 2393 – 2407 |
Authors | Zaher Salah, Waleed T. Al-Sit, Hala Hani and Kamal Salah |
Article - 226 | Title | Data Hiding using Meaningful Encryption Algorithm to Enhance Data Security | 2408 – 2413 |
Authors | Devishree Naidu, Shubhangi Tirpude, Kanak Kalyani, Vrushali Bongirwar and Tejasvee Sharma |
Article - 227 | Title | Recognition of Digitally Modulated Signal by ANN Algorithm | 2414 – 2421 |
Authors | Mohammed S. Khalaf, Aeizaal Azman A. Wahab, S.S.N. Alhady, H. Husin and W.A.F.W. Othman |
Article - 228 | Title | Flux Switching Machine: Design Variation Review | 2422 – 2430 |
Authors | Mohd Firdaus Mohd Ab Halim, Erwan Sulaiman and R. N. F. K. R. Othman |
Article - 229 | Title | Semantic Web Services and Multi Agent Approach for Building and Managing a Distributed Organizational Memory | 2431 – 2437 |
Authors | Khadija MAHJOUBI, Mohamed MIMDAL, Hassan LABRIJI and Mustapha HANOUN |
Article - 230 | Title | IoT based Soldier Monitoring System with Automatic Temperature Adjust Suit | 2438 – 2442 |
Authors | Rhagini A, Karvendhan K, Santhvel V C, Sindupriya V S and Sivasakthi A |
Article - 231 | Title | Autism Detection and Sub-grouping | 2443 – 2446 |
Authors | Neha Reddy Bonthu, Swarna Kuchibhotla , Prasuna Kotturu, Niranjan S.R.Mellacheruvu and B. Manjula Josephine |
Article - 232 | Title | Detection and Deletion of Offensive Words using Data Mining | 2447 – 2450 |
Authors | Hemasri M, Namrudha S, Sangamithra S,Sathish G and Sresarrvesh R R |
Article - 233 | Title | Performance Analysis of SPECK Codec by DWT and IWT for Medical Image Compression | 2451 – 2456 |
Authors | Revathi M and Dr. R. Shenbagavalli |
Article - 234 | Title | MQL2SQL: A Proposal Data Transformation Algorithm from MongoDB to RDBMS | 2457 – 2463 |
Authors | Jabrane Kachaoui and Abdessamad Belangour |
Article - 235 | Title | Cyber Security, Forensics and Its Impact on Future Challenges in Saudi Arabia Smart Cities Case Study on the Modern, Urban Planning and Design | 2464 – 2470 |
Authors | Mahmood Abdulghani Alharbe |
Article - 236 | Title | Towards a Semantic Layer Design for an Advanced Intelligent Multimodal Transportation System | 2471 – 2478 |
Authors | Jihane LARIOUI and Abdeltif EL BYED |
Article - 237 | Title | Towards a Chatbot for educational and vocational guidance in Morocco: Chatbot E-Orientation | 2479 – 2487 |
Authors | Omar Zahour, El Habib Benlahmar, Ahmed Eddaoui, Hafsa Ouchra and Oumaima Hourrane |