Past Issue : Vol: 8, Issue: 3 2018

Toxicity in Molecules: Analysing the Key Parameters in Determining the Poison Levels to Develop an Analysis Metrics

Gatik Gola

1-7

The study of toxicity in a molecule has become a common theme of research nowadays. Molecules are said to be poisonous if they interfere with the body’s chemistry and alter it in...

View Paper Download PDF

Applying User Based Collaborative Filtering to Develop an Efficacious Model for the Movie Recommendation System

Gatik Gola

8-13

Recommender systems have become ubiquitous in our lives. Yet, currently, they are far from optimal. In this project, we attempt to understand the different kinds of recommendation ...

View Paper Download PDF

Data Breaches in Internet Banking - Analysing the Key Influencers That Impact Data Violation and Adopting Measures of Curbing Data Violation

Vishal Duhan

14-24

In information systems, Cloud computing is a popular theme of research. It has revolutionized the perspective of distributed computing from existing methods. Although cloud offers ...

View Paper Download PDF

Healthcare Sector – Leveraging the Capabilities of Internet Of Things (IOT) to Develop an Efficacious Health Monitoring and Disease Controlled System

Vikas Rana

25-48

The introduction part illustrates the Internet Of Things(IOT) and its implementation in healthcare system. The Health Monitoring is very important criteria for healthcare in the mo...

View Paper Download PDF

A Study of the Impacts of Tourist Activities on Wildlife (A Case Study of Yankari Game Reserve as a Tourist Destination in Alkaleri Local Government Area of Bauchi State, Nigeria)

Shehu Usman Abdu, Dr. Mohammed Sani Abdu, Ibrahim Abubakar Audu, Ahmad Salim Shehu

49-60

Wildlife tourism contribute financial donation for many countries and is seen as an instrument for development which stimulate economic benefits, this paper examines the impacts of...

View Paper Download PDF

Binary Logistical Regression

Abheet Kansal

61-74

Several application Analysts has areas which have a responsible variable with solely 2 potential levels, of that one is that the preferred result. Binary logistical regression can ...

View Paper Download PDF

Challenges of Geographic Information Systems (GIS) in Controlling Crime in Nigeria

Ali Badema

74-85

Nigeria is experiencing a dull moment due to high level of insecurity that ravage the country. Criminal activities are believed to constitute a significance proportion to this incr...

View Paper Download PDF

Attempt to Examine the Education Data Mining to Optimize the Student Learning and Performance Assessments

Hardik Chaudhary

86-90

As we have broad proportion of data in the industry so examine that information and concentrate the helpful data by applying particular information mining strategies.With the help ...

View Paper Download PDF

Developing an Integrated Model Based on the Internet Of Things to Enhance Smart Health Security and Privacy Vulnerabilities

Pavit

91-96

IoT is characterized as the advancement of the web with regular items. It is named as a visionary change of items that encourage clients and give various administrations. IoT makes...

View Paper Download PDF

An In-Depth Analysis of the Key Influencers Impacting the Security & Privacy Issues on Service Model in Cloud Computing

Vipul Goyal

97-112

Presently, distributed computing is proficiently sharing information and assets over the web. It is made out of five essential qualities, for example, On-Demand self-administration...

View Paper Download PDF

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.