Past Issue : Vol: 9, Issue: 4 2019

Security Technique in Mobile Clouds to Ensure Malware Prevention

Yash Jaiswal

1-15

Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues r...

View Paper Download PDF

Developing and Integrating Framework Combining Apache Spark and Hadoop Tools Using Decision Tree Algorithms in Mitigating Accidents, Improving Road Safety and Predicting Adequate Safety Measures, 2019

Drishti Arora

16-24

In the transportation field, a huge amount of information has been gathered by IoT devices, remote detecting and other information assortment apparatuses bring new challenges, the ...

View Paper Download PDF

Employability of Machine Learning Tools and Techniques to Translate Texts from Hindi to English

Pranshul Pahwa

25-32

Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that can be helpful in inexpensive and ease implementation of and MT systems. Methods/Stat...

View Paper Download PDF

Exploring the Statistical Analysis- Quick Script to Develop Customised IOT and Machine Learning Tools

Mukul Ganghas

33-38

With the appearance of AI and IoT, the idea of becoming a member of savvy matters/apparatuses in our normal life is changing over into a fact. The paper examines the chances and ca...

View Paper Download PDF

Developing a Prototype Model of an Eco-Friendly Self-Driven Car by Applying Proportional Integral Derivative (PID) Controller

Unnati Gupta

39-44

The driverless car nowadays is in eye catcher to everyone; this technique not only frees people from engaging their hand on steering, but also frees people from giving attention on...

View Paper Download PDF

Empirical Analysis of Traumatic Brain Imaging Using Brain MR Images

Vikas Narayan Nandgaonkar, Dr Kailash Jagannath Karande

45-48

Lately, deep learning strategies contain demonstrated the greatest shows in best competitions coping with MR image segmentations, like the brain tumor segmentation problem. The lat...

View Paper Download PDF

., Leveraging Machine Learning Tools and Techniques in the Detection of Parody on Twitter and Other Social Networking Sites

Saatvik Wadhwa

49-53

Parody is an inconspicuous type of contradiction, which can be broadly utilized informal communities like Twitter. It is normally used to send stowed away data, a message sent by i...

View Paper Download PDF

Developing an Integrated Model Based on Blockchain for the Efficacious Anti-Counterfeit ‘Detection’

Gaurav Chhikara

54-57

Fake goods have become a major issue in manufacturing in recent years. The company's name, sales, and profits are affected by this. Blockchain technology is employed to tell apart ...

View Paper Download PDF

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.