Impact Factor
7.883
Call For Paper
Volume: 11 Issue 05 May 2025
LICENSE
Conference : Ic3ns 2018
ANALYSIS OF DISTRIBUTION OF RBI ASSETS USING SAS
Engineering
The Project Analyzes The Data Which Will Collected By The RSERVE BANK OF INDIA For The Last 8 Years(2008-2016) Among Selected States In India Depicting The Distribution Of Assets. The States For Which We Consider Are Chandigarh, Delhi, Haryana, Himachal P
Author: Vageesha Sharma | Ayushi Pandey | Dr. Sanjeev Patwa
Read MoreVOICE CONTROLLED HOME AUTOMATION
ECE
Voice Controlled Home Automation Is Used In Controlling The Electrical Load With Voice. The Input Signals Provided Here Are The Bluetooth Signals Which Are Actually Signals From Android Device Received By Bluetooth Device[6]. The System Works By Interfaci
Author: Deepika Sharma
Read MoreNETWORK INTRUSION DETECTION IN BIG DATASET USING SPARK AND WEKA
EEE
Due To Rapid Growth In Network Applications, Network Attacks And Intrusions Have Also Been Increased. Nowadays Intrusion Detection Systems Require Efficient And Improved Detection Mechanism Which Could Detect Intrusive Activities And Serious Threat To Ne
Author: Priyanka Dahiya
Read MoreCLUSTERING ANALYSIS OF HETEROGENEOUS DATA USING HYBRID CLUSTERING ALGORITHMS
Engineering
In The Present Digital Scenario There Is An Overwhelming Increase In Data, With The Increase In Data It Is Urgent To Develop An Effective And Efficient Approach To Handle And Cluster These Data For Further Analysis. This Paper Includes Hybridizations Of V
Author: Harshi Garg | Niranjan Lal
Read MoreWI-FI HACKING AND SECURITY
Electronics And Communication Engineering
The Wireless Network Has Become An Important Part Of Our Daily Life. Wireless Networks Have Replaced Wired Network To A Great Extent. But With The Advancement Of Technology, Many Cyber-attacks Have Occurred. This Paper Is All About Wireless Networks (Wi-F
Author: Shivam Lohani
Read MoreQUENCH CALCULATION SOFTWARE
Engineering
FAIR - The Facility For Antiproton And Ion Research Is A New Accelerator Complex Which Is Currently Under Construction In Darmstadt, Germany. Superconducting Magnets Are The Key Components Of Modern Particle Accelerators. A Superconducting Magnet Is An E
Author: Jayati Vijaywargiya
Read MorePERFORMANCE EVALUATION USING DIFFERENT TECHNIQUES OF ANOMALY BASED INTRUSION DETECTION SYSTEMS
Engineering
Identifation Of Attacks In Information System Is Principle Motivation Behind Intrusion Detection System (IDS). Anomaly Detection System (ADS) Is A Developing Issue That Ends Up Plainly Essential Research Subject In The Present Research Region. (ADS) Anoma
Author: Umasoni | Dr. Uma kumari
Read MoreMACHINE LEARNING BASED RECOMMENDATION SYSTEM
Engineering
For Making Decisions For Their Personal Interest On Which The Information For People Based In Their Daily Life That Is The Task Of The Recommendation System. It Plays Important Role In The Internet World. This Paper Describes Various Algorithms And Techni
Author: Shivangi Singla | Vinod Maan
Read MoreREVIEW ON CYBER SECURITY AND CYBER CRIMES
Engineering
In Today's Growing World Cyber Security Is Very Necessary,as Technology Provides Many Services To Us, There Are Some Effect Also Like Security Threats And Cyber Attacks. To Secure The Information From Hacker And The Cyber Attacks We Will Require The Cyber
Author: Amritpal Kaur | Monika Sharma
Read MoreA REVIEW ON APPLICATION AND CHALLENGES OF BLUE BRAIN PROJECT
CSE
Man Is Said To Be The Most Wonderful Creation Of The God. But, Has Anyone Wondered What Makes Him Different From All The Other Species. It Is The Human Brain. This Brain Makes The Man Capable Of Doing All The Activities Which No Other Species Is Capable O
Author: Dr. Puneet Kumar | Mili Sharma | Tulika Tewari
Read MoreQUANTUM COMPUTERS
Engineering
Quantum Computers Can Bring An Unimaginable Change In The Computing Technology. Made Of Qubits, Instead Of Binary Bits, They Hold Many Advantages Over Classical Computers Like Energy Efficiency, Less Time Utilization, High Speed (100 Million Times Faster)
Author: Amisha Kumari | Kirti Choudhary | Sujata Nimiwal
Read MoreADVANCED BRAIN SUPERVISION
Engineering
In Brain Gate Technology(BGT), BMI, Is A Straight Disclosure Lane Between Individual And An Exterior Gadget In One Medium BMIs Computer Either Send The Signal Or Can Accept The Commands From The Brain. While In Two Ways BMIs, It Will Allow Both The Brain
Author: Shruti Dwivedi | Palak Khandelwal | Himani
Read MorePROPOSED SYSTEM FOR FREE CALLS OVER WI-FI NETWORK USING VOIP AND SIP: ANDROID APPLICATION
CSE
Today’s Era Of Technological Advancement Has Made Humans Inclined To A Great Extent Towards Communication And Dependent On Free And Procurable Internet Services. Free And Wide Availability Of Internet Services Has Made Communication Feasible And More Sust
Author: Shailja Barsaiyan | Sneha Agarwal | Sonali Sachdev | Prevesh Bishnoi
Read MoreCYBER SECURITY: A LITERATURE REVIEW
Engineering
Amongst The Increase In Number Of Technologies, There Has Been An Exponential Rise In The Cyber Security Threats. The Counters Help To Ensure The Integrity And Availability Of Information Systems By Preventing Asset Losses From Cyber Security Attacks. In
Author: Akrati Singh | Anoushka Pathak | Aditi Pansari
Read MoreSECURITY ISSUES IN CLOUD COMPUTING
CSE
This Paper Is An Effort To Bring Forth The Security Issues In Cloud Computing In Spite Of The Fact That Cloud Computing Is An Emerging Technology In The World Of Science And In Our Life. Cloud Computing Refers To The Internet Based Platform For Computing
Author: Sunaina Choudhary
Read MoreIMPLEMENTATION OF LOAD–BALANCING AND AUTO-SCALING ON ORACLE VIRTUAL BOX
Engineering
The Key Objective Of This Research Paper Is To Design And Realize The Model For Load Balancing And Auto Scaling By Using Oracle Virtual Box. Load Balancing And Auto Scaling Are The Elementary Key Activities Of Cloud Computing. Virtual Box Is Being Used As
Author: Preksha Sundrawat | Meghna Sharma | P.K Bishnoi
Read MoreEMBLEMATIC ANALYSIS OF VARIED MACHINE LEARNING ALGORITHM
Engineering
Suitability Of Algorithm Before Its Implementation Is A Paramount. Inventing New Algorithm Is Not An Efficient Approach To Imply It On An Application. Existing Pool Of Machine Learning Algorithm Has A Vast Variety Of Implementation Strateg
Author: Surbhi Agarwal | Roli Trivedi | Jayati Vijayvargaya | Manya Srivastava
Read MoreSOFTWARE DEFINED NETWORKING: BASIC ARCHITECTURE & ITS USES IN ENTERPRISES
Computer Science & Engineering
Networks Are Controlled By Software Applications Which Are Called Software Defined Networking (SDN) Controllers. Traditional Network Controllers Are Tedious And It Is Hard To Manage Old, Rigid Commands And Consoles. A Key Requirement Of SDN Is Speed And A
Author: Yashi Aggarwal | Uma Kumari
Read MoreA BRIEF DESCRIPTION OF REVERSE ENGINEERING AS A VALUABLE TECHNIQUE FOR PRODUCT REDESIGNING
Engineering
Reverse Engineering Is Recreation Of Product By Breaking It Down Into Various Set Of Processes In Opposite Order. Reverse Engineering In Products Designing Is Done To Enhance Features Of Products And Make Them Cost Effective For Customers As Well As Manuf
Author: Shivika Tripathi | Anand Sharma
Read MoreROLE OF ONTOLOGY IN SEMANTIC WEB
Engineering
The Current Generation Of Computers Is Ever-changing From Single Isolated Devices To Entry Points Into A Worldwide Network Of Knowledge Exchange. Therefore, Support Within The Exchange Of Information, Data And Data Is Changing Into The Key Issue In Engine