IJET -Volume 6, Issue 2 , March-April 2020
S.No
|
Title/Author Name
|
Serial No
|
1 |
LATENT DIRICHILET ALLOCATION AND NAIVE BAYES CLASIFICATION BASED TWITTER DATA’S HIERARCHICAL TOPIC MODELING
-Mr. C. Mani, M C A, M.E, M Phil, Mr. P.Harish, M C A
Abstract
Twitter data accumulated so far make it in all likelihood to find out the distribution and go with the flow of mass tastes and opinions, which greatly help in product recommendation, target advertising and marketing and so on. This challenge proposes a subject model known as twitter hierarchical Latent Dirichlet Allocation (thLDA). Based on hierarchical latent Dirichlet allocation, thLDA aims to automatically mine the hierarchical measurement of tweets’ subjects, which may be further employed for text Here, the phrases present in every of the topics with extra importance are extracted out and their beta value is found out. Furthermore, thLDA analyzes the relationships of words in tweets to get a more powerful measurement. Extensive experiments are carried out on Twitter information and the effectiveness of thLDA is evaluated. The consequences show that it outperforms properly amongst other current topic fashions in mining. This venture improves the topics mining amongst two subjects as well as three subjects. In addition, conditional chance is finished for Naïve Bayes Classification of important terms in the given statistics set so that the whole words possibilities in all the categories are found out and displayed. The task is designed the usage of R Studio 1.0. The coding language used is R 3.4.4. Keyword:LDA, Navive Bayes, OLAP, Data Mining × Mr. C. Mani, M C A, M.E, M Phil, Mr. P.Harish, M C A LATENT DIRICHILET ALLOCATION AND NAIVE BAYES CLASIFICATION BASED TWITTER DATA’S HIERARCHICAL TOPIC MODELING " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P1 |
2 |
FAKE PRODUCT REVIEW SUPERVISION AND PRODUCT RECOMMENDATION
-Mr. C. Mani, M C A, M.E, M Phil, Mr. N. Karthikeyan, M C A
Abstract
Nowadays, there are a unit variety of individual’s exploitation social media opinions to form their appeal buying product or service. Opinion Spam detection is associate exhausting and onerous downside as there are a unit several pretend or faux reviews that are created by organizations or by the individuals for varied functions. They write faux reviews to mislead readers or automatic detection system by promoting or demoting target product to market them or to degrade their reputations. Opinion spamming refers to the employment of excessive and illicit strategies, like making an outsized volume of faux reviews, so as to get biased positive or negative opinions for a target product or service with the intention of promoting or demoting it, severally. The reviews created for this purpose area unit referred to as faux, spam or fake reviews, and therefore the authors answerable for composing such deceptive content area unit referred to as faux or spam reviewers. This project can verify faux reviews created by the shoppers so block them. the subsequent things area unit thought-about within the project. 1) Tracking IP address of the user to discover if the reviews area unit from a sender. If multiple reviews area unit from an equivalent science address then the Reviews area unit thought-about Spam. 2) Exploitation Account accustomed check whether or not the reviews area unit done exploitation an equivalent account. 3) Complete solely Review detection i.e. whether or not the reviews area unit on solely complete not the merchandise. It’s not useful to think about solely the complete price to gauge a product. 4) Exploitation Negative lexicon i.e. the negative words area unit known within the review. If there is a unit quite. 5) Negative Words then the review could be a Spam. Keyword:Opinion spamming, solely review detection, Tracking IP address × Mr. C. Mani, M C A, M.E, M Phil, Mr. N. Karthikeyan, M C A FAKE PRODUCT REVIEW SUPERVISION AND PRODUCT RECOMMENDATION " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P2 |
3 |
MOMENTOUS PERMISSION IDENTIFICATION FOR ANDROID APPS MALWARE DETECTION
-Ms. N. Zahira Jahan, M.C.A., M Phil., Mr. J. Karthikeyan, M.C.A
Abstract
Unlike unique competing smart-cell a tool platform, which includes iOS, Android lets in customers to install programs from unverified resources which consist of third-birthday party app stores and file- sharing websites. The malware infection difficulty has been so excessive that a recent record shows that 97% of all cell malware purpose Android devices. To cope with the elevating protection concerns, researchers and analysts have used numerous strategies to make bigger Android malware detection equipment. So a scalable malware detection approach is needed that efficiently and successfully identifies malwares. Various malware detection gear had been developed, including system-diploma and network diploma processes. However, scaling the detection for a massive bundle deal of apps stays a hard challenge. So this mission introduces Significant Permission Identification (SigPID), a malware detection device based mostly on permission usage evaluation to deal with the rapid boom within the variety of Android Instead of extracting and analyzing all Android permissions, this task develop three stages of pruning by way of mining the permission records to apprehend the most massive permissions that may be effective in distinguishing among benign and malicious apps. Then it makes use of system-learning-based absolutely classification strategies to classify exceptional households of malware and benign apps. This venture identifies volatile permission list, benign permission list and reduce non-touchy permissions and follow SVM classification at the new information set. The mission is designed using R Studio. The coding language used is R. Keyword:iOS, Malware dection, SigPID, SVM. × Ms. N. Zahira Jahan, M.C.A., M Phil., Mr. J. Karthikeyan, M.C.A MOMENTOUS PERMISSION IDENTIFICATION FOR ANDROID APPS MALWARE DETECTION " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P3 |
4 |
MODEST AND TARGET CONSCIOUS E-SCIENCE WORKFLOW PLANNING IN CLOUDS
-Mr.S.Sambasivam, M.C.A., M.Phil, Mr. S. Mohanasundaram, M C A
Abstract
Cloud computing is rapidly developing and lots of extra cloud carriers are emerging. Cost efficiency and resource price maximization turn out to be two major worries of cloud providers to remain aggressive while making profit. The income maximization problem in federated cloud environments co-operate to increase the degree of multiplexing has been investigated. Outline novel economics-inspired aid allocation mechanisms to address the income maximization hassle from the attitude of a cloud issuer performing solely. Admission manage mechanisms tailored within a Profit management framework to maximize resource value has been proposed. Existing abstractions for in-memory garage on clusters, such as dispensed shared memory, key value stores, databases, and Piccolo, offer an interface primarily based on fine-grained updates to mutable state (e.g., cells in a table). Our resource allocation technique is primarily based on I find many danger in EDPP on a couple of clouds. It design a aid discovery protocol, specifically Event handler E-DAG(Direct Acrylic Graph), to locate those certified nodes. It chooses EDPP-E-DAG as the DHT overlay to evolve to the multidimensional feature. Some of them are inherit within the process of planning like pressure and different arise because of shortcoming of the techniques on multi cloud by means of themselves on this proposed work. With this interface, the handiest methods to offer fault tolerance are to replicate the statistics across machines or to log updates across machines. Where various pricing plans in multiple marketplaces are supported via the provider an auction-based dynamic pricing mechanism suitable for selling the spare ability of the records center. A consciousness of the proposed dynamic pricing mechanism within a pricing as a service framework. Cost powerful resource allocation based totally on following techniques are Cost Efficiency of the Cloud: Cost reductions and profit increases, Pay as it cross pricing, Implications of multi Scheduling and resource allocation as a fee efficient solution: Exploitation of utility characteristics, explicit consideration of user experience/satisfaction. Keyword:Scientific Workflow, Scheduling, Budget, Deadline, Cloud. × Mr.S.Sambasivam, M.C.A., M.Phil, Mr. S. Mohanasundaram, M C A MODEST AND TARGET CONSCIOUS E-SCIENCE WORKFLOW PLANNING IN CLOUDS " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P4 |
5 |
SURVEY ABOUT CONNECTING DEVICES USING IOE
-DR.S.Hemalatha,ABINESH.A,SOORYA PRASAD.T. R,VIGNESH.M
Abstract
The internet of everything (IoE) is a broad term that refers to devices and consumer products connected to the internet and outfitted with expanded digital features. It is a philosophy in which technology's future is comprised of many different types of appliances, devices and items connected to the global internet. IoE is based on the idea that in the future, internet connections will not be restricted to laptop or desktop computers and a handful of tablets, as in previous decades. Instead, machines will generally become smarter by having more access to data and expanded networking opportunities. The applications of the internet of everything is used as Fog computing, Cyber security. This Paper explains about the devices that are connected to a mobile phone application in which the application can be tracked with each other and the facial recognition principle is used wherein when the person visits the house then by using the camera the face can be recognized and it can be brought to the application. By the use of the Global Positioning System (GPS) which is inserted in the vehicle, can be trackedusing this application. Keyword: × DR.S.Hemalatha,ABINESH.A,SOORYA PRASAD.T. R,VIGNESH.M SURVEY ABOUT CONNECTING DEVICES USING IOE " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P5 |
6 |
ARMA BASED CROP YIELD PREDICTION USING TEMPERATURE AND RAINFALL PARAMETERS WITH GROUND WATER LEVEL CLASSIFICATION
-Mr.S.Jagadeesan, M.E.,Mr. T.Gopinath, MCA
Abstract
The main aim of this project is to provide a methodology for crop yield production based on the historical climatic and production data. Crop yield prediction based on the previous years of temperature and rainfall can help farmers take necessary steps to improve crop yield in the coming season. Understanding crop yield can help ensure food security and reduce impacts of climate change. Crops are sensitive to various weather phenomena such as temperature and rainfall. Therefore, it becomes crucial to include these features when predicting the yield of a crop. Weather the forecasting are complicated process. In this work, ARMA (Auto Regressive Moving Average) method is used to forecast crop yield. Past ten years of data set is taken for temperature, rainfall and ground water level for our country. Yield prediction is then carried out using a Fuzzy logic algorithm to better judge the crop yield. In addition, this project classifies the ground water level data set records using KNN to predict the model for future test record data sets. It will be helpful in analyzing the ground water levels in the past and so as to predict the future levels. Keyword:ARMA, yield predicition, KNN Algorithm.. × Mr.S.Jagadeesan, M.E.,Mr. T.Gopinath, MCA ARMA BASED CROP YIELD PREDICTION USING TEMPERATURE AND RAINFALL PARAMETERS WITH GROUND WATER LEVEL CLASSIFICATION " Volume 6 - Issue 2(1-5) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P6 |
7 |
Approach to Rehabilitation of Urban Lakes: A Case Study in Mysore City
-Dr. Jyotirmoy Sarma
Abstract
Need for rehabilitation of lakes and water bodies within urban areas has been recognised by Government and general public. Because of this, some projects on rehabilitation of urban lakes have been taken up in India. But, planning and implementation of lake rehabilitation project in not easy. Adequate experience in lake rehabilitation projects is essential for project implementing agencies. The paper attempts to share the Author’s experience in lake rehabilitation project in India. Keyword:Urban lake, rehabilitation, beautification, ownership of lake, feeder channel × Dr. Jyotirmoy Sarma Approach to Rehabilitation of Urban Lakes: A Case Study in Mysore City " Volume 6 - Issue 2(1-4) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P7 |
8 |
E-Learning and Student Motivation
-Dhivin Joshua Nelson, Mihir Jatin Shah, Ganesh Dhole, Kaustav Biswas, Ratnmala Bhimanpallewar
Abstract
The main aim of this project is to provide a methodology for crop yield production based on the historical climatic and production data. Crop yield prediction based on the previous years of temperature and rainfall can help farmers take necessary steps to improve crop yield in the coming season. Understanding crop yield can help ensure food security and reduce impacts of climate change. Crops are sensitive to various weather phenomena such as temperature and rainfall. Therefore, it becomes crucial to include these features when predicting the yield of a crop. Weather the forecasting are complicated process. In this work, ARMA (Auto Regressive Moving Average) method is used to forecast crop yield. Past ten years of data set is taken for temperature, rainfall and ground water level for our country. Yield prediction is then carried out using a Fuzzy logic algorithm to better judge the crop yield. In addition, this project classifies the ground water level data set records using KNN to predict the model for future test record data sets. It will be helpful in analyzing the ground water levels in the past and so as to predict the future levels. Our aim is to develop an efficient, “E-Learning” System in which we will detect user presence by using[1] OpenCV this will make sure that the user to complete the course has to be physically present, the moment our System detects that the user is not present the video will automatically be paused. To help the system admin analyze user activity we our plotting a graph with the help of Bokeh plot which shows when the user was present, and when the user was absent. To understand better the user behavior for the course, we have also implemented an Emotion detection system that will take the frames captured in the motion detection as input and will identify the emotion of the user such as happy or sad. This will give us the precise idea about the quality of the content of the course. This is a self-learning bot developed to take course feedback, user opinions and reviews of user to improve course contents and make the course more effective and interesting to learn for the users. Basically the Chatbot is included in the E-learning System for feedback purposes. [2]Feedback is an important component of interaction. The educational contents in the course is continually improved using the information between the interaction of the bot and the user. These results in a more effective way of course development. Keyword:Motion Detection, Chatbot, E-Learning, CNN, Smart CED, Student Motivation, Data Virtualization. × Dhivin Joshua Nelson, Mihir Jatin Shah, Ganesh Dhole, Kaustav Biswas, Ratnmala Bhimanpallewar E-Learning and Student Motivation " Volume 6 - Issue 2(1-7) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P8 |
9 |
A Pipelined ADC With Sub-ADC Based on
Flash–Ramp Architecture
-Himanshu Shekhar, Dr Bharti Chourasia
Abstract
This work is base on the pipeline ADCs architecture. Pipeline ADCs are convenient alternatives to time interleaving. As the stage of the pipeline is simpler asd compare to a full converter, the design area and power are competitive. The pipeline ADC design with two or more stages in which every stage is of a low resolution ADC, and combining these stages results in a higher resolution.The design ADC consists of channels for high operating speed and every channel consist of a pipelined flash and ramp analog 5to digital converter architecture with reduce power and a optimize area. The sample ADC design in a 50-nanometer CMOS technology with 8-bit of resolution. The supply voltage is 1.2V. Keyword:Flash ADC, Ramp ADC, Pipelined, SAR, Dual Slop × Himanshu Shekhar, Dr Bharti Chourasia A Pipelined ADC With Sub-ADC Based on Flash–Ramp Architecture " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P9 |
10 |
VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD STORAGE
-Dr.E.Punarselvam,Mr.M.Dhamodaran, M.Saravanan, S.Sasidharan,
S.Sreedhar, K.Vignesh
10.29126/23951303/IJET-V6I2P10
Abstract
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS). Keyword:Public Key, Encryption Schemes, ABKS,Data Sharing. × Dr.E.Punarselvam,Mr.M.Dhamodaran, M.Saravanan, S.Sasidharan, S.Sreedhar, K.Vignesh VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD STORAGE " Volume 6 - Issue 2(1-9) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P10 |
11 |
HEALTHCARE SUPERVISING SYSTEM TO MONITOR HEART RATE TO DIAGONIZE AND ALERT HEART ATTACK USING IOT
-Dr.E.Punarselvam, N.Gokul, J.Jeyakumar, R.Lenin, S.Praveenkumar 10.29126/23951303/IJET-V6I2P11
Abstract
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT. Keyword:Heart Beat Sensor, IOT, Heart Level. × Dr.E.Punarselvam, N.Gokul, J.Jeyakumar, R.Lenin, S.Praveenkumar HEALTHCARE SUPERVISING SYSTEM TO MONITOR HEART RATE TO DIAGONIZE AND ALERT HEART ATTACK USING IOT " Volume 6 - Issue 2(1-7) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P11 |
12 |
Design And Analysis of Cylinder Block using ANSYS
-Nirmal Kumar R, Udhaya Kumar R,Yashic P,Purushothaman P 10.29126/23951303/IJET-V6I2P12
Abstract
Cylinder block is the important part of Engine. Generally used Cast Iron and Aluminium materials for the fabrication of cylinder block. Here we are finding suitable material for Cylinder block by using ANSYS. Method of analysis are Static Analysis, Transient Thermal Analysis, Fatigue Analysis .These Analysis are taken by ANSYS software. Testing materials are AL7475,NICKEL ALUMINIUM BRONZE ALLOY, GRAPHITE CAST IRON ,SAND CAST MAGNISIUM ALLOY. Finally suitable material for cylinder block is AL7475. Keyword:Cylinder block, engine block, static analysis, transient thermal analysis, fatigue analysis × Nirmal Kumar R, Udhaya Kumar R,Yashic P,Purushothaman P Design And Analysis of Cylinder Block using ANSYS " Volume 6 - Issue 2(1-7) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P12 |
13 |
FIFTH GENERATION WIRELESS TECHNOLOGY
-Mr.R.KARTHIKEYAN , Ms. R.PREETHA , Mr. M.MUTHUKRISHNAN 10.29126/23951303/IJET-V6I2P13
Abstract
Fifth generation wireless technology is the most recent emphasis of cell innovation that has three fundamental highlights: more prominent speed, lower inactivity, and the capacity to associate significantly more gadgets all the while. A business 5G wireless system is relied upon to be conveyed by 2020. This paper gives a concise prologue to 5G wireless innovation. 5 th age remote innovation is give us dynamic speed and significantly more productivity. It would make gigantic enhancements in remote innovation's assertion. The need of 5G innovation expands step by step with no. of issues like plenty clients, rapid, beneficiary multifaceted nature and so forth.. These days 4G is going on however as a client and gadgets are going to expand step by step then in future there is a great deal of traffic in 4G range. Also, around then we need another innovation, which is 5G. By and by, 5G versatile administrations to be made accessible for use, their engineering, and their exhibition have not been obviously explained. Right now, speak to exhaustive diagram of 5G the cutting edge versatile innovation. We for the most part illuminates 5G organize engineering, 5G radio range, ultra-thick radio access systems (UDRAN), traffic offloading of portable, psychological radio (CR), programming characterized radio (SDR), programming characterized organizing (SDN), blended framework, and 5G arrange sway on the general public. Keyword:5G wireless technology, Cognitive Radio (CR), 5G radio spectrum, Traffic offloading of mobile × Mr.R.KARTHIKEYAN , Ms. R.PREETHA , Mr. M.MUTHUKRISHNAN FIFTH GENERATION WIRELESS TECHNOLOGY " Volume 6 - Issue 2(1-9) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P13 |
14 |
Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication
-M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD
10.29126/23951303/IJET-V6I2P14
Abstract
Phishing has been a superb threat to Cloud for an extended time; many data stored within the cloud are often theft by Phishing outbreaks. Leaking of knowledge damages the persons/institutions' value, prestige, and loss of money. The target of our paper is to beat the Phishing outbreaks. Phishing is often solved using Two-Factor Authentication (2FA). During this method, we use a password and an OTP for login. An algorithm called Time based One-Time Password (TOTP) is used to provide an OTP. This may be utilized in Banking and Financial Services. So, we are using this method we generate an OTP whenever a user tries to log in to his account. By entering the OTP and password only he can log in to his account. These help in reducing the threat of Phishing since knowing the password alone isn't sufficient for our breakers to log in to our account. This way we'll eradicate the Phishing Outbreaks on Banking and Financial sites by 80%. This algorithm is best utilized in conditions like Banking, Financial and online shopping websites. Keyword:Phishing, Two Factor Authentication, Time based One-Time Password, Banking sector, Online shopping websites, Data theft. × M.AZHAGIRI, G.LEELA, K.NIKESH, CH.PRASAD Eradication Of Phishing Attacks On Cloud Using Two Factor Authentication " Volume 6 - Issue 2(1-6) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P14 |
15 |
MACHINE LEARNING APPLIED TO SOFTWARE TESTING
-Manikkannan D, R. Bhumi Devi, V.V. Nithyaa Shri, B. Bala Barathy 10.29126/23951303/IJET-V6I2P15
Abstract
Software testing is an integral part of developing software which aims to identify the errors and faults. The budget involved in developing the software exceeds if the fault is not detected and corrected at the right time. Also, testing is error prone. In order to overcome such problems, an attempt is made to automate software testing by applying machine learning algorithms which will minimize the error and the cost involved in software testing. Software testing activities include test case generation and oracle testing among others. Linear regression, decision tree and random forest algorithms are the machine learning algorithms that are used. Keyword:software testing, machine learning, linear regression, decision tree, random forest × Manikkannan D, R. Bhumi Devi, V.V. Nithyaa Shri, B. Bala Barathy MACHINE LEARNING APPLIED TO SOFTWARE TESTING " Volume 6 - Issue 2(1-7) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V6I2P15 |
Under in review process, article will publish soon... |
|