Past Issue : Vol: 10, Issue: 3 2020

A RESEARCH ON CYBER SECURITY AND ARTIFICIAL INTELLIGENCE

Anirudh Dahiya

01-05

Nowadays cyberattack is very common and also very dangerous. It not only corrupts data but also steals money from the user's accounts. To prevent this, we introduce CSAAI. Artifici...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.001


ANALYSIS OF THE EFFECTIVENESS OF BRAND COMMUNICATION OF PROJECT MOM AND BABY UNIVERSE AT THE STORE RAJA SUSU IN CREATING BRAND AWARENESS, SHOPPER SATI...

Fery Ade Putra, Dr. Baruna Hadibrata, MM

06-15

This study aims to analyze the effectiveness of Brand Communication (Project Mom and Baby Universe) on brand awareness, shopper satisfaction and repurchase intention of Danone Spec...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.002


Leveraging the Internet of Things Based on the Analytical Study of the Skeleton Joint Position in Recognising the Quality of Human Activity

Nipun Arora

16-22

To give consequently dissecting and identifying human exercises to offer better help in the medical services area, security reason and so on Strategy: We have utilized UTKinect-Act...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.003


DEVELOPMENT OF CREATIVE THINKING SKILLS IN THE ENGLISH LANGUAGE TEACHING PROFESSION

Mohammed Saad Mizal, Asst. Prof. Dr. Bushara Saadoon Mohammed Al-Noori

23-37

The capability to think creatively is essential for human source competencies so that to boost universal competitiveness. Creative thinking is one of the utmost assets in the capab...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.004


GAINFULLY USING MACHINE LEARNING ALGORITHM IN ENHANCING THE EFFICACY OF EVALUATING MALWARE DETECTION SYSTEM

Rishit Garkhel

38-46

The malware is an executable program that is very dangerous for pc or laptops. Some malware examples are adware, ransomware, bot, keyloggers, viruses, trojan horses etc. The aggre...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.005


AN IN-DEPTH ANALYSIS OF THE BIOMETRIC AUTHENTICATION CLASSIFICATION

Ram Khanna

47-51

Out of the numerous confirmations conspires in this paper, we are attempting to focus on the exhibition and grouping of one of the validation strategies, biometric verification. Ev...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.006


EMPLOYABILITY OF THE USER OPINION IN DEVELOPING A PRODUCT RECOMMENDER SYSTEM

Armaan Jain

52-57

The development of the Internet has helped E-Commerce (web-based shopping). These days, web-based shopping is exceptionally famous with the increasing number of people associated ...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.007


EMPLOYABILITY OF DATA MINING TOOLS AND TECHNIQUES TO ENHANCE THE DISCOVERY PROSPECTS OF QUALITATIVE KNOWLEDGE

Shourya Gupta

What's going on with all the energy? Information mining and information extraction have been drawing in many examinations, industry, and media considerations of late. This article ...

View Paper Download PDF

http://doi.org/10.37648/ijrst.v10i03.008