Vol. 8, No. 5 August 2019
Table of Contents
Accepted Refereed Research Articles
| A Biometric Approach on Voting System in India | |
| Kanimozhi and Dr. K. Thangadurai | 1-7 |
| FOPID Controlled SLQZSI fed IM Drive with Enhanced Response | |
| V. Malathi and D. Vijayakumar | 8-15 |
| A Hybrid Approach for Mining High Utility Rare Itemsets Over Uncertain Database | |
| Shalini Zanzote Ninoria and S. S. Thakur | 16-25 |
| Rice Quality Evaluation Based on Image Processing: A Survey | |
| Prabira Kumar Sethy, Santi Kumari Behera, Soubhagyalina Dash and Abhishek Pattnaik | 26-34 |
| Ensemble Application of Devoted Convolutional Neural Network Based Sentenc-Level Sentiment Analysis for Big Data | |
| K. Deepa and Dr. E. Kirubakaran | 35-41 |
| Fraud Detection of Credit Cards Using ABC Methodology Based on SVM Algorithm | |
| T. Pavithra and Dr. K. Thangadurai | 42-49 |
| Junctionless Transistors for Future Applications | |
| Pratishtha Agnihotri and Nishant Tripathi | 50-53 |
| JGIS Based DSS Model for Business Site Selection | |
| Arunendra Singh, Richa Singh and Pronaya Bhattacharya | 54-59 |
| Analytical Comparison of Image Imperfections and Image Filtering Model in the Context of Guassian and Non-Guassian Noise Approach | |
| Nishant Tripathi and Utkarsh Pandey | 60-66 |
| Scalable Learning for Identifying and Ranking Prevalent News Topics Using Social Media Factors | |
| R. Logeswari and Dr. A. Vinayagam | 67-71 |
| Behavior of Artificial Bacteria | |
| K. Vijayakumari and Dr. V. Baby Deepa | 72-75 |
| Effective DDOS Attack Detection with Input Data to Different Customer and Multi Personal Model | |
| R. Nandhini and Dr. A. Banumathi | 76-81 |

