MI Journal
Typically replies within an hour

MI Journal
Hi there

How can I help you?
Chat with Us
TAIU Journals
Paper Template

Vol. 5, Jan-Dec 2019

PIONEERING WAYS OF FINANCING EDUCATION

Dr. Radhika Kapur Page: 001-008

. Download PDF

In the present existence, the individuals, belonging to all categories and backgrounds have recognized the significance of education. But financing education is regarded as one of the major problems, particularly regarding the deprived, marginalized and economically weaker sections of the society. When the individuals are engaged in minority jobs and experience financial problems, then they certainly face barriers in meeting financial requirements of education. On the other hand, individuals engaged in well-paid and reputed employment opportunities do not experience problems and challenges in financing education for their children. It is vital for the individuals to generate awareness in terms of measures and strategies that can be put into operation in an effective manner for financing education. The main aspects that have been taken into account in this research paper are, the structure of education in India, the significance of financial education, ways of financing education, and factors identifying the needs for pioneering financing for education.

DEVELOPMENT OF MANAGEMENT SKILLS AMONG STUDENTS

Dr. Radhika Kapur Page: 009-018

. Download PDF

The main objective of this research paper is to acquire an understanding of development of management skills among students. The primary objective of educational institutions is to lead to effective growth and development of students. After the completion of their education, they should turn out to be effectual citizens of the country and render useful and valuable contribution towards the achievement of personal and professional goals. Hence, to fulfil the desired goals and objectives, it is crucial to impart management skills to students. In educational institutions, apart from making provision of academic knowledge among students, it is vital for the educators to impart management skills among students as well. In order to impart management skills, it is necessary to make provision of theoretical as well as practical knowledge. The opportunities should be made available for the students that would enable them to enrich their management skills. The main areas that have been taken into account in this research paper include, significance of management skills, role of educational institutions and educators, responsibilities of the students, responsibilities of the parents and management skills.

A NEW PROPOSED ELEMENTARY PROOF OF THE PI THAT 7 IS PI EXACT VALUE

Ekta Singh Page: 019-023

. Download PDF

The number Pi is a mathematical constant commonly approximated as 3.14159. This paper is important because without a computer this can be sort of difficult to calculate very far to calculate Pi value. Computers are failed because of wrong commands. It is so simple idea through the Limits is used to know the behaviors of function. A calculus is solving the Pi value by the principles of Derivatives. The number Pi is a mathematical constant, the ratio of a circle’s circumference to its diameter. Although most people think that Pi is relegated to just geometry and trigonometry, the number pervades all of mathematics and the natural sciences, even statistics. The web offers replica omega best quality hublot fake watches US for both men and women.
UK perfect replica rolex watches at affordable prices have everything that one expects to find.

MACHINE LEARNING: DEVELOPING A FRAMEWORK FOR MAMOGRAM IMAGE CLASSIFICATION IN THE EARLY DETECTION OF BREAST CANCER

Saumya Shikhar Raj Page: 024-029

. Download PDF

Objective: To make an early diagnosis of breast cancer from a mammogram image. Methods/Statistical analysis: To avoid the misdiagnosis, we proposed a system to sort the suspicious masses from the mammogram image by using an extreme learning machine algorithm. The ELM based classifier is used to classify the input data as malignant and benign classes with the abnormal class. The effectiveness of the ELM algorithm is superior to the other existing algorithms for mammogram classification problems with its reduced training time and classification accuracy. Findings: We provide an optimistic method for binary class classification of mammograms using extreme learning machine algorithms. Mammography is a technique that is preferred for the early diagnosis of breast cancer. On the other hand, in most cases, it is not easy to differentiate benign and malignant tumors without biopsy; hence, misdiagnosis is always possible. The machine learning algorithm provides high accuracy than other techniques, and also the execution time is very low when compared to normal diagnosis. The existing methods are very slow compared to this proposed technique. The input images are the mammogram image and the segmentation, and pre-processing is performed to remove the noises present. Application/Improvements: The main application of the system is the early diagnosis of cancerous cells present and also classifies the normal and abnormal images.

AN ANALYSIS OF THE HANDWRITING RECOGNITION TECHNIQUES TO DEVELOP A FRAMEWORK FOR THE EMPLOYABILITY OF MACHINE LEARNING IN ENHANCING ITS EFFECTIVE ITS EFFECTIVENESS

Raghav Mittal Page: 030-034

. Download PDF

The handwritten character recognition, commonly known as OCR is an important technique to detect character from images. In OCR, the image is converted to an editable form after extracting characters from digital images. It has a high demand in banks and other offices to detect and recognize words. A neural network is being used by HCR using soft computing. Feature extraction techniques have been applied to detect English characters. We are using a diagonal based feature extraction technique in two different datasets. The First one is its own database of English alphabets, ten numbers, and 5-6 special characters, which is written by different peoples, and another dataset is the CEDAR Database. The character detection is carried out by KNN and LVQ. Finally, in output, we fill find that KNN is much better than LVQ.

EMPLOYABILITY OF BAYESIAN TECHNIQUES IN CLASSIFYING SPAM E-MAILS TO MITIGATE THE DATA VULNERABILITY IN E-MAIL COMMUNICATIONS FORMATS

Atul Kalkhanda Page: 035-041

. Download PDF

Email (Electronic mail) have become commonplace in today’s context- there is a great degree of vulnerability in the systems where the security features are violated using the email communication. This leads to spam email exploitation by advertises. After theft of personal information using tracker/cookies to identify one’s interest and targets them with advertisements of related subjects. In order to have secure e-mail transactions, a classification of mails based on the information shared and compromised can be attempted as a ‘safeguard’ using Bayesian techniques.

DEVELOPING A MEDICAL IMAGING APPLICATION FRAMEWORK IN THE EARLY DETECTION DIAGNOSIS AND MANAGEMENT OF ALL (ACUTE LYMPHOBLASTIC LEUKAEMIA

Amardeep Chahal Page: 042-048

. Download PDF

Medical imaging has become one of the most significant conceptions and explanation methods in ecology and medicine over the previous decade. This time has perceived the incredible expansion of new, prevailing apparatuses for detecting, packing, conducting, analyzing, and exhibiting medical images. This has led to enormous growth in the application of digital image dispensation techniques for cracking medical difficulties. Leukemia is a dynamic, threatening illness of the blood framing organs, set apart by twisted expansion and improvement of leukocytes and their forerunners in the blood and bone marrow. In this paper, we examine about leukemia sorts of leukemia and how to identifying apply different calculations like ANN, LDA (Linear Dependent Analysis)

ATTEMPTING OF BRAIN TUMOR CLASSIFICATION ON DENSE NET AND RECURRENT NEURAL NETWORK FRAMENTS

Sachin Gautam Page: 049-057

. Download PDF

We present a comprehensive Braintumors screening and arrangement strategy for identifying and recognizing different kinds of cerebrum tumors on MR pictures. The difficulties emerge from the unique varieties of area, shape, size, and complexity of these tumors. The proposed calculations begin with highlight extraction from pivotal cuts utilizing thick convolutional neural systems; the acquired following highlights of many edges are then bolstered into a broken neural network for grouping. Unique concerning most other cerebrum tumor grouping calculations, our structure is free from the manual or programmed locale of interests division. The outcomes gave an account of an open dataset, and a populace of 422 exclusive MRI checks analyzed as should be expected, gliomas, meningiomas, and metastatic cerebrum tumors exhibit the adequacy and effectiveness of our technique.

DEVELOPING AN INTEGRATED MODEL OF CLINICAL DECISION SUPPORT SYSTEM FOR THE EARLY DETECTION OF CORONARY HEART DISEASES

Jenifer Ghai Page: 058-069

. Download PDF

Objectives: This study aims to propose a model of coronary heart disease assessment system based on risk factors. Methods/Statistical Analysis: To achieve these objectives, the model proposed system comprises several processes. First, the dimension reduction using principle component analysis (PCA). Second, classification using support vector machine. Third, validate using 10-fold cross validation in the process of training and testing. Training and testing using patient data from the Hospital Dr. Moewardi Solo Indonesia, which amounted to 120 with 12 attributes. Fourth, the system performance is measured using several parameters, namely sensitivity, specificity, area under the curve, positive prediction value, negative prediction value and accuracy. Findings: Tests on the proposed system, to process the dimensional reduction by PCA, which is followed by the method of orthogonal rotation with verimax, resulting nine attributes of the 12 attributes of risk factors. Attribute are obtained by using the variance of data from the PCA process of 71.1908%. Attribute risk factors rotation outcome is age, gender, occupation rate, total cholesterol, low density lipoprotein, triglycerides, systolic and diastolic blood pressure and smoking. System performance prediction is generated for parameter sensitivity 84.20%, specificity 69.09%, accuracy 78.61%, positive prediction value 82.53%, negative prediction value 71.70% and the area under the curve 76.64%. Applications/Improvements: System model of clinical decision support system for the assessment of coronary heart disease based on risk factors can be used by clinicians, as support in making clinical decisions. The proposed system provides the performance of the medium category.

DEVELOPING LIGHTWEIGHT CRYPTOGRAPHIC SOLUTIONS FOR A TARGETED OPTIMIZATION OF INTERNET OF THINGS

Hardik Chaudhary Page: 070-076

. Download PDF

IoT empowers physical things to convey, figure and make choices dependent on any system action. This requires a safe answer for correspondence among heterogeneous gadgets. With the improvement in Information and Communication Technology (ICT), an interesting effect of keen things is seen in our regular day to day existence. IoT can consider clients that associate in heterogeneous conditions. In heterogeneous condition thought process of every client in IoT can be distinctive in type of correspondence and calculation and is hard to be judged. A malevolent client can decimate the security and protection of the system. This examination gives a nitty-gritty investigation of existing security answers for IoT. Right off the bat, a correlation of lightweight cryptography calculations is made on the premise of square size, key size, number of rounds, and plausible assaults. Afterward, the different security issues in IoT are talked about alongside conceivable arrangement. Security arrangements in IoT will improve the trust over IoT. A safe arrangement that will require less computational power and is less defenceless against existing assaults is wanted.

ANALYSIS OF PICTURE SEGMENTATION USING FUZY C-MEANS (FCM) OPTIMISED BY QUANTUM IMMUNE CLONE ALGORITHM IN ENHANCING IMAGE PROCESSING OUTCOMES

Aryaman Chopra Page: 077-081

. Download PDF

The image blend framework is starting late a topic of taking care of. The technique wherein mixing accurate data from different pictures to a single picture, which results in a consolidated picture and progressively exact yield, is called picture blend. Multi focus picture mix is the strategy for mixing a couple of images of a view, and along these lines in a view to shaping an image, lifting grants snappier utilization of DWT.

EMPLOYABILITY OF QUANTUM CRYPTOGRAPHY FOR EFFECTIVE EINSTEIN, PODOLSK, AND ROSEN (EPR) CONVENTION AND PROTOCOL USAGE IN ENHANCING IDENTITY AND ALLIED SECURITY SAFEGUARDS

Hardik Chaudhary, Vipul Goyal Page: 082-091

. Download PDF

Secure communication between two parties nowadays is very challenging. Whether it is file sharing, normal chat, or voice over call, these are not very secure. It gets easily hacked by hackers in many ways. To overcome these problems, Quantum cryptography provides a technique that polarizes the property and ensures data protection and prevents distribution. QKD protocol, which provides 25% and 50% efficiency, respectively, is not enough for data security over the network. In our proposed technique, we will provide a mechanism that enhances data security by increasing the size of the shared key up to 75% during information exchange. The character confirmation system attempts to give the most extreme accomplishment to the clarification of Quantum key dispersion's EPR convention is given. Utilizing the EPR strategy, Alice and Bob could conceivably store the readied trapped particles and afterward measure them and make the key just going to utilize it, dispensing with the issue of shaky stockpiling. In the next stage, the proposed instrument is portrayed. The proposed system joins the EPR convention at two phases, (1) from sender to recipient and afterward (2) from the beneficiary to the sender. Multiplying the EPR convention improves data compromise just as protection intensification. In the future, the proposed component will be valuable, where a huge amount of security is required during key and data sharing.

EMPLOYABILITY OF THE TEXT MINING TOOLS FOR SENTIMENT ANALYSIS FROM SOCIAL MEDIA NETWORK

Aditya Goel 26/10/2019 Page: 092-097

. Download PDF

Twitter is a blogging site where the user posts a message, called tweets. Tweets can contain sentiment, opinion, or feeling of something. This opinion or sentiment can be used in many areas of research like, know about the product, or the government. In this paper, we will research about the feeling of the tweets and we tend to present a technique that performs the task of analysing a tweet sentiment. We also tend to give a number to the words which match to datasets words based on occurrences-positive will get one, and negative will get 0. After analysing, we get a success ratio of 87% in the Stanford dataset.

APPLICABILITY OF APACHE HIVE IN ENHANCING THE ACCURACY AND AUTHENTICITY OF STOCK MARKET DATA ANALYSIS

Mohika Nagpal 15/10/2018 Page: 098-101

. Download PDF

Securities exchange is the budgetary ground on which the high measure of information is delivered at every purpose of time, which is perplexing and nonlinear. These informational indexes are utilized to foresee high benefits and dangers. That a client can have in putting resources into an organization. To expect such an examination, there ought to be adjoining the precise outcome, which is one of the urgent difficulties. In this paper, the objective is to gauge the expectation. through breaking down the stock information for those customers who are keen on putting resources into an organization which is finished Using Big Data innovation utilizing Hadoop, HDFS, Map Reduce, Sqoop, and Hive. This is a cycle of money-related. Dynamic for speculations. This model will assist the investors in knowing the current situation of any Organization and the market.

LEVERAGING NEURAL NETWORK AND DATA MINING TO ENHANCE THE ANALYSIS OF REFLECTIVITY

Rahul Ohlan 28/10/2019 Page: 102-108

. Download PDF

The point of this work is to show the investigation of the information estimated by climate radar utilized in information mining and fluffy rationale. An unraveling of the information estimated by the meteorological radar was made, which was scrambled; at that point, an examination of this information was made utilizing neural organizations that are prepared with 10 and 20 neurons. For each situation, the adequacy of everyone is checked. The outcomes indicated that neural organizations are a brilliant instrument that permits wipe out incorrect data and afterward standardize it to the scale utilized by the norm. This information is necessary for the aeronautics business to work appropriately. Without hazards for travelers, teams, and airplanes, it is likewise imperative to envision as well as keep away from, if potential, disasters created by climate occasions identified with precipitation.

EVALUATING THE PRIORITY ACCORDED TO BIODIVERSITY BY THE FORTUNE 500 COMPANIES AND COMMENSURATE IMPACT ON ENVIRONMENTAL PROTECTION POLICIES

Anshika Arshia Chadha 10/10/2019 Page: 109-116

. Download PDF

Since the commencement of the UN Convention on Biological Diversity (CBD) in 1992, little advancement has been accomplished as far as including the business local area in ensuring natural variety around the world. As indicated by the CBD, biodiversity alludes to 'the inconstancy among living organic entities from all sources including, entomb alia, earthbound, marine and other amphibian environments and the natural edifices of which they are part; this incorporates variety inside species, among species and of environments' (Article 2, Convention on Biological Diversity). In any event, for directing speculation, the biodiversity show is per-haps the least explicitly prescriptive worldwide natural show (Moran et al. 1996). A wide hole actually exists between the activities initiating environmental change and the preservation of biological system and natural variety (Heller and Zavaleta 2009). Up to this point, endeavors have been made chiefly by the noncommercial area including non-administrative associations (NGOs). Most global subsidizing for biodiversity protection is gotten from big time salary nations' Overseas Development Assistance (ODA). All market-based instruments, including eco-the travel industry, harmless to the ecosystem items advertising, and installments for biological system administrations (PES), give roughly 1–2 billion USD per annum (Gutman and Davidson 2007). This is significantly inadequate to meet the current necessities. Most assets are utilized for biodiversity and biological system administration related scholarly work and for a couple of showing projects that limitedly affect the ground (Gutman and Davidson 2007).

A BIBLIOGRAPHICAL APPROACH TO STEINBECK’S NOVELS

Dr. Dhananjay Kumar Singh Page: 117-121
[This paper was removed because of plagiarism]

.

CAREER WOMAN’S PREDICAMENT IN SHASHI DESHPANDE’S THE DARK HOLDS NO TERRORS

Dr Deepak Upadhyay 12/10/2019 Page: 122-126

. Download PDF

Shashi Deshpande is an eminent and distinguished novelist in contemporary Indian English fiction. She is a highly woman-conscious writer who has presented through her literary ventures a truthful account of the Indian woman placed in a male dominated Indian society. She has explored and analysed the emotional world of women with great insight and perception. She admits that she is able to sympathise better with women, and, therefore, her protagonists are mostly women. She says that her writing is born out of her personal experiences, and, hence, she has been able to raise women’s cause more sincerely and efficaciously. In almost all her novels she lays bare the wounded psyche of women and provides a peep in their innermost feelings and complexities which they go through in the patriarchal set up. The Dark Holds No Terrors is a novel that explores the myth of male superiority and ego. It also depicts how the women undergo a humiliating and disgusting treatment in the society which is unconcerned and unmindful of their lot. The protagonist, Saru, in the novel, is a ‘new woman’ who denies succumbing and surrendering and her unyielding will be her strength, howsoever, big the challenge is. This paper will endeavour to see how her struggle symbolizes a wish, a desire to be a whole human being. Her quest for identity and self-expression cannot be limited to her alone, but it transgresses the boundaries and barriers and she becomes a voice of every awakened and liberated woman.

SOCIAL PROBLEMS IN THE FICTION OF KAMTANATH

Prof Anju Dubey, Kr Brijesh 14/10/2019 Page: 127-133

. Download PDF

VIEW OF FAMILY AND EXTRA-FAMILY RELATIONS IN POST-INDEPENDENCE HINDI STORY

Dr. Vineeta Rani 25/10/2019 Page: 134-145

. Download PDF

The post-independence stories present self-conflict and dramatic tension. In this decade, apart from the stories of rural areas, stories of towns and cities were also written. The names of Shiv Pratap Singh, Markandeya, Nagarjuna, Rajendra Awasthi and Phanishwar Nath "Renu" are main among regional storytellers. Shiv Pratap Singh's "Aarpar Ki Mala", "Murda Sarai" etc. are major story collections. Bhishma Sahni, Shailesh Matiani, Shekhar Joshi, Rangheya Raghav, Madhukar Gangadhar and Shani etc come at this turn of the tradition. The elements of realism, modernity and struggle are visible in his stories. New storytellers have seen the disintegrated man in the middle of the agony of metropolitan life from different points of view, while the old story reflects the clear influence of Gandhian philosophy of life. The connectivity of a new story is found in new images, new metaphors, new signs and new symbols. In old stories, these elements are used only in name, such as Kamleshwar's "Naagmani" and Bhishma Sahni's "Vad-Chu" stories.

A COMPREHENSIVE ANALYSIS OF CRYPTO CURRENCIES AS AN ASSET – THE KEY DRIVERS AND THEIR INFLUENCE ON THE WORTH OF CRYPTO CURRENCIES

Kanishka Kashyap 29/10/2019 Page: 146-151

. Download PDF

Nowadays, Cryptocurrencies are very famous and are considered digital assets stored in a public ledger format on a computerized database with strong cryptography techniques or blockchains to protect the transaction record. It has recently attracted a significant number of holders. Because cryptocurrencies are based on brand-new technology with an unknown future, numerous academic studies have been conducted to develop theoretical models of cryptocurrencies and their potential future. Because they account for a significant portion of the cryptocurrency market capitalization—roughly 83.4% of the total market—we have considered the most prominent cryptocurrencies in this investigation—namely Bitcoin, Ethereum, Ripple, and Litecoin. The study aims to determine whether there is a significant correlation between the prices of Bitcoin, Ethereum, Litecoin, and Ripple cryptocurrencies, as well as whether there is a significant correlation between the Bitcoin cryptocurrency pricing and the prices of Ethereum, Litecoin, and Ripple cryptocurrencies.

INTELLECTUAL PROPERTY RIGHTS IN INDIAN CONTEXT

Dr Pulapalli Venkataramana 30/10/2019 Page: 152-154

. Download PDF

The paper makes a brief survey of the Intellectual property rights that are classified under the Agreement on Trade Related Intellectual Property Rights (TRIPs) of WTO. The objectives of the chapter include explaining the nature and scope of Intellectual Property Rights, dispute settlement mechanism in WTO and describing the changes brought out in the legal framework of India in consonance with the provisions of TRIPs agreement. The chapter also explains the structural and Institutional arrangements made in India for protection of Intellectual Property Rights. The chapter discusses context of the agreement in which Traditional knowledge systems of biological diversity are valued in making legislations.