Notice Board :

Call for Paper
Vol. 5 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 30, 2018

Publication Date:
June 04, 2018
                         Notice Board: Call for PaperVol. 5 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 30, 2018      Publication Date: June 04, 2018




Volume V Issue III

Author Name
Srashtika Gupta, Mr. Mubeen Khan
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 3
Abstract
Cloud computing is a popular subject across the IT industry, but risks associated with this new technology and delivery model is not yet well understood. Because of the attractive features of cloud computing many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using clients as and when required. This technology provides services with one of the three service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). This model allows users and organizations to share their vital information, crucial computing resources across the world. Securing these essential resources from the unauthorized access of the users is one of the major issues which leads to reduce the growth of this technology in the Information Technology (IT) Industries.
PaperID
2018/IJTRM/3/2018/11649

Author Name
Heena Ansari, Prof. Abhishek Raghuwanshi
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 3
Abstract
The data mining and their different applications are becomes more popular now in these days a number of large and small scale applications are developed with the help of data mining techniques i.e. predictors, regulators, weather forecasting systems and business intelligence. There are two kinds of model are available for namely supervised and unsupervised. The performance and accuracy of the supervised data mining techniques are higher as compared to unsupervised techniques therefore in sensitive applications the supervised techniques are used for prediction and classification. This paper presents a high utility item set mining technique. In this technique, the useless patterns are removed at the initial stage of mining. So it is helping in getting less time consumption.
PaperID
2018/IJTRM/3/2018/11653

Author Name
Kuntal Barua, Prasun Chakrabarti, Avinash Panwar, Amrit Ghosh
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 3
Abstract
Critical thinking has been a controversial issue among philosophers, researchers and educationalists, although there is no general consensus on a definition. Everyone thinks; it is our nature to do so. But much of our thinking, left to it-self, is biased, distorted, partial, uninformed or down-right prejudiced. Yet the quality of our life and that of what we produce, make, or build depends precisely on the quality of our thought. Excellence in thought, however, must be systematically cultivated. Critical thinking is that mode of thinking - about any subject, content, or problem - in which the thinker improves the quality of his or her thinking by skillfully taking charge of the structures inherent in thinking and imposing intellectual standards upon them. Critical thinking is not a matter of accumulating information.
PaperID
2018/IJTRM/3/2018/11678

Author Name
Deepali Simaiya, Rajkumar Paul
Year Of Publication
2018
Volume and Issue
Volume 5 Issue 3
Abstract
It is a process of distributing the total load among the system to improve system performance when there is a condition arrive Cloud Computing is the technique of dynamic virtual provisioning of computing resources like processing power, storage, networking and Information Technology infrastructure through the Internet on pay per use basis from service providers. Customers can request for resources on the cloud from anywhere on the planet, by sending request through Internet to cloud service provider. Cloud Computing uses the concept of the virtual machines and store data on virtual machines, instead of physical machines.
PaperID
2018/IJTRM/3/2018/11718