Dahlia Asyiqin Ahmad Zainaddin and Zurina Mohd Hanapi, Hybrid of Fuzzy Clustering Neural Network over Nsl Dataset for Intrusion Detection System, Journal of ComputerScience, Volume 9, No. 3, pp. 12-44, 2013.  Ashwani Kumar Kushwaha, SwetaBhattachrya, “Crop yield Prediction using Agro Algorithm in Hadoop”, published in InternationalJournal of ComputerScience and Information Technology & Security (IJCSITS), Vol. 5, No2, April 2015.
Astonishing progresses in the domain of medical science and technology that our generation uses in the recent years have been possible, predominantly due to the amalgamation of medical science and technology. But when it comes to pregnancy and childbirth are normal events in the life of a woman. Though most pregnancies result in normal birth, it is estimated that about 15% may develop complications, which cannot be predicted. Some of these may be life threatening for the mother and/or her baby. Every minute, at least one woman dies from complications related to pregnancy or childbirth. And for every woman who dies in childbirth, approximately 20 more suffer injury, infection, or disease—nearly 10 million each year  . Ministry of health & family welfare has many programs for pregnant women & they offer free medical services, tests, medicines & care provided at primary health centers (PHCs) & dispensaries situated in remote villages & even at pregnant mother’s residence. Integrating IoT with process of ante natal check-up provides promising possibilities to reduce infant mortality rates (IMR). Using IoT enabled devices doctors & auxiliary nurse midwife can monitor the vitals of mothers, raise appropriate alerts when necessary, and serve as a repository of information on pregnancy  .
Abstract: The project entitled “Cibil Registry” is developed using PHP as Front End and My SQL as Back End. The ideal structure of online Aadhaar card, Pan Card, Ration Card and loan registration provides security to the passports to be registered in online with all the details in an efficient and easy manner. A person identification is a document, issued by a Central or state government. This certifies, for the purpose of voting, bank account opening, Income tax Submission and international travel, the identity and nationality of its holder. The Elements of identity are name, date of birth sex and place of birth most often, nationality and citizenship are congruent. A passport does not of itself entitle the passport holder entry into another country, nor to consular protection while abroad or any other privileges it does. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach.
Computer-Based Trainings (CBTs) are self-paced learning activities accessible via a computer or handheld device. CBTs typically present content in a linear fashion, much like reading an online book or manual. For this reason they are often used to teach static processes, such as using software or completing mathematical equations. The term Computer- Based Training is often used interchangeably with Web-based training (WBT) with the primary difference being the delivery method. Where CBTs are typically delivered via CDROM, WBTs are delivered via the Internet using a web browser. Assessing learning in a CBT usually comes in the form of multiple-choice questions, or other assessments that can be easily scored by a computer such as drag-and- drop, radial button, simulation or other interactive means. Assessments are easily scored and recorded via online software, providing immediate end-user feedback and completion status. Users are often able to print completion records in the form of certificates.
There is scope for future development of this project. The world of computer fields is not static; it is always subject to be dynamic. The technology which is famous today becomes outdated the very next day. To keep abstract of technical improvements, the system may be further refined. So, it is not concluded. Yet it will improve with further enhancements.
The existing system is purely manual system. Daily reports as well as transactions are maintained manually through ledgers. Calls and feedback and other report entries are entered manually in day books. Extensive amount of records has to be maintained to get a detailed vision on the reports. It takes lot of time for recording data. Paper work on the other hand is a cumbersome process. There are chances for errors and also updating of data is difficult. In order to overcome these problems, go for computerization. After carrying a small research, computer application voluminous data, multiple users and information requirements.
Jimoh E. Okoh is a post graduate student of the Changchun University of Science and Technology, China. He graduated from the University of Benin, Nigeria where he majored in Electrical/ Electronic engineering and thereafter went after his passion in Computerscience. He has several published softwares and apps to his credit. Current research areas include software engineering, cloud computing and machine learning algorithm
M-commerce security could be a terribly crucial issue that desires any analysis to introduce economical and effective solutions. During this article, varied security consideration was expounded. There are potential benefits, particularly one employed in devices with restricted process capability and memory. It‟s calculable that international market on m business can bit two hundred billion USD by 2009 with a hundred thirty million users conducting fourteen billion m commerce operations. Day by day M-commerce taking part in excellent role in on-line retail selling and peoples victimization this technology day by day everywhere the planet. There are already many existing M-commerce application and services these days that are terribly useful to North American nation. Some are mobile banking, location maps, and kind of news, mobile looking, ticketing and mobile file sharing. Mobile devices are proving to be the foremost compact technological aid of the long run, set to overtake PCs and laptops. Use of mobile handsets as a payments device is already well established in Europe and therefore the leading Asia Pacific markets e.g. virtually 1,000,000 Koreans currently do their banking via 4G cell phones (CNN report). The geographical area region could be a focus for on-line and M-commerce businesses as well as major app store and content supplier. It‟s home to a number of the quickest growing smartphone markets worldwide, with smartphone user expected to achieve 2.87 billion by 2020. There ought to be taken necessary steps to incorporate these protein like wireless network technology, building of infrastructure to web property, provide correct awareness of web, aware additional and more peoples concerning the uses and security of M commerce applications by the govt. of India. The subsequent area's wherever government ought to take necessary action for improvement - Smartphone, Payment ways, Network affiliation, Security elements, Government policies etc.
Effectively resolving the apartment issues is important to the buyer's long-term future, the Home Rental Project will be an important tool for creating rental housing stability by helping tenants speak with greater credibility through initiating and documenting communications and building productive relationships with sellers. Home Rental project provides buyers of specific housing associations and social sellers InternationalJournal of Pure and Applied Mathematics Special Issue 1681 with a simple way to report and arrange repairs to properties. Finally, the goal of the project is to create a better relationship between tenants and a sellers which can be achieved through this project.
 Bilal Zahran Belal Ayyoub, Jihad Nader, Ziad Al-Qadi, Suggested Method to Create Color Image Features Victor, Journal of Engineering and Applied Sciences, v. 14, issue 1, pp. 2203-2207, 2019.  A Waheeb, Ziad AlQadi, Gray image reconstruction, Eur. J. Sci. Res, v. 17, pp. 167-173, 2009.  Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh, Enhancing the Capacity of LSB Method by Introducing LSB2Z Method, IJCSMC, v. 8. Issue 3, pp. 76 – 90, 2019.
subay düĢ qurtar iĢlҽt lap A lot of words entered to both languages from Arabic and Persian which have same meanings. Since 1929 for Neighbors’ Turkish languages and since 1928 for Turkish a lot of foreign words have been entered mostly for new equipment and science for Neighbors’ Turkish languages foreign words and for Turkish English; Italian words. 3.3 SENTENCES In both of languages making sentences mostly are same the place of verbs nouns adverbs etc. By applying the above rules we can get the acceptable result. In following examples only we use the words started with the character “I”:Istifa ibraz iblis icraya ihtimal ihtiyaç ihdas ihya icat ihtilaf ihtar iddia irsı izdiham iskelet iskele islam isim ismet ishal iĢtah iĢgal isabet israr ıstılahıslah ıslahat itaat iade itibar itiraz itimat itina idam iftar ikamet iktidar iktisat ıtiraf iklim imam imtihan imza imkan imla intihar intikam incir insan insaf inkar icap icat ihanet.In following examples only we use the words started with the character “b”:Bağ dahçe bahçivan bakla baklava balans bamya bahis buhar baht bahtiyar bedel beden basıret batın bazı bazen bakkal bohça bakiye bela bülbül büluğ bend bünye bahar bahane bühtan basiret beyit bayat biçare bel beyhude. Here we try to give more explanations suppose The number of characters in one word is equal to n The number of rules apply at same time is equal to m If the word has any characters like “ q”, ” x”, ” ҽ” which does not exist in Turkish the word called xw words. If the word has not any characters like “q”,” x”, ҽ” which does not exist in Turkish the word called yw words. q Is constant value related to xw and yw such that almost q yw =1.5*q xw Then easily
According to the Research Program for International Student Assessment (PISA) on 2015, Indonesia is ranked 63th from countries in the world, it shows that the development of education is currently progressing significantly. But the development and growth must still be followed by a supervisory function . Educational institutions are responsible for learning activities both academically and non-academically . In terms of carrying out the duties and functions carried out only can be monitored by two parties, namely related institutions and parents. One of the factors as a reference for monitoring is attendance.