DOI: https://doi.org/10.26483/ijarcs.v9i2

Published: 2018-04-20

DOI: https://doi.org/10.26483/ijarcs.v9i2.5422

A NOVEL ALGORITHM FOR INFORMATION HIDING

Mahimn Bhupendrabhai Pandya, Ashish N Jani

7-10

DOI: https://doi.org/10.26483/ijarcs.v9i2.5489
DOI: https://doi.org/10.26483/ijarcs.v9i2.5506
DOI: https://doi.org/10.26483/ijarcs.v9i2.5369

SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK

Sudipta Majumder, Ratnadeep Nath, Aminullah Laskar, Bishal Saha

19-20

DOI: https://doi.org/10.26483/ijarcs.v9i2.5534
DOI: https://doi.org/10.26483/ijarcs.v9i2.5570

SOLAR POWER ANALYZER: A PHYSICAL AND CYBER SYSTEM FOR SOLAR ENERGY COMPUTATION

MANOJ CHANDAK, Anshika Choudhary, Nishant Khanorkar, Tanmayee Joglekar, Purvesh Baghele, Rushali Sindurkar

28-34

DOI: https://doi.org/10.26483/ijarcs.v9i2.5230
DOI: https://doi.org/10.26483/ijarcs.v9i2.5425
DOI: https://doi.org/10.26483/ijarcs.v9i2.5535
DOI: https://doi.org/10.26483/ijarcs.v9i2.5463
DOI: https://doi.org/10.26483/ijarcs.v9i2.5587
DOI: https://doi.org/10.26483/ijarcs.v9i2.5523
DOI: https://doi.org/10.26483/ijarcs.v9i2.5547
DOI: https://doi.org/10.26483/ijarcs.v9i2.5557

HANDS ON MEDICATION USING DATA VISUALISATION TOOL

Dr B V Subba Rao, K. Varsha, B. Teepthika, K. Vinay, B.Kiran Sai Varma

80-84

DOI: https://doi.org/10.26483/ijarcs.v9i2.5567
DOI: https://doi.org/10.26483/ijarcs.v9i2.5568

SENTIMENT ANALYSIS ON GST TWEETS

Ekta ., Dr. Kavita Pabreja

89-92

DOI: https://doi.org/10.26483/ijarcs.v9i2.5542
DOI: https://doi.org/10.26483/ijarcs.v9i2.5544
DOI: https://doi.org/10.26483/ijarcs.v9i2.5553

NLP TOOLS USED IN CIVIL AVIATION: A SURVEY

saptarshi paul, Bipul Syam purkaystha, Purnendu Das

109-114

DOI: https://doi.org/10.26483/ijarcs.v9i2.5559

AUTOMATED ASSISTANCE FOR FOUNDATION ENGINEERS(AAFE)

Dharma Reddy Tetali, Pushpa Rani K

115-118

DOI: https://doi.org/10.26483/ijarcs.v9i2.5677
DOI: https://doi.org/10.26483/ijarcs.v9i2.5682

LITERATURE REVIEW ON SECURITY ASPECTS OF IOT

Rohit Malik, Dr. Kamna Solanki, Dr. Sandeep Dalal

123-126

DOI: https://doi.org/10.26483/ijarcs.v9i2.5687
DOI: https://doi.org/10.26483/ijarcs.v9i2.5688

LITERATURE REVIEW ON SECURITY OF IOT

Sombir ., Kamna Solanki

131-134

DOI: https://doi.org/10.26483/ijarcs.v9i2.5689
DOI: https://doi.org/10.26483/ijarcs.v9i2.5353
DOI: https://doi.org/10.26483/ijarcs.v9i2.5564
DOI: https://doi.org/10.26483/ijarcs.v9i2.5685
DOI: https://doi.org/10.26483/ijarcs.v9i2.5660

A NOVELMETAHEURISTIC ALGORITHM BASED ON WAVE FUNCTION

Dr.E.A. Zanaty, Khalid Abdel wahab ali qora

161-163

DOI: https://doi.org/10.26483/ijarcs.v9i2.5678
DOI: https://doi.org/10.26483/ijarcs.v9i2.5684

IAODV: AN IMPROVED AODV ROUTING PROTOCOL FOR MANET

Madhup Shrivastava, Monika Sahu, M A Rizvi, Khaleel Ahmad

167-174

DOI: https://doi.org/10.26483/ijarcs.v9i2.5483
DOI: https://doi.org/10.26483/ijarcs.v9i2.5581

OPINION MINING FOR HOTEL RATING THROUGH REVIEWS USING DECISION TREE CLASSIFICATION METHOD

shelly gupta, Shubhangi Jain, Shivani Gupta, Shruti ., Aakriti Chauhan

180-184

DOI: https://doi.org/10.26483/ijarcs.v9i2.5654

VIDEO FOREGERY DEDUCTION OF INTERFRAME DUPLICATION

Nandhini R, Nasima Begum.M, Mrs.Blessy Selvam M.E.

185-187

DOI: https://doi.org/10.26483/ijarcs.v9i2.5680
DOI: https://doi.org/10.26483/ijarcs.v9i2.5681
DOI: https://doi.org/10.26483/ijarcs.v9i2.5676
DOI: https://doi.org/10.26483/ijarcs.v9i2.5589
DOI: https://doi.org/10.26483/ijarcs.v9i2.5554
DOI: https://doi.org/10.26483/ijarcs.v9i2.5686
DOI: https://doi.org/10.26483/ijarcs.v9i2.5574
DOI: https://doi.org/10.26483/ijarcs.v9i2.5515
DOI: https://doi.org/10.26483/ijarcs.v9i2.5658

LOAD BALANCING TECHNIQUES IN CLOUD COMPUTING

Bharti Tyagi, Dr. Suman Sangwan

228-230

DOI: https://doi.org/10.26483/ijarcs.v9i2.5657
DOI: https://doi.org/10.26483/ijarcs.v9i2.5762

SURVEY OF VARIOUS DATABASES AND ITS APPLICATIONS IN THE REAL WORLD

Rahamathulla Vempalli, GUTTI VISHNU VARDHAN

237-239

DOI: https://doi.org/10.26483/ijarcs.v9i2.5573
DOI: https://doi.org/10.26483/ijarcs.v9i2.5521
DOI: https://doi.org/10.26483/ijarcs.v9i2.5672
DOI: https://doi.org/10.26483/ijarcs.v9i2.5733
DOI: https://doi.org/10.26483/ijarcs.v9i2.5679
DOI: https://doi.org/10.26483/ijarcs.v9i2.5318

A QUALITATIVE ANALYSIS OFWIRELESS ROBOTIC ARMS

Akash Bajoria, Soham Bhatnagar, Jaideep Bhide, Sidhant Birla, Artika Singh

262-266

DOI: https://doi.org/10.26483/ijarcs.v9i2.5512
DOI: https://doi.org/10.26483/ijarcs.v9i2.5556

ENHANCED SECURITY FOR DATA TRANSFER IN CLOUD

S Gurupriya, H. Refana Parveen, R. Aishwarya, J. K. Periasamy

270-273

DOI: https://doi.org/10.26483/ijarcs.v9i2.5569
DOI: https://doi.org/10.26483/ijarcs.v9i2.5667

SECURING SMART HOMES USING FACE RECOGNITION TECHNIQUES

Ishita Tarun kumar, Harshil Kapoor, Yash Kothari, Anuraj Bhatnagar, Payal Mishra

280-283

DOI: https://doi.org/10.26483/ijarcs.v9i2.5717
DOI: https://doi.org/10.26483/ijarcs.v9i2.5669

QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL

KAUSIK SAHA, Sirshendu Sekhar Ghosh, Dilip Kumar Shaw

287-291

DOI: https://doi.org/10.26483/ijarcs.v9i2.5673

AN HIDDEN SECURITY FEATURES FOR THE RECOGNITION OF FAKE CURRENCY

Hari chandana, K. Lavanya, Prof.T.Bhaskara Reddy

292-299

DOI: https://doi.org/10.26483/ijarcs.v9i2.5452
DOI: https://doi.org/10.26483/ijarcs.v9i2.5683
DOI: https://doi.org/10.26483/ijarcs.v9i2.5763
DOI: https://doi.org/10.26483/ijarcs.v9i2.5765

FUZZY THEORY – A SURVEY ON ITS FOUNDATIONS AND ADVANCEMENTS

Saniya Tasleem Zafar, Nafisur Rahman, Safdar Tanweer

314-316

DOI: https://doi.org/10.26483/ijarcs.v9i2.5719

RANDOM SUBSET FEATURE SELECTION FOR CLASSIFICATION

Lakshmi Padmaja Dhyaram, Vishnuvardhan B

317-319

DOI: https://doi.org/10.26483/ijarcs.v9i2.5496
DOI: https://doi.org/10.26483/ijarcs.v9i2.5695
DOI: https://doi.org/10.26483/ijarcs.v9i2.5764
DOI: https://doi.org/10.26483/ijarcs.v9i2.5704

PREDICTION OF FUEL ANALYSIS USING URBAN BIG DATA

R Logeshwari, Divyansh Gautam, Aniruddha Joshi

333-336

DOI: https://doi.org/10.26483/ijarcs.v9i2.5741

NOVEL SECURITY OF HOME USING SMART HOME MANAGEMENT SYSTEM

Brahmendra Golvilkar, Anil Mohite, Akshay gosavi, Prashant Magar, Vedant Pawar, Prachi Shete

337-339

DOI: https://doi.org/10.26483/ijarcs.v9i2.5641

A SURVEY PAPER ON IMPROVING PERFORMANCE AND ENHANCING SECURITY BY USING DIVISION AND REPLICATION OF DATA IN CLOUD

Sumit Sanyal, Osama Razi, Mohsin Raza, Shashi Sourav, Prof. Rachna Somkunwar

340-342

DOI: https://doi.org/10.26483/ijarcs.v9i2.5675

A REVIEW ON SOCIAL MEDIA ANALYSIS: CHALLENGES AND APPLICATION

Shachi Shukla, Seema Narvare, Chetan Agrawal

343-353

DOI: https://doi.org/10.26483/ijarcs.v9i2.5778
DOI: https://doi.org/10.26483/ijarcs.v9i2.5808

COMPARATIVE STUDY OF DIFFERENT ACTION FPS AND PUZZLE GAMES

Priya Vasant Bharambe, Aditi Sharad Patil, Sumit Kumar Sharma, Ichhanshu Jaiswal

357-360

DOI: https://doi.org/10.26483/ijarcs.v9i2.5551

MULTIMODAL BIOMETRIC SYSTEMS: A REVIEW

Aarvi Thadeshwar, Sanyamee Patel, Dhruvi Patel, Ratnesh Chaturvedi

361-365

DOI: https://doi.org/10.26483/ijarcs.v9i2.5742
DOI: https://doi.org/10.26483/ijarcs.v9i2.5755
DOI: https://doi.org/10.26483/ijarcs.v9i2.5766
DOI: https://doi.org/10.26483/ijarcs.v9i2.5668

CLOUD COMPUTING-TECHNOLOGIES

Mohammad Ilyas Malik, Shahid Hussain Wani, Abreen Rashid

379-384

DOI: https://doi.org/10.26483/ijarcs.v9i2.5760

LIST SCHEDULING ALGORITHMS CLASSIFICATION: AN ANALYTICAL STUDY

Akanksha Sarangal, Dr. Nirmal Kaur, Ravreet Kaur

385-389

DOI: https://doi.org/10.26483/ijarcs.v9i2.5835
DOI: https://doi.org/10.26483/ijarcs.v9i2.5836
DOI: https://doi.org/10.26483/ijarcs.v9i2.5837

CLASSIFICATION TECHNIQUES USING SPAM FILTERING EMAIL

P. PRIYATHARSINI, Dr. C. Chandrasekar

402-410

DOI: https://doi.org/10.26483/ijarcs.v9i2.5571
DOI: https://doi.org/10.26483/ijarcs.v9i2.5709
DOI: https://doi.org/10.26483/ijarcs.v9i2.5767

LIGHT FIDELITY: A WAY OF DATA TRANSMISSION

Osheen Sharma, Shruti Dadral

428-430

DOI: https://doi.org/10.26483/ijarcs.v9i2.5804
DOI: https://doi.org/10.26483/ijarcs.v9i2.5848
DOI: https://doi.org/10.26483/ijarcs.v9i2.5849

LITERATURE REVIEW ON SOFTWARE COMPLEXITY, SOFTWARE USABILITY AND SOFTWARE DELIVERABILITY

Mohd Kamran Khan, Mr. Faiyaz Ahmad, Dr. Mohammadi Akheela Khanum

438-441

DOI: https://doi.org/10.26483/ijarcs.v9i2.5853
DOI: https://doi.org/10.26483/ijarcs.v9i2.5644

KEY OPTIMIZATION TECHNIQUE IN MOBILE AD HOC NETWORKS

Shanthi Govindan, M. Ganaga Durga

446-451

DOI: https://doi.org/10.26483/ijarcs.v9i2.5779
DOI: https://doi.org/10.26483/ijarcs.v9i2.5585
DOI: https://doi.org/10.26483/ijarcs.v9i2.5743
DOI: https://doi.org/10.26483/ijarcs.v9i2.5746

GRAPHICAL PASSWORD USING 2D COORDINATES

Purshottam J Assudani, Ashish V. Chandak, Vinisha P. Assudani

467-469

DOI: https://doi.org/10.26483/ijarcs.v9i2.5761
DOI: https://doi.org/10.26483/ijarcs.v9i2.5855
DOI: https://doi.org/10.26483/ijarcs.v9i2.5856
DOI: https://doi.org/10.26483/ijarcs.v9i2.5546
DOI: https://doi.org/10.26483/ijarcs.v9i2.5650
DOI: https://doi.org/10.26483/ijarcs.v9i2.5728
DOI: https://doi.org/10.26483/ijarcs.v9i2.5731

AN ALGORITHM FOR SPEED ESTIMATION AND SPEED VIOLATION DETECTION OF A VEHICLE USING COMPUTER VISION

Nikeshaben Sanjaybhai Patel, Khushali R Raval, Shardul J Agravat

504-507

DOI: https://doi.org/10.26483/ijarcs.v9i2.5737
DOI: https://doi.org/10.26483/ijarcs.v9i2.5758
DOI: https://doi.org/10.26483/ijarcs.v9i2.5769
DOI: https://doi.org/10.26483/ijarcs.v9i2.5806
DOI: https://doi.org/10.26483/ijarcs.v9i2.5868
DOI: https://doi.org/10.26483/ijarcs.v9i2.5866
DOI: https://doi.org/10.26483/ijarcs.v9i2.5485

DUSTBUSTER: AN AUTONOMOUS VACUUM CLEANING ROBOT

Aditya Raaj Badde, Viral Shah, Siddharth Sharma, Abhishek Vichare

533-536

DOI: https://doi.org/10.26483/ijarcs.v9i2.5879

COMPARATIVE STUDY BETWEEN EXISTING CLOUD SERVICE PROVIDERS

Mukesh Dewangan, Dr. Rajesh Keshavrao Deshmukh, Ashutosh Mishra

537-539

DOI: https://doi.org/10.26483/ijarcs.v9i2.5722

DFT BASED DIGITAL IMAGE WATERMARKING: A SURVEY

Ningombam Jimson, K Hemachandran

540-544

DOI: https://doi.org/10.26483/ijarcs.v9i2.5747
DOI: https://doi.org/10.26483/ijarcs.v9i2.5800

ANALYTICAL REVIEW OF LOAD BALANCING TECHNIQUES IN CLOUD COMPUTING

ABHIKRITI NARWAL, Sunita Dhingra, Sunita Dhingra

550-553

DOI: https://doi.org/10.26483/ijarcs.v9i2.5820

MULTIDIMENSIONAL ANALYSIS OF GENETIC ALGORITHM USING MATLAB

Prof Neeraj Bhargava, Dr. Ritu Bhargava, Kapil Chauhan

554-558

DOI: https://doi.org/10.26483/ijarcs.v9i2.5854

THE NEW WAY OF ELECTRICITY IN INDIA (SMART GRID)

Bhoomika Sharma, Satya Narayan Joshi, Prashant Singh

559-563

DOI: https://doi.org/10.26483/ijarcs.v9i2.5867
DOI: https://doi.org/10.26483/ijarcs.v9i2.5869
DOI: https://doi.org/10.26483/ijarcs.v9i2.5872

DIVYANG – A SIGN LANGUAGE RECOGNITION AND CONVERSION SYSTEM

Priyanka Gulia, Krusha Sheth, Jammy Tandel, Avneet Saluja

573-576

DOI: https://doi.org/10.26483/ijarcs.v9i2.5584
DOI: https://doi.org/10.26483/ijarcs.v9i2.5797

MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING – A REVIEW

Tejenderkaur Harlalsingh Sandhu, Abhijit Itkikar

582-584

DOI: https://doi.org/10.26483/ijarcs.v9i2.5799

DETECTION AND CLASSIFICATION OF BRAIN TUMOR USING ML

Avirup Chowdhury, Indrajit Das, Avipsa Roy Chowdhury, Arnab Halder

585-591

DOI: https://doi.org/10.26483/ijarcs.v9i2.5807

FACE DETECTION AND RECOGNITION USING HAAR CLASSIFIER AND LBP HISTOGRAM

Indrajit Das, Indrasom Gangopadhyay, Anulekha Chatterjee

592-598

DOI: https://doi.org/10.26483/ijarcs.v9i2.5815
DOI: https://doi.org/10.26483/ijarcs.v9i2.5818
DOI: https://doi.org/10.26483/ijarcs.v9i2.5831
DOI: https://doi.org/10.26483/ijarcs.v9i2.5882
DOI: https://doi.org/10.26483/ijarcs.v9i2.5883
DOI: https://doi.org/10.26483/ijarcs.v9i2.5861
DOI: https://doi.org/10.26483/ijarcs.v9i2.5881
DOI: https://doi.org/10.26483/ijarcs.v9i2.5549

IMPLEMENTATION OF LEARNING EVALUATING ANALYZING RANKING AND NURTURING TOOL

Dr. santhi P, G. Devaraj Devaraj, B. Guhan, V. Gunaseelan

635-637

DOI: https://doi.org/10.26483/ijarcs.v9i2.5662

CONTENT BASED IMAGE RETRIEVAL USING HYBRID-SVM

Rajneesh Pachauri, Meenakshi Pandey

638-645

DOI: https://doi.org/10.26483/ijarcs.v9i2.5809
DOI: https://doi.org/10.26483/ijarcs.v9i2.5873
DOI: https://doi.org/10.26483/ijarcs.v9i2.5777

The Power of Cloud Computing: Integration and Intelligence

D Venkatesh, Suresh Pabboju, Vijay Kumar Damera

656-662

DOI: https://doi.org/10.26483/ijarcs.v9i2.5896

Efficient Compression of Binarized Tainted Documents

RATNAKUMARI CHALLA, kanusu SRINIVIVASA RAO

663-667

DOI: https://doi.org/10.26483/ijarcs.v9i2.5520
DOI: https://doi.org/10.26483/ijarcs.v9i2.5893

Effect of Texture Feature Combination on Satellite Image Classification

Dr. Mohammed Sahib Mahdi Altaei, Saif Mohammed Ahmed, Dr. Hayder Ayad

675-683

DOI: https://doi.org/10.26483/ijarcs.v9i2.5897
DOI: https://doi.org/10.26483/ijarcs.v9i2.5718

Automated Student Performance Analyser And Recommender

Nisha Maria Arunkumar, Angela Miriam A, Christina J

688-698

DOI: https://doi.org/10.26483/ijarcs.v9i2.5898
DOI: https://doi.org/10.26483/ijarcs.v9i2.5862
DOI: https://doi.org/10.26483/ijarcs.v9i2.5895

THEORETICAL ANSWER EVALUATION USING LSA, BLEU, WMD AND FUZZY LOGIC

Anmol Mishra, Aniket Bharti, Praful Mishra, Sarita Ambadekar

714-717

DOI: https://doi.org/10.26483/ijarcs.v9i2.5783
DOI: https://doi.org/10.26483/ijarcs.v9i2.5900
DOI: https://doi.org/10.26483/ijarcs.v9i2.5901

Evaluation of Drug Addiction Causes in Punjab using Machine Learning

Jaspreet Singh, Mandeep Kaur, Gurvinder Singh

730-733

DOI: https://doi.org/10.26483/ijarcs.v9i2.5832
DOI: https://doi.org/10.26483/ijarcs.v9i2.5860

IoT Based Smart Vehicle Monitoring System

S KUMAR REDDY MALLIDI, V Vineela Vangipurapu

738-741

DOI: https://doi.org/10.26483/ijarcs.v9i2.5870
DOI: https://doi.org/10.26483/ijarcs.v9i2.5643
DOI: https://doi.org/10.26483/ijarcs.v9i2.5645
DOI: https://doi.org/10.26483/ijarcs.v9i2.5664
DOI: https://doi.org/10.26483/ijarcs.v9i2.5802

LOAD BALANCING IN CLOUD COMPUTING: A REVIEW

sangeeta soni, sangeeta soni, suman sangwan

760-763

DOI: https://doi.org/10.26483/ijarcs.v9i2.5816
DOI: https://doi.org/10.26483/ijarcs.v9i2.5913
DOI: https://doi.org/10.26483/ijarcs.v9i2.5915
DOI: https://doi.org/10.26483/ijarcs.v9i2.5916
DOI: https://doi.org/10.26483/ijarcs.v9i2.5918

A Prediction System for Farmers to Enhance the Agriculture Yield using Cognitive Data Science

Muthurasu N, M. Narayanan @ Ramanathan, Sahithyan S, Aravind M, Ramanagiri Bharathan A

780-784

DOI: https://doi.org/10.26483/ijarcs.v9i2.5784
DOI: https://doi.org/10.26483/ijarcs.v9i2.5788
DOI: https://doi.org/10.26483/ijarcs.v9i2.5793
DOI: https://doi.org/10.26483/ijarcs.v9i2.5798

A SURVEY ON RANSOMEWARE: EVOLUTION, GROWTH, AND IMPACT

Hirra Sultan, Aqeel Khalique, Safdar Tanweer, Shah Imran Alam

802-810

DOI: https://doi.org/10.26483/ijarcs.v9i2.5858
DOI: https://doi.org/10.26483/ijarcs.v9i2.5911
DOI: https://doi.org/10.26483/ijarcs.v9i2.5912

INTEGRATED AND EFFECTIVE WASTE MONITORING AND MANAGEMENT

Kanubhai K Patel, Savan Kachia, Romil Shah, Dharmendra T. Patel

821-826

DOI: https://doi.org/10.26483/ijarcs.v9i2.5914
DOI: https://doi.org/10.26483/ijarcs.v9i2.5919
DOI: https://doi.org/10.26483/ijarcs.v9i2.5926
DOI: https://doi.org/10.26483/ijarcs.v9i2.5829
DOI: https://doi.org/10.26483/ijarcs.v9i2.5838
DOI: https://doi.org/10.26483/ijarcs.v9i2.5938
DOI: https://doi.org/10.26483/ijarcs.v9i2.5939
DOI: https://doi.org/10.26483/ijarcs.v9i2.5590

PAKE PROTOCOL WITH OTSP AND IMAGE BASED PASSWORD AUTHENTICATION

Anuradha Soni, Rajneesh Pachouri, Anurag Jain

858-865

DOI: https://doi.org/10.26483/ijarcs.v9i2.5894

ARDUINO BASED DAILY MONITORING –LPG-ON-TIP

Athira sudersanan, Alina Shaji, joyal laj, Akhila A Unnithan

866-870

DOI: https://doi.org/10.26483/ijarcs.v9i2.5790
DOI: https://doi.org/10.26483/ijarcs.v9i2.5917

DUAL LAYER SECURITY FOR RELIABLE SERVICE DISCOVERY IN MANETS

Jyoti tiwari, Ashish Singh baghel, Bhanu Pratap Singh

876-880

DOI: https://doi.org/10.26483/ijarcs.v9i2.5940
DOI: https://doi.org/10.26483/ijarcs.v9i2.5708
DOI: https://doi.org/10.26483/ijarcs.v9i2.5712
DOI: https://doi.org/10.26483/ijarcs.v9i2.5647
DOI: https://doi.org/10.26483/ijarcs.v9i2.5792