DOI: https://doi.org/10.26483/ijarcs.v4i3

Published: 2017-01-13

Cloud-Based Storage for Education

Sushma Satpute, Dr. Bharat Singh Deora
DOI: https://doi.org/10.26483/ijarcs.v4i3.1528
DOI: https://doi.org/10.26483/ijarcs.v4i3.1529
DOI: https://doi.org/10.26483/ijarcs.v4i3.1530

Value of Cloud Based Computing

Shiksha Kanwar, Shailendra Singh Tanwar, Jhalak Modi
DOI: https://doi.org/10.26483/ijarcs.v4i3.1531
DOI: https://doi.org/10.26483/ijarcs.v4i3.1532
DOI: https://doi.org/10.26483/ijarcs.v4i3.1533

Hardware Based Prevention of Phishing Attack

Amit Solanki, S.R.Dogiwal, Jitendra Sharma
DOI: https://doi.org/10.26483/ijarcs.v4i3.1534
DOI: https://doi.org/10.26483/ijarcs.v4i3.1535
DOI: https://doi.org/10.26483/ijarcs.v4i3.1536

Software Change Validation before Change Implementation

Aprna Tripathi, Dharmendra Singh Kushwaha, Arun Kumar Misra
DOI: https://doi.org/10.26483/ijarcs.v4i3.1537

Analysis of Impacted Classes and Regression Test Suite Generation

Aprna Tripathi, Dharmendra Singh Kushwaha, Arun Kumar Misra
DOI: https://doi.org/10.26483/ijarcs.v4i3.1538
DOI: https://doi.org/10.26483/ijarcs.v4i3.1539
DOI: https://doi.org/10.26483/ijarcs.v4i3.1540
DOI: https://doi.org/10.26483/ijarcs.v4i3.1541

Geolocation Events Based Auto Theme Changer for Browsers

Vinay Gentyala, Pranav Nerurkar, Nazneen Ansari
DOI: https://doi.org/10.26483/ijarcs.v4i3.1542
DOI: https://doi.org/10.26483/ijarcs.v4i3.1543
DOI: https://doi.org/10.26483/ijarcs.v4i3.1544
DOI: https://doi.org/10.26483/ijarcs.v4i3.1545
DOI: https://doi.org/10.26483/ijarcs.v4i3.1546
DOI: https://doi.org/10.26483/ijarcs.v4i3.1547
DOI: https://doi.org/10.26483/ijarcs.v4i3.1548
DOI: https://doi.org/10.26483/ijarcs.v4i3.1549
DOI: https://doi.org/10.26483/ijarcs.v4i3.1550
DOI: https://doi.org/10.26483/ijarcs.v4i3.1551
DOI: https://doi.org/10.26483/ijarcs.v4i3.1552
DOI: https://doi.org/10.26483/ijarcs.v4i3.1553
DOI: https://doi.org/10.26483/ijarcs.v4i3.1554
DOI: https://doi.org/10.26483/ijarcs.v4i3.1555
DOI: https://doi.org/10.26483/ijarcs.v4i3.1556
DOI: https://doi.org/10.26483/ijarcs.v4i3.1557
DOI: https://doi.org/10.26483/ijarcs.v4i3.1558

Case Study of Virtualization in Existing System

Lovely Soni, Suneet Chaudhary, Shailendra Singh Tanwar
DOI: https://doi.org/10.26483/ijarcs.v4i3.1559
DOI: https://doi.org/10.26483/ijarcs.v4i3.1560

Genetic Algorithm for optimization using MATLAB

Mr. Manish Saraswat, Mr. Ajay Kumar Sharma
DOI: https://doi.org/10.26483/ijarcs.v4i3.1561
DOI: https://doi.org/10.26483/ijarcs.v4i3.1562
DOI: https://doi.org/10.26483/ijarcs.v4i3.1563
DOI: https://doi.org/10.26483/ijarcs.v4i3.1564

Resource Discovery and Resourse Management in Grid Computing : A Survey

Naazish Rahim, Nikita Sharma,Sudha Tiwari, Ashik Hussain, Nirmala Sharma
DOI: https://doi.org/10.26483/ijarcs.v4i3.1565

Case study: Wireless Sensor Networks Technology

Naveen Jain, Pawan Shakdwipee, Sunil Sharma
DOI: https://doi.org/10.26483/ijarcs.v4i3.1567

Efficient Ways to Make Biometrics System More Effective

Er.Neeraj Jindal, Er.Sona Aggarwal, Er.Shweta Lakhara
DOI: https://doi.org/10.26483/ijarcs.v4i3.1568
DOI: https://doi.org/10.26483/ijarcs.v4i3.1569
DOI: https://doi.org/10.26483/ijarcs.v4i3.1570
DOI: https://doi.org/10.26483/ijarcs.v4i3.1571
DOI: https://doi.org/10.26483/ijarcs.v4i3.1572
DOI: https://doi.org/10.26483/ijarcs.v4i3.1573
DOI: https://doi.org/10.26483/ijarcs.v4i3.1574
DOI: https://doi.org/10.26483/ijarcs.v4i3.1575
DOI: https://doi.org/10.26483/ijarcs.v4i3.1576
DOI: https://doi.org/10.26483/ijarcs.v4i3.1577
DOI: https://doi.org/10.26483/ijarcs.v4i3.1578
DOI: https://doi.org/10.26483/ijarcs.v4i3.1579
DOI: https://doi.org/10.26483/ijarcs.v4i3.1580

A Reconsideration of schemes for Fingerprint Identification

Shaleen Bhatnagar, Sarika Khandelwal, Neha Jain
DOI: https://doi.org/10.26483/ijarcs.v4i3.1581
DOI: https://doi.org/10.26483/ijarcs.v4i3.1582
DOI: https://doi.org/10.26483/ijarcs.v4i3.1583

Jobshop Scheduling Domain Through Cuckoo Search

Sneha A. Gaywala, Dr. Dharm Singh, Chirag Suryakant Thaker
DOI: https://doi.org/10.26483/ijarcs.v4i3.1584
DOI: https://doi.org/10.26483/ijarcs.v4i3.1585
DOI: https://doi.org/10.26483/ijarcs.v4i3.1586
DOI: https://doi.org/10.26483/ijarcs.v4i3.1587
DOI: https://doi.org/10.26483/ijarcs.v4i3.1588

A Brief Review on Routing in Wireless Sensor Networks

Manish Tiwari, Partha Pratim Bhattacharya, Alok Kole
DOI: https://doi.org/10.26483/ijarcs.v4i3.1589

Enhanced RSA Digital Signature Algorithm

Ashish Vijay, Priyanka Trikha, Ashik Hussain
DOI: https://doi.org/10.26483/ijarcs.v4i3.1590

WiMAX for e-Janraj

Ridhima Jain, Manish Tiwari,Tarun Shrimali, Partha Pratim Bhattacharya
DOI: https://doi.org/10.26483/ijarcs.v4i3.1591