DOI: https://doi.org/10.26483/ijarcs.v4i6

Published: 2017-01-13

A Survey - Different Models in Cloud Computing

Dharti S. Kute, Ankita S. Patil, Nilima V. Pardakhe
DOI: https://doi.org/10.26483/ijarcs.v4i6.1688
DOI: https://doi.org/10.26483/ijarcs.v4i6.1690

License Plate Recognition System

Miss. Jayshri V. Choudhary, Mr. Amit M. sahu
DOI: https://doi.org/10.26483/ijarcs.v4i6.1691
DOI: https://doi.org/10.26483/ijarcs.v4i6.1692
DOI: https://doi.org/10.26483/ijarcs.v4i6.1693
DOI: https://doi.org/10.26483/ijarcs.v4i6.1694

Energy Efficient Networks : A Survey

Hemant P. Moodliar, Dr. Raju. M. Tugnayat
DOI: https://doi.org/10.26483/ijarcs.v4i6.1695
DOI: https://doi.org/10.26483/ijarcs.v4i6.1696
DOI: https://doi.org/10.26483/ijarcs.v4i6.1697
DOI: https://doi.org/10.26483/ijarcs.v4i6.1698
DOI: https://doi.org/10.26483/ijarcs.v4i6.1699
DOI: https://doi.org/10.26483/ijarcs.v4i6.1700
DOI: https://doi.org/10.26483/ijarcs.v4i6.1701
DOI: https://doi.org/10.26483/ijarcs.v4i6.1702

A Review Paper on Cloud Computing Security

Miss. Trupti S. Lokhande, Prof. Rajeshri R. Shelke
DOI: https://doi.org/10.26483/ijarcs.v4i6.1703

Optical Burst Switching

Miss. Vaishali K. Bhusari, Mr. Amit M. Sahu
DOI: https://doi.org/10.26483/ijarcs.v4i6.1704

Faster Retrival Of Webpages Using Memory Caching Technique

Miss. Afroz K.. Khan, Miss. Urmila S. Gavali, Mr. Rajshekhar , Prof. S. P. Aware
DOI: https://doi.org/10.26483/ijarcs.v4i6.1705

Digital Image Processing

Harshada M. Kariya, Anushree Wasu
DOI: https://doi.org/10.26483/ijarcs.v4i6.1706

Cloud Management with Open Source Tools

Manish S. Thakare, Akash T. Kuratkar
DOI: https://doi.org/10.26483/ijarcs.v4i6.1707

GSM/GPRS Based Vehicle Tracking System and Speed Detection with Toll Collection

Pratik Prakash Thakare, Vrushali Prakash Thakare, Mayuri Avdhutrao Joshi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1708

Cloud based Implicit Password Authentication System

Ms. Chaitali B. Khodani, Ms. Namrata A. Khodke, Prof. Aditya Bakshi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1709

Single Sign On Certificate Based Authentication for WS-Security

Miss. Prachi M. Kharat, Miss. Prachi A. Deshpande, Prof. Aaditya P. Bakshi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1710

Fraud Detection with the Help of Hidden Markov Model and Neural Network

Sagar P. Jumde, Radha W.Nalamwar, Prof. Sunita P.Aware
DOI: https://doi.org/10.26483/ijarcs.v4i6.1711

History and Features of a developer tool in iOS: XCODE

Miss Priyanka V. Kanoi, Miss Payal N. ingole
DOI: https://doi.org/10.26483/ijarcs.v4i6.1712

An Task and Time Scheduler System Based on Rich Internet Applications

Miss. Rupali R. Waghmare, Miss. Reshma R. Gatade, Miss. Rashmi R. Rajurkar
DOI: https://doi.org/10.26483/ijarcs.v4i6.1713

Wireless Network Security for IEEE 802.1 1A/B/G and Bluetooth

Mr.Rahul S. Joshi, Mr.Chandrakant A. Atram, Prof.Dr.R.M.Tugnayat
DOI: https://doi.org/10.26483/ijarcs.v4i6.1714

Botnet Analysis and Detection

Prof Amit sahu, B. G. Dalvi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1715

QR Codes and Security Mechanism Using Mobile Phones

Mr. Sarang A. Kotalwar, Prof. Onkar V. Chandure
DOI: https://doi.org/10.26483/ijarcs.v4i6.1716
DOI: https://doi.org/10.26483/ijarcs.v4i6.1717

Design of Game Application using Android Architecture

Miss. Shital V. Narlawar, SonalG.Chopade,VaishnaviC.Vikhore, Sandip A. Kahate
DOI: https://doi.org/10.26483/ijarcs.v4i6.1718

Vehicular Mobility Simulation For VANET

Miss.Shruti S. Khope, Miss. Swati V.Gayakwad, Prof.Sandip T. Dhagdi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1719
DOI: https://doi.org/10.26483/ijarcs.v4i6.1720
DOI: https://doi.org/10.26483/ijarcs.v4i6.1721

An Effective Technique For Generation And detection Of QR code

Miss. Usha R. pardhi, Prof. Onkar V. Chandure, Miss. Priyanka S. Atal
DOI: https://doi.org/10.26483/ijarcs.v4i6.1722

Mobile Telephony Over Wi-Fi Using VOIP

Ms. Vaishali R. Mhatarmare, Prof. A. D. Raut
DOI: https://doi.org/10.26483/ijarcs.v4i6.1723

An Effective mechanism for Ensuring Security of QR Code

Ashish R. Wane, Siddharth P. Jamankar, Onkar V. Chandure
DOI: https://doi.org/10.26483/ijarcs.v4i6.1724
DOI: https://doi.org/10.26483/ijarcs.v4i6.1725
DOI: https://doi.org/10.26483/ijarcs.v4i6.1726

GSM mobile phone based LED scrolling message display system

Priyanka A. Borkar, Ashish K. Muley,Niraj B.Masram, Dr. R.M. Tugnayat
DOI: https://doi.org/10.26483/ijarcs.v4i6.1727
DOI: https://doi.org/10.26483/ijarcs.v4i6.1728

ASL Based Hand Gesture Recognition System

Mr. Swapnil A. Bobade, Prof. Vijaya K. Shandilya
DOI: https://doi.org/10.26483/ijarcs.v4i6.1729

ARM Based Remote control Toy Car

Harish G Langar, Atul P Shinghade, Pavan V Sukode
DOI: https://doi.org/10.26483/ijarcs.v4i6.1730

WAVE: Wireless Access for Vehicular Environment

Miss Bhagyashri S.Kharate, Prof. Sandip T. Dhagdi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1731

Network Traffic Monitoring with IDS

Ms. P. A. Patil, Prof. R. R Keole
DOI: https://doi.org/10.26483/ijarcs.v4i6.1732

A Survey On New Approach For Detecting Blackhole Attack

Ankush D. Patil, Jyoti B. Rathi, Yogadhar Pandey
DOI: https://doi.org/10.26483/ijarcs.v4i6.1733
DOI: https://doi.org/10.26483/ijarcs.v4i6.1734

Detection Of Duplicate Code

Ms. Kanchan A. Jadhao, Mr. Shubhendra R.Puri,Nikita S.Varhade, Prof. Ganesh B.Regulwar
DOI: https://doi.org/10.26483/ijarcs.v4i6.1735
DOI: https://doi.org/10.26483/ijarcs.v4i6.1736

Design of Electricity Theft Monitoring System in Customer Consumptions

Saurabh Manohar Hadge, Sarang Giridhar Kamble, Prof. A. D. Raut
DOI: https://doi.org/10.26483/ijarcs.v4i6.1737

Nymble: Blocking Misbehaving Users inAnonymizing Networks

Dipali V. Yelane, Navita Nagdive, Prof. Dr. R. M. Tugnayat
DOI: https://doi.org/10.26483/ijarcs.v4i6.1738

Sharing Backup and Restoring Data Using Android Based Server

Ms.Dhanashri R. Karanjkar, Mr.Gopal P. Dhole, Prof.Sunita P. Aware
DOI: https://doi.org/10.26483/ijarcs.v4i6.1748
DOI: https://doi.org/10.26483/ijarcs.v4i6.1749

Advancement in Image processing using Android

Mr. Sadanand S . Muktawar, Miss.Juhi R. Bobade, Prof.S.A. Kahate
DOI: https://doi.org/10.26483/ijarcs.v4i6.1750

A Secure Authentication Using Graphical Password Authentication System: GPAS

Nikhil Arun Pogale, Deepak Ganpatrao Rasekar, Prof. Aditya P. Bakshi
DOI: https://doi.org/10.26483/ijarcs.v4i6.1751
DOI: https://doi.org/10.26483/ijarcs.v4i6.1752

A Review: Oracle Big Data Aplliance

Vivek D. Honule, Mrunali G. Bukkawar
DOI: https://doi.org/10.26483/ijarcs.v4i6.1754