DOI: https://doi.org/10.26483/ijarcs.v5i3

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v5i3.2028

Energy Efficiency in WSN by implementing LEACH and PEGASIS

Bhagwant Singh, Kumar Saurabh, Barjinder Singh

4-8

DOI: https://doi.org/10.26483/ijarcs.v5i3.2048
DOI: https://doi.org/10.26483/ijarcs.v5i3.2069
DOI: https://doi.org/10.26483/ijarcs.v5i3.2026

Economic Trust Model in Grid Computing Systems for Resource Selection

Khazar salehi tabrizi, Neda Azari Khosroshahi

24-30

DOI: https://doi.org/10.26483/ijarcs.v5i3.2049
DOI: https://doi.org/10.26483/ijarcs.v5i3.2047
DOI: https://doi.org/10.26483/ijarcs.v5i3.2050
DOI: https://doi.org/10.26483/ijarcs.v5i3.2030

Application of Queuing Model and Cost System in Managerial Decision Making

Olawepo G.T, Ibrahim,W.M, NigeriaIshola James .A.

44-46

DOI: https://doi.org/10.26483/ijarcs.v5i3.2051
DOI: https://doi.org/10.26483/ijarcs.v5i3.2052

Singleton Design Pattern in iOS Application Development

Md. Shakural Islam Sarder, Nikson Kanti Paul

54-56

DOI: https://doi.org/10.26483/ijarcs.v5i3.2038
DOI: https://doi.org/10.26483/ijarcs.v5i3.2053
DOI: https://doi.org/10.26483/ijarcs.v5i3.2057
DOI: https://doi.org/10.26483/ijarcs.v5i3.2054

A Review on Cryptograhy and its Various Techniques

Aditi Verma, Harsha Singh, Yesha Pruthi

73-75

DOI: https://doi.org/10.26483/ijarcs.v5i3.2042
DOI: https://doi.org/10.26483/ijarcs.v5i3.2055
DOI: https://doi.org/10.26483/ijarcs.v5i3.2031

Reliability, Security and Privacy of Data Storage in Cloud Computing

Anju Mishra, Dr. Viresh Sharma, Dr. Ashish Pandey

85-88

DOI: https://doi.org/10.26483/ijarcs.v5i3.2032
DOI: https://doi.org/10.26483/ijarcs.v5i3.2033
DOI: https://doi.org/10.26483/ijarcs.v5i3.2058
DOI: https://doi.org/10.26483/ijarcs.v5i3.2034
DOI: https://doi.org/10.26483/ijarcs.v5i3.2061
DOI: https://doi.org/10.26483/ijarcs.v5i3.2063

Census Information Exploration

Sidra Anam, Saurabh Gupta

119-133

DOI: https://doi.org/10.26483/ijarcs.v5i3.2064
DOI: https://doi.org/10.26483/ijarcs.v5i3.2045

Automated Parking System with Driving License Access

Harmeet Singh, Shailesh Ranjan,Shivam Dhar,, Chetan Anand

137-139

DOI: https://doi.org/10.26483/ijarcs.v5i3.2065
DOI: https://doi.org/10.26483/ijarcs.v5i3.2040

Ranking Relevant Web Pages using Ontology

S. Yasodha, Dr. S.S. Dhenakaran

149-153

DOI: https://doi.org/10.26483/ijarcs.v5i3.2066
DOI: https://doi.org/10.26483/ijarcs.v5i3.2044

A Survey on Various Image Enhancement Techniques

J. P. Bidishaw, Dr. T. Nalini

160-162

DOI: https://doi.org/10.26483/ijarcs.v5i3.2046
DOI: https://doi.org/10.26483/ijarcs.v5i3.2062

Olap Mining in Clinical Decision Support System for Medical Diagnosis

Reddy Sony Krishna, Neelima Naralasetty, Jayalakshmi Gundabathina

167-174

DOI: https://doi.org/10.26483/ijarcs.v5i3.2067
DOI: https://doi.org/10.26483/ijarcs.v5i3.2059

Survey of Image Denoising Algorithm

M. Nandhini, Dr.T. Nalini

179-182

DOI: https://doi.org/10.26483/ijarcs.v5i3.2060
DOI: https://doi.org/10.26483/ijarcs.v5i3.2035
DOI: https://doi.org/10.26483/ijarcs.v5i3.2029
DOI: https://doi.org/10.26483/ijarcs.v5i3.2036

A Review on Experience Management in Software Engineering

Navjot Kaur, Navandeep Singh Tung, Gurjot Kaur

198-201

DOI: https://doi.org/10.26483/ijarcs.v5i3.2037

Protocols Governing Clustering in MANETS

Piyush Makani, Saumya Srivastava, Saurabh Gupta

202-205

DOI: https://doi.org/10.26483/ijarcs.v5i3.2041
DOI: https://doi.org/10.26483/ijarcs.v5i3.2043

The Analysis of Constructing a Green Data Center in Iran

Zahra Ghoreishi Dehkordi, Hassan Ali Shirazi

211-220

DOI: https://doi.org/10.26483/ijarcs.v5i3.2068
DOI: https://doi.org/10.26483/ijarcs.v5i3.2039
DOI: https://doi.org/10.26483/ijarcs.v5i3.2072
DOI: https://doi.org/10.26483/ijarcs.v5i3.2071
DOI: https://doi.org/10.26483/ijarcs.v5i3.2070
DOI: https://doi.org/10.26483/ijarcs.v5i3.2027