DOI: https://doi.org/10.26483/ijarcs.v5i5

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v5i5.2170
DOI: https://doi.org/10.26483/ijarcs.v5i5.2138

The Air Quality Prediction Using HYBRID Soft Computing Techniques

Niharika Niharika, Venkatadri M, Padma S.Rao

11-15

DOI: https://doi.org/10.26483/ijarcs.v5i5.2140

Investigative Module to Eliminate EHR Redundancy

Tarik Eltaeib, Prof. Christian Bach

16-19

DOI: https://doi.org/10.26483/ijarcs.v5i5.2171
DOI: https://doi.org/10.26483/ijarcs.v5i5.2142

Safety-Critical System and Testing the Integrity Software

Mina zaminkar, Mohammad R. Reshadinezhad, Sima Emadi

24-28

DOI: https://doi.org/10.26483/ijarcs.v5i5.2172
DOI: https://doi.org/10.26483/ijarcs.v5i5.2148

An analysis of Security Attacks found in Mobile Ad-hoc Network

Umesh Kumar Singh, Kailash Phuleria,Shailja Sharma, D.N. Goswami

34-39

DOI: https://doi.org/10.26483/ijarcs.v5i5.2139
DOI: https://doi.org/10.26483/ijarcs.v5i5.2173

A Comparative Study of Pre-Copy based Live Virtual Machine Migration Techniques

Priyansh Srivastava, Surabhi Mour, Payal Patel, Hari Ram

44-47

DOI: https://doi.org/10.26483/ijarcs.v5i5.2174
DOI: https://doi.org/10.26483/ijarcs.v5i5.2175

Survey on Cloud Computing

Priyanka Dembla, Chander Diwaker

53-55

DOI: https://doi.org/10.26483/ijarcs.v5i5.2177
DOI: https://doi.org/10.26483/ijarcs.v5i5.2149
DOI: https://doi.org/10.26483/ijarcs.v5i5.2178
DOI: https://doi.org/10.26483/ijarcs.v5i5.2158
DOI: https://doi.org/10.26483/ijarcs.v5i5.2150

Designing of Embedded System for Distributed Temperature Monitoring

Madhuri Joshi, Madhusudan Jathar, Suresh Mehrotra

75-77

DOI: https://doi.org/10.26483/ijarcs.v5i5.2151
DOI: https://doi.org/10.26483/ijarcs.v5i5.2160
DOI: https://doi.org/10.26483/ijarcs.v5i5.2152
DOI: https://doi.org/10.26483/ijarcs.v5i5.2162
DOI: https://doi.org/10.26483/ijarcs.v5i5.2163
DOI: https://doi.org/10.26483/ijarcs.v5i5.2179
DOI: https://doi.org/10.26483/ijarcs.v5i5.2164
DOI: https://doi.org/10.26483/ijarcs.v5i5.2144

Comparative Analysis of Fuzzy Logic and Neutral Networks: A Focus on Polytechnic Entrant System

Fagbolu Olutola Olaide, Adewale Adekunle Joseph, Ojoawo Akinwale Olusola

111-114

DOI: https://doi.org/10.26483/ijarcs.v5i5.2146
DOI: https://doi.org/10.26483/ijarcs.v5i5.2180

Investigating Crossover Techniques for the 8-Queens Problem

Belal Al- Khateeb, Ali Jamal, Ayman Jalil

118-121

DOI: https://doi.org/10.26483/ijarcs.v5i5.2165
DOI: https://doi.org/10.26483/ijarcs.v5i5.2154
DOI: https://doi.org/10.26483/ijarcs.v5i5.2153
DOI: https://doi.org/10.26483/ijarcs.v5i5.2181
DOI: https://doi.org/10.26483/ijarcs.v5i5.2182
DOI: https://doi.org/10.26483/ijarcs.v5i5.2157
DOI: https://doi.org/10.26483/ijarcs.v5i5.2159
DOI: https://doi.org/10.26483/ijarcs.v5i5.2166
DOI: https://doi.org/10.26483/ijarcs.v5i5.2161
DOI: https://doi.org/10.26483/ijarcs.v5i5.2167

A Comparative Study of NoSQL Databases

Bhavesh N. Gohil, Abhishek Prasad

170-176

DOI: https://doi.org/10.26483/ijarcs.v5i5.2183
DOI: https://doi.org/10.26483/ijarcs.v5i5.2147

Study of Recent Advancement in Document Clustering

Durgesh Nandan Dixit, R. K. Gupta

181-185

DOI: https://doi.org/10.26483/ijarcs.v5i5.2184

Web Mining Concept on Social Network Analysis

Varsha Jotwani, Umika Jotwani Khatarkar

186-189

DOI: https://doi.org/10.26483/ijarcs.v5i5.2196

Improved Text Watermarking Technique

Prabhjot Kaur Cheema, Kamaljit Kaur

190-192

DOI: https://doi.org/10.26483/ijarcs.v5i5.2185

On Data Integrity in Cloud Storage Services

Anjali A, Joe Mathew Jacob

193-197

DOI: https://doi.org/10.26483/ijarcs.v5i5.2186

Code Cloning: Types and Detection Techniques

Noble Khatra, Shaveta Rani, Paramjeet Singh

198-201

DOI: https://doi.org/10.26483/ijarcs.v5i5.2155

Sentiment Analysis for Product Reviews

Ms. Aarti A. Patil, Prof. Seema Kolkur

202-204

DOI: https://doi.org/10.26483/ijarcs.v5i5.2156

A Framework for Knowledge Discovery from Facebook

Ashish Kumar, Nikhil KumarSingh, Deepak Singh Tomar

205-209

DOI: https://doi.org/10.26483/ijarcs.v5i5.2187
DOI: https://doi.org/10.26483/ijarcs.v5i5.2188

AES Encryption based Load Rebalancing Algorithm

Nithya Kuriakose, Shinu Acca Mani

216-219

DOI: https://doi.org/10.26483/ijarcs.v5i5.2189
DOI: https://doi.org/10.26483/ijarcs.v5i5.2191

Secure Cloud Network using Partial Homomorphic Algorithms

Vineet Kumar Singh, Dr. Maitreyee Dutta

224-229

DOI: https://doi.org/10.26483/ijarcs.v5i5.2169

Image Encryption for Separable Reversible Data Hiding

S. Lavanya, Dr.S.Palaniswami, s.Rijutha

230-236

DOI: https://doi.org/10.26483/ijarcs.v5i5.2192
DOI: https://doi.org/10.26483/ijarcs.v5i5.2190
DOI: https://doi.org/10.26483/ijarcs.v5i5.2193

Classification of Natural Scene Images Based on Detection of Emotions

Shweta Wagh, Savita Darekar,Mayuri Gawali, Poonam Nikam

246-249

DOI: https://doi.org/10.26483/ijarcs.v5i5.2194
DOI: https://doi.org/10.26483/ijarcs.v5i5.2195
DOI: https://doi.org/10.26483/ijarcs.v5i5.2145
DOI: https://doi.org/10.26483/ijarcs.v5i5.2168

Advantages of Object Synchronization over Resource Synchronization in Java

Mr. Chetan Singh Khinchi, Mr. Vaibhav Sharma, Mr. Ronak Jain

265-270

DOI: https://doi.org/10.26483/ijarcs.v5i5.2197