DOI: https://doi.org/10.26483/ijarcs.v5i7

Published: 2017-01-13

Novel Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks

Tata Jagannadha Swamy, Dr.KVSVR Prasad, Dr. Garimella Ramamurthy

9-15

Parametric Analysis of FIR Digital Filter for Wireless VoIP System

Sansar Chand, Harjit Pal Singh,Jasbinder Singh, Anurag Sharma

21-25

Implementing Security in Mobile Agents by using AES Technique

Mitali Sachdeva, Amit Chhabra, Arvind Sharma

34-39

Prototype of Information System of Tangible Cultural Heritage Documents Management

Khafiizh Hastuti, Abu Salam,L. Budi Handoko, Erwin Yudi Hidayat

50-54

Computerized Board Game: Dara

Ndukwe, I.G, Nwulu, E. A., Damwesh, T. T.

59-62

Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks

Emmanuel C. Ogu, Alao, O.D., Omotunde, A.A, Ogbonna A.C., Izang A.A

67-71

Multi Focus Image Fusion Using Discrete Wavelet Transform Algorithm

M.Mohamed Suhail, P.V.Ganeshkumar,R.Balamurugan, Dr.A.Muthukumaravel

83-87

A Survey on Pre-processing of Microarray Gene Expression Data

Dr. Subhendu ku. Pani, Ajoy ku. Mishra, Dr. Bikram Kesari Ratha

103-104

QR-Code based Digital Wallet

Sharvil Shetty, Trilok Shetty, Rohit Amale

105-109

Sorting of Numbers in a Graph-Theoretic Approach

Sinchan Sengupta, Ritwika Law

110-115

Block Ciphers in Cryptograpy

Prof. Saroj Singh

120-126

A Review on Web Security and Its Applications

Shikha Vashist, Ayush Gupta

127-129

Authenticating a webpage using CAPTCHA image

R. Kanimozhi, Dr. D. Jagadeesan

133-135

Driver Fatigue Detection Based On Eye Track: A Survey

S. Padma Rubhan, B. Anuradha, H..Anandha kumar

147-149

Soft Biometrics Techniques – A Technical Review

Suhail Tomar, K. Senthil Kumar, D. Malathi

153-157

Creating Graph Databases From Relational Databases: An Implementation

Mr. S. Bordoloi, Dr. B. Kalita,Deep Kumar Das, Sabiha Hussain Barlaskar

179-182

A Review on Cloud Computing Security Issues

Amarbeer Kaur, Nitin Bhagat

183-186

Predicting Child's Health using Big Data Analytics

Vishal Johri, Varun Singh, Ishan Srivastava

193-198

Performance Analysis On Decision Tree Algorithms

Miss Nalanda B Dudde, Dr Mrs S.S. Apte

199-201

Performance Analysis on Traffic Sensitive Vertical HandOff Algorithm TSVHOA

A. Bhuvaneswari, E. George Dharma Prakash Raj, P. Rajeswari

202-204

A Review on Data Mining and Its Applications

Shikha Vashist, Ayush Gupta

209-210

A Secure Smart Card Based on Remote user Authentication Protocol

K.Vijay Kumar, Dr. N. Chandra Sekhar Reddy, Gaddam Geetha

211-216

Unsupervised Image Segmentation using ROR

Dr B.L. Shivakumar, B.Suresh Kumar

217-221

Artificial Immune System to Protect Social Network

Rajneeshkaur K. Bedi, Oshin Kavdia,Gauri Bhide, Vaidehi Donglikar

228-231

Performance Metrics for Selection of Quality Hidden Web Documents

Rashmi Agarwal, Niraj Singhal, Prem Sagar

248-252

An Overview of the Achievements of Operating System Architectures

Maminor Gbubemi Ukeh, Kuyoro Shade O.,Ogunojemite Y, Akinlade B

266-269

INTRUDER DETECION SYSTEM USING IMAGE PROCESSING

Laxman Tawade, Abida Bapu Aboobacker

270-278

Design and Implementation of Frequency Hopping using Hardware Descriptive Language

Bilal Ahmad, Syed Asfandyar Gilani, Malik Junaid Aziz

279-281

Video Segmentation and Video Indexing For E-Learning

Laxman Tawade, Abida Bapu Aboobacker

282-287