DOI: https://doi.org/10.26483/ijarcs.v6i1

Published: 2017-01-13

Grayscale Image Colorization using Seeded Cellular Automaton

John Paul T. Yusiong, Nherie Lynn U. Celeste

1-6

DOI: https://doi.org/10.26483/ijarcs.v6i1.2364
DOI: https://doi.org/10.26483/ijarcs.v6i1.2365
DOI: https://doi.org/10.26483/ijarcs.v6i1.2389
DOI: https://doi.org/10.26483/ijarcs.v6i1.2366
DOI: https://doi.org/10.26483/ijarcs.v6i1.2372
DOI: https://doi.org/10.26483/ijarcs.v6i1.2367

Object Detection for Markerless Augmentation using Haar Training

Shubham Paul, Sourabh Dixit, Dr.Chetna Dabas

43-46

DOI: https://doi.org/10.26483/ijarcs.v6i1.2369
DOI: https://doi.org/10.26483/ijarcs.v6i1.2384
DOI: https://doi.org/10.26483/ijarcs.v6i1.2376
DOI: https://doi.org/10.26483/ijarcs.v6i1.2371

Aid to Detect Fire and Smoke in Open Space Surveillance

Mr. Rahul D. Dhotkar, Prof. R.V. Mante, Dr. P.N. Chatur

68-71

DOI: https://doi.org/10.26483/ijarcs.v6i1.2374
DOI: https://doi.org/10.26483/ijarcs.v6i1.5994

Web Based SMS Push Mechanism

S N Lakshmi Malluvalasa

78-82

DOI: https://doi.org/10.26483/ijarcs.v6i1.2363
DOI: https://doi.org/10.26483/ijarcs.v6i1.2368

Vision Based Head Movement Tracking for Mouse control

Devanand G. Khandar, Prof. R. V. Manteand, Prof. Dr. P.N. Chatur

85-87

DOI: https://doi.org/10.26483/ijarcs.v6i1.2373
DOI: https://doi.org/10.26483/ijarcs.v6i1.2387
DOI: https://doi.org/10.26483/ijarcs.v6i1.2383

An Extension to Android Security Framework

R M. Sherkar, Prof. R V. Mante, Dr. P N. Chatur

98-101

DOI: https://doi.org/10.26483/ijarcs.v6i1.2386
DOI: https://doi.org/10.26483/ijarcs.v6i1.5995
DOI: https://doi.org/10.26483/ijarcs.v6i1.2390
DOI: https://doi.org/10.26483/ijarcs.v6i1.2391
DOI: https://doi.org/10.26483/ijarcs.v6i1.2392
DOI: https://doi.org/10.26483/ijarcs.v6i1.2393
DOI: https://doi.org/10.26483/ijarcs.v6i1.2370
DOI: https://doi.org/10.26483/ijarcs.v6i1.2399
DOI: https://doi.org/10.26483/ijarcs.v6i1.2385

E-Voting System using Android and Web-Based Platform

Kulkarni Kulkarni, Mangesh Devraj, AjitSingh Chauhan, Anujkumar Pandey, Prof. Smita Chavan

142-145

DOI: https://doi.org/10.26483/ijarcs.v6i1.2400

Data Confidentiality for Secure Cloud Computing Through Homomorphic Encryption

Dipti Singh Galav, Dr. S. M. Ghosh, Praveen Shrivastav

146-148

DOI: https://doi.org/10.26483/ijarcs.v6i1.2401
DOI: https://doi.org/10.26483/ijarcs.v6i1.2402

Substitutive Wavelet Based Image Fusion using Improved Nonlinear IHS Transform

Mahesh P. Chakkarwar, Prof. A. V. Deorankar, Prof.Vrushali A. Chakkarwar

158-162

DOI: https://doi.org/10.26483/ijarcs.v6i1.2395

An Overview of Wireless Ad-hoc Networks

Jyotirmoy Das, Prakash Das

163-167

DOI: https://doi.org/10.26483/ijarcs.v6i1.2403
DOI: https://doi.org/10.26483/ijarcs.v6i1.2404

Social Media - Transforming Society

Dr. Seema Phogat, Dr. Kavita Sharma

171-173

DOI: https://doi.org/10.26483/ijarcs.v6i1.2388
DOI: https://doi.org/10.26483/ijarcs.v6i1.2394

Programming Development on Transportation Problem using c++ and Stepping Stone for Evaluation

Adeoye .O. Akeem, Babalola John.B,Igbinehi,E.M, Emiola Olawale.K.S

177-184

DOI: https://doi.org/10.26483/ijarcs.v6i1.2396

Personalised web Search using user Behaviour

Jayesh Bhaskar Baviskar, Supekar Abhijeet N,Anap Mahesh S., Bhande Swapnil D, Molak Bapusaheb V

185-187

DOI: https://doi.org/10.26483/ijarcs.v6i1.2398

Programming Development on Risk Function

Igbinehi E. M., Adeoye Akeem .O,Ojo .O.D, Taofeek-Ibrahim Fatimoh Abidem

188-191

DOI: https://doi.org/10.26483/ijarcs.v6i1.2397
DOI: https://doi.org/10.26483/ijarcs.v6i1.2405
DOI: https://doi.org/10.26483/ijarcs.v6i1.2406

An Enhanced Recursive Median Filter for Image Denoising

Ms. Priya Varshney, Mr. Anshuman Tyagi

201-203

DOI: https://doi.org/10.26483/ijarcs.v6i1.2408

A Lexi-Search Approach of Variant Vehicle Routing Problem

Dr. Sobhan Babu K, Vijaya Kumar K, Purusotham S

204-209

DOI: https://doi.org/10.26483/ijarcs.v6i1.2407

Detection of Fake Biometric using Liveness Assessment Method

Aditya S. Ambadkar, Prof. Ravi V.Mante, Dr. PrashantN.Chatur

210-215

DOI: https://doi.org/10.26483/ijarcs.v6i1.2409
DOI: https://doi.org/10.26483/ijarcs.v6i1.2410
DOI: https://doi.org/10.26483/ijarcs.v6i1.2411

A Secured Session Password Protection System Using 3DPA Methodology

Prof. Anil Hingmire, Himanshu Musale,Kalpesh Gosavi, Priyanka Notani

225-228

DOI: https://doi.org/10.26483/ijarcs.v6i1.2412
DOI: https://doi.org/10.26483/ijarcs.v6i1.2413