DOI: https://doi.org/10.26483/ijarcs.v6i5

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v6i5.2507
DOI: https://doi.org/10.26483/ijarcs.v6i5.2518

A Decentralised Scheduling Tool For An Efficient Information Packet Distribution

Grace L. Samson, Mistura M. Usman,Olabisi B. Ishola, Aminat A. Showole

10-14

DOI: https://doi.org/10.26483/ijarcs.v6i5.2501
DOI: https://doi.org/10.26483/ijarcs.v6i5.2505
DOI: https://doi.org/10.26483/ijarcs.v6i5.2504

Speculative Block Reuse in GPGPU

Suma S, N.P. Gopalan

24-26

DOI: https://doi.org/10.26483/ijarcs.v6i5.2500
DOI: https://doi.org/10.26483/ijarcs.v6i5.2503
DOI: https://doi.org/10.26483/ijarcs.v6i5.2487

Application of Linear Programming Problem in Manuufacturing of Block

1OJO . O.D, Aminu Titilope F, Salau Ganiyat. M

43-46

DOI: https://doi.org/10.26483/ijarcs.v6i5.2506
DOI: https://doi.org/10.26483/ijarcs.v6i5.2502
DOI: https://doi.org/10.26483/ijarcs.v6i5.2481
DOI: https://doi.org/10.26483/ijarcs.v6i5.2498

An Ameliorated Tool for Handling the Events in a College

4Vimala d, R.N Kulkarni, Shailaja.B, Bhagyashree K, Rashmi Reddy

57-59

DOI: https://doi.org/10.26483/ijarcs.v6i5.2485
DOI: https://doi.org/10.26483/ijarcs.v6i5.2482

BCES Encryption Algorithm

Khdega A.Yosef Galala

63-66

DOI: https://doi.org/10.26483/ijarcs.v6i5.2495

An Overview of Image Steganographic Techniques

Archana.O. Vyas, Dr. Sanjay.V. Dudul

67-72

DOI: https://doi.org/10.26483/ijarcs.v6i5.2483
DOI: https://doi.org/10.26483/ijarcs.v6i5.2484
DOI: https://doi.org/10.26483/ijarcs.v6i5.2486
DOI: https://doi.org/10.26483/ijarcs.v6i5.2488
DOI: https://doi.org/10.26483/ijarcs.v6i5.2492
DOI: https://doi.org/10.26483/ijarcs.v6i5.2496
DOI: https://doi.org/10.26483/ijarcs.v6i5.2508
DOI: https://doi.org/10.26483/ijarcs.v6i5.2509

Internet Banking Technology in Banking Industry

Prof. Minakshi Bhosale, Dattatraya Bhosale

108-119

DOI: https://doi.org/10.26483/ijarcs.v6i5.2510

A Distinct Technique for Facial Sketch to Image Conversion

Prof. Prashant Dahiwale, Madhura S. Bombatkar, Dr.M.M.Raghuwanshi

120-123

DOI: https://doi.org/10.26483/ijarcs.v6i5.2511
DOI: https://doi.org/10.26483/ijarcs.v6i5.2494
DOI: https://doi.org/10.26483/ijarcs.v6i5.2512
DOI: https://doi.org/10.26483/ijarcs.v6i5.2499
DOI: https://doi.org/10.26483/ijarcs.v6i5.2491
DOI: https://doi.org/10.26483/ijarcs.v6i5.2493

A Review on Watermarking Techniques for Biometrics

Amanpreet Kaur Wadhwa, Monica Goyal

153-155

DOI: https://doi.org/10.26483/ijarcs.v6i5.2513
DOI: https://doi.org/10.26483/ijarcs.v6i5.2514

Enhancement & Performance of Quality of Service based on MPLS

Juhi Singh, Shrawan Kumar, Vinay Shukla, Alok Kumar Srivastava

161-169

DOI: https://doi.org/10.26483/ijarcs.v6i5.2489

Clustering in vehicular ad hoc Network: A Survey

Manverpreet Kaur, Er.Amarpreet Singh

170-172

DOI: https://doi.org/10.26483/ijarcs.v6i5.2515
DOI: https://doi.org/10.26483/ijarcs.v6i5.2516
DOI: https://doi.org/10.26483/ijarcs.v6i5.2517
DOI: https://doi.org/10.26483/ijarcs.v6i5.2519
DOI: https://doi.org/10.26483/ijarcs.v6i5.2520
DOI: https://doi.org/10.26483/ijarcs.v6i5.2497

Performance Enhancement Of OTA Using Double Gate MOSFET

Amit Sharma, Sansar Chand, Navneet Gill

200-203

DOI: https://doi.org/10.26483/ijarcs.v6i5.2490