DOI: https://doi.org/10.26483/ijarcs.v7i3

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v7i3.2657

Retended Views for Digital Content

Nayan Jain, Utkarsh Agrawal,Jhumpa Jain, Shiwani Gupta

7-8

DOI: https://doi.org/10.26483/ijarcs.v7i3.2648

Mobile Learning of Numerical Simulations using Animations

Babangida Zachariah, Patience Ndang Yabuwat

9-14

DOI: https://doi.org/10.26483/ijarcs.v7i3.2660
DOI: https://doi.org/10.26483/ijarcs.v7i3.2668
DOI: https://doi.org/10.26483/ijarcs.v7i3.2654
DOI: https://doi.org/10.26483/ijarcs.v7i3.2649

Evaluation of the Non-Functional Requirements of Usability: A Systematic Study

Mohammad Ayaz Ahmad, IngMarelis V. Pérez García, Ing. YordanVelez Rodríguez

29-35

DOI: https://doi.org/10.26483/ijarcs.v7i3.2669
DOI: https://doi.org/10.26483/ijarcs.v7i3.2659
DOI: https://doi.org/10.26483/ijarcs.v7i3.2670
DOI: https://doi.org/10.26483/ijarcs.v7i3.2653
DOI: https://doi.org/10.26483/ijarcs.v7i3.2663
DOI: https://doi.org/10.26483/ijarcs.v7i3.2658
DOI: https://doi.org/10.26483/ijarcs.v7i3.2667
DOI: https://doi.org/10.26483/ijarcs.v7i3.2651
DOI: https://doi.org/10.26483/ijarcs.v7i3.2650
DOI: https://doi.org/10.26483/ijarcs.v7i3.2656
DOI: https://doi.org/10.26483/ijarcs.v7i3.2671
DOI: https://doi.org/10.26483/ijarcs.v7i3.2672
DOI: https://doi.org/10.26483/ijarcs.v7i3.2673
DOI: https://doi.org/10.26483/ijarcs.v7i3.2674

Novel Approach For Precise Fingerprint Detection

Meenakshi Meenakshi, Dr. Chander Kant

103-108

DOI: https://doi.org/10.26483/ijarcs.v7i3.2675
DOI: https://doi.org/10.26483/ijarcs.v7i3.2676
DOI: https://doi.org/10.26483/ijarcs.v7i3.2677
DOI: https://doi.org/10.26483/ijarcs.v7i3.2678
DOI: https://doi.org/10.26483/ijarcs.v7i3.2679

A Study On Energy Efficient Remote Storage And Processing In Dynamic Network

Karthik P, Nandini N,Roopa Shree S, Rajeshwari B S

132-137

DOI: https://doi.org/10.26483/ijarcs.v7i3.2680
DOI: https://doi.org/10.26483/ijarcs.v7i3.2681
DOI: https://doi.org/10.26483/ijarcs.v7i3.2655
DOI: https://doi.org/10.26483/ijarcs.v7i3.2682

Extract Transform Load Data with ETL Tools

Preeti Dhanda, Neetu Sharma

152-160

DOI: https://doi.org/10.26483/ijarcs.v7i3.2662
DOI: https://doi.org/10.26483/ijarcs.v7i3.2652
DOI: https://doi.org/10.26483/ijarcs.v7i3.2661
DOI: https://doi.org/10.26483/ijarcs.v7i3.2665
DOI: https://doi.org/10.26483/ijarcs.v7i3.2664
DOI: https://doi.org/10.26483/ijarcs.v7i3.2684

Clustering in Wireless Sensor Networks: A Review

Shilpa Mahajan, Pushpender Kumar Dhiman

198-201

DOI: https://doi.org/10.26483/ijarcs.v7i3.2666
DOI: https://doi.org/10.26483/ijarcs.v7i3.2685

Research Issues and Scope of Data Security by Self Destruction Mechanism in Cloud Computing

Jadala Vijaya Chandra, Dr. Gyaderla Ranjith Sirupa Vijaya Laxmi

206-210

DOI: https://doi.org/10.26483/ijarcs.v7i3.2833

Study of RSA, DES and Cloud Computing

Pooja Bindlish, Pawan Kumar

211-215

DOI: https://doi.org/10.26483/ijarcs.v7i3.2687

Digital Image Processing Technology based on MATLAB

Saadia Hassan Abdalla, Saif Eldin Fattoh Osman

216-221

DOI: https://doi.org/10.26483/ijarcs.v7i3.2688
DOI: https://doi.org/10.26483/ijarcs.v7i3.2689

Material Selection using Association Rule Mining

Vandit Hedau, Pushpesh Pant, Kuldeep Sharma

230-234

DOI: https://doi.org/10.26483/ijarcs.v7i3.2691
DOI: https://doi.org/10.26483/ijarcs.v7i3.2692
DOI: https://doi.org/10.26483/ijarcs.v7i3.2683
DOI: https://doi.org/10.26483/ijarcs.v7i3.2686

A Review: Analysis of Various Attacks in VANET

Shikha Sharma, Er.Shivani Sharma

249-253

DOI: https://doi.org/10.26483/ijarcs.v7i3.2693

Two Dimensional Mapping by using Single Ultrasonic Sensor

Neelam Barak, Neha Gaba, Shipra Aggarwal

254-257

DOI: https://doi.org/10.26483/ijarcs.v7i3.2690