DOI: https://doi.org/10.26483/ijarcs.v8i4

Published: 2017-06-03

DOI: https://doi.org/10.26483/ijarcs.v8i4.3682

Big Data and Hadoop challenges and issues

Er. Shalika Jaiswal, Er. Amandeep Singh Walia
DOI: https://doi.org/10.26483/ijarcs.v8i4.3683
DOI: https://doi.org/10.26483/ijarcs.v8i4.3684
DOI: https://doi.org/10.26483/ijarcs.v8i4.3685
DOI: https://doi.org/10.26483/ijarcs.v8i4.3687
DOI: https://doi.org/10.26483/ijarcs.v8i4.3688
DOI: https://doi.org/10.26483/ijarcs.v8i4.3689

A Survey on Face Recognition Techniques

Er.Gurpreet Kaur, Er.Harjot Kaur, Er.Manpreet Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3690

Review of Image Segmentation Technique

Er. Anjna Anjna, Er.Rajandeep Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3691
DOI: https://doi.org/10.26483/ijarcs.v8i4.3692
DOI: https://doi.org/10.26483/ijarcs.v8i4.3693
DOI: https://doi.org/10.26483/ijarcs.v8i4.3694
DOI: https://doi.org/10.26483/ijarcs.v8i4.3695
DOI: https://doi.org/10.26483/ijarcs.v8i4.3696
DOI: https://doi.org/10.26483/ijarcs.v8i4.3697
DOI: https://doi.org/10.26483/ijarcs.v8i4.3698
DOI: https://doi.org/10.26483/ijarcs.v8i4.3699
DOI: https://doi.org/10.26483/ijarcs.v8i4.3700
DOI: https://doi.org/10.26483/ijarcs.v8i4.3701
DOI: https://doi.org/10.26483/ijarcs.v8i4.3702
DOI: https://doi.org/10.26483/ijarcs.v8i4.3703

Digital India: Services

Ms. Parminder Kaur, Mrs. Amandeep Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3704
DOI: https://doi.org/10.26483/ijarcs.v8i4.3705
DOI: https://doi.org/10.26483/ijarcs.v8i4.3706

A Study on Clustering Based Methods

Er. Paramvir Kaur Dhillon, Er. Amandeep Singh Walia
DOI: https://doi.org/10.26483/ijarcs.v8i4.3707

Body Sensor Networks: In the Era of Big Data and Beyond

Smita dinker, Anjali Anjali, Sumit Kumar Sharma
DOI: https://doi.org/10.26483/ijarcs.v8i4.3708
DOI: https://doi.org/10.26483/ijarcs.v8i4.3709
DOI: https://doi.org/10.26483/ijarcs.v8i4.3710
DOI: https://doi.org/10.26483/ijarcs.v8i4.3711
DOI: https://doi.org/10.26483/ijarcs.v8i4.3712
DOI: https://doi.org/10.26483/ijarcs.v8i4.3718

A Review on Visual Cryptography Techniques

Er. Varinder Saini, Er. Rajandeep Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3719
DOI: https://doi.org/10.26483/ijarcs.v8i4.3720
DOI: https://doi.org/10.26483/ijarcs.v8i4.3721
DOI: https://doi.org/10.26483/ijarcs.v8i4.3722
DOI: https://doi.org/10.26483/ijarcs.v8i4.3723
DOI: https://doi.org/10.26483/ijarcs.v8i4.3724

Ferrocement as a Construction Material

Er.Mandeep Singh, Er.Mohit Talwar
DOI: https://doi.org/10.26483/ijarcs.v8i4.3725
DOI: https://doi.org/10.26483/ijarcs.v8i4.3726
DOI: https://doi.org/10.26483/ijarcs.v8i4.3727
DOI: https://doi.org/10.26483/ijarcs.v8i4.3728

Review of Role of SSL in Cyber Security

Er. Prabhjot Kaur, Er. Gurjeet Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3729
DOI: https://doi.org/10.26483/ijarcs.v8i4.3730
DOI: https://doi.org/10.26483/ijarcs.v8i4.3731
DOI: https://doi.org/10.26483/ijarcs.v8i4.3732
DOI: https://doi.org/10.26483/ijarcs.v8i4.3733
DOI: https://doi.org/10.26483/ijarcs.v8i4.3734

A Survey of Medical Image CompressionTechniques

Er. Rajandeep Kaur, Er. Manpreet Kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3735
DOI: https://doi.org/10.26483/ijarcs.v8i4.3736
DOI: https://doi.org/10.26483/ijarcs.v8i4.3737
DOI: https://doi.org/10.26483/ijarcs.v8i4.3739
DOI: https://doi.org/10.26483/ijarcs.v8i4.3740

Electromagnetic Interference Filters

Sandalpreet Kaur, Er. Mandeep Kaur Saini and Anupamdeep Sharma
DOI: https://doi.org/10.26483/ijarcs.v8i4.3741
DOI: https://doi.org/10.26483/ijarcs.v8i4.3742
DOI: https://doi.org/10.26483/ijarcs.v8i4.3743
DOI: https://doi.org/10.26483/ijarcs.v8i4.3744
DOI: https://doi.org/10.26483/ijarcs.v8i4.3745

Cloud Computing Risks and Benefits

Er. Gurpinder Singh, Parminder pal
DOI: https://doi.org/10.26483/ijarcs.v8i4.3746

Image Registration: A Simplified Review

Er. Gagandeep Kaur, Dr. Vijay Dhir
DOI: https://doi.org/10.26483/ijarcs.v8i4.3747

A Review of Ant Colony System Algorithm and its Models

Gurpreet Singh, Prof. (Dr.) Jatinder Singh Bal
DOI: https://doi.org/10.26483/ijarcs.v8i4.3748

Modeling of Two Link Flexible Manipulator using Bond Graph Technique

Amardeep singh, Amrinder Singh Minhas and Pawanjot Singh
DOI: https://doi.org/10.26483/ijarcs.v8i4.3749
DOI: https://doi.org/10.26483/ijarcs.v8i4.3750
DOI: https://doi.org/10.26483/ijarcs.v8i4.3751

A Node Authentication Mechanism for Securing MANETs

Raman Preet, Dr. Paramjeet Singh, Dr. Shaveta Rani
DOI: https://doi.org/10.26483/ijarcs.v8i4.3752
DOI: https://doi.org/10.26483/ijarcs.v8i4.3753
DOI: https://doi.org/10.26483/ijarcs.v8i4.3754
DOI: https://doi.org/10.26483/ijarcs.v8i4.3755
DOI: https://doi.org/10.26483/ijarcs.v8i4.3756
DOI: https://doi.org/10.26483/ijarcs.v8i4.3757
DOI: https://doi.org/10.26483/ijarcs.v8i4.3758
DOI: https://doi.org/10.26483/ijarcs.v8i4.3759

A Review of Information Security using Cryptography Technique

Neha Sharma, Prabhjot Prabhjot, Er. Harpreet kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3760
DOI: https://doi.org/10.26483/ijarcs.v8i4.3761
DOI: https://doi.org/10.26483/ijarcs.v8i4.3762

A Review on Useful Ground Improvement Techniques

Varinder Singh, Meenu Bala, Mohit Talwar
DOI: https://doi.org/10.26483/ijarcs.v8i4.3763
DOI: https://doi.org/10.26483/ijarcs.v8i4.3764
DOI: https://doi.org/10.26483/ijarcs.v8i4.3765

Role of Cloud Computing in Education System

Lovedeep Saini, Jyoti AND Harpreet kaur
DOI: https://doi.org/10.26483/ijarcs.v8i4.3766
DOI: https://doi.org/10.26483/ijarcs.v8i4.3767
DOI: https://doi.org/10.26483/ijarcs.v8i4.3768

Comparative Study Of Different Cryptoghraphic Algorithms

Maninder Kaur, Navpreet Kaur, Baldeep Singh
DOI: https://doi.org/10.26483/ijarcs.v8i4.3770

Electromagnetic Interference and Compatibility- A Review

Madhu Suman, Er. MandeepKaur Saini, Dr. Anupamdeep Sharma
DOI: https://doi.org/10.26483/ijarcs.v8i4.3776
DOI: https://doi.org/10.26483/ijarcs.v8i4.3777
DOI: https://doi.org/10.26483/ijarcs.v8i4.3778
DOI: https://doi.org/10.26483/ijarcs.v8i4.3779
DOI: https://doi.org/10.26483/ijarcs.v8i4.3780
DOI: https://doi.org/10.26483/ijarcs.v8i4.3781
DOI: https://doi.org/10.26483/ijarcs.v8i4.3782
DOI: https://doi.org/10.26483/ijarcs.v8i4.3783
DOI: https://doi.org/10.26483/ijarcs.v8i4.3784
DOI: https://doi.org/10.26483/ijarcs.v8i4.3785
DOI: https://doi.org/10.26483/ijarcs.v8i4.3786
DOI: https://doi.org/10.26483/ijarcs.v8i4.3787
DOI: https://doi.org/10.26483/ijarcs.v8i4.3788
DOI: https://doi.org/10.26483/ijarcs.v8i4.3789
DOI: https://doi.org/10.26483/ijarcs.v8i4.3790
DOI: https://doi.org/10.26483/ijarcs.v8i4.3791
DOI: https://doi.org/10.26483/ijarcs.v8i4.4157
DOI: https://doi.org/10.26483/ijarcs.v8i4.4158
DOI: https://doi.org/10.26483/ijarcs.v8i4.4159
DOI: https://doi.org/10.26483/ijarcs.v8i4.4160
DOI: https://doi.org/10.26483/ijarcs.v8i4.4161

A Review on Image Forgery & its Detection Procedure

Ashish Kumar Chakraverti, Prof.(Dr.) Vijay Dhir
DOI: https://doi.org/10.26483/ijarcs.v8i4.4162