DOI: https://doi.org/10.26483/ijarcs.v8i5

Published: 2017-06-20

Initiative of MOOCs for Technical and Vocational Education

Rahul Chandra Kushwaha, Achintya Singhal

1-4

DOI: https://doi.org/10.26483/ijarcs.v8i5.3671
DOI: https://doi.org/10.26483/ijarcs.v8i5.3455
DOI: https://doi.org/10.26483/ijarcs.v8i5.3227
DOI: https://doi.org/10.26483/ijarcs.v8i5.3560
DOI: https://doi.org/10.26483/ijarcs.v8i5.3795
DOI: https://doi.org/10.26483/ijarcs.v8i5.3650
DOI: https://doi.org/10.26483/ijarcs.v8i5.3940
DOI: https://doi.org/10.26483/ijarcs.v8i5.2841
DOI: https://doi.org/10.26483/ijarcs.v8i5.3194
DOI: https://doi.org/10.26483/ijarcs.v8i5.3200
DOI: https://doi.org/10.26483/ijarcs.v8i5.3201
DOI: https://doi.org/10.26483/ijarcs.v8i5.3204
DOI: https://doi.org/10.26483/ijarcs.v8i5.3208
DOI: https://doi.org/10.26483/ijarcs.v8i5.3209
DOI: https://doi.org/10.26483/ijarcs.v8i5.3210
DOI: https://doi.org/10.26483/ijarcs.v8i5.3211

Pre-processing Steps on Bilingual Corpus for SMT

Abhijit Paul, Prof. Bipul Syam Purkayastha

101-105

DOI: https://doi.org/10.26483/ijarcs.v8i5.3212
DOI: https://doi.org/10.26483/ijarcs.v8i5.3213
DOI: https://doi.org/10.26483/ijarcs.v8i5.3214

Efficiency Evaluation of DSR and AODV On-demand protocols in Wireless MANETs

Dinesh Mahajan, Dr. Ajay Kumar, Dr. Rajiv Mahajan

116-119

DOI: https://doi.org/10.26483/ijarcs.v8i5.3250

A METRIC BASED APPROACH FOR MANAGING ARCHITECTURE-RELATED IMPEDIMENTS

HARSHAVARDHAN METLA, DHARMENDHRA MAKINENI, MANIKANTA ELLENKI, PRANAY RATAKONDA

120-124

DOI: https://doi.org/10.26483/ijarcs.v8i5.3216

DoS Attacks in Internet of Things

Vahid Shaker, Houman Zarrabi

125-128

DOI: https://doi.org/10.26483/ijarcs.v8i5.3217

A Study on the Current Trends in Software Testing Tools

Siddharth Bhargava, Sahil Guleria, Ajita Ajita, Gaurang Gaurang

129-131

DOI: https://doi.org/10.26483/ijarcs.v8i5.3219
DOI: https://doi.org/10.26483/ijarcs.v8i5.3222
DOI: https://doi.org/10.26483/ijarcs.v8i5.3223
DOI: https://doi.org/10.26483/ijarcs.v8i5.3226
DOI: https://doi.org/10.26483/ijarcs.v8i5.3229

Recovery of TSV Based 3D IC

Sudeep Ghosh, Mandira Banik, Tridib Chakraborty

149-153

DOI: https://doi.org/10.26483/ijarcs.v8i5.3232

upcoming 5-G Wireless technology and its security concept

Mohammad Sadique Ansari, Jawed Ahmed

154-158

DOI: https://doi.org/10.26483/ijarcs.v8i5.3245
DOI: https://doi.org/10.26483/ijarcs.v8i5.3248
DOI: https://doi.org/10.26483/ijarcs.v8i5.3254
DOI: https://doi.org/10.26483/ijarcs.v8i5.3259
DOI: https://doi.org/10.26483/ijarcs.v8i5.3264
DOI: https://doi.org/10.26483/ijarcs.v8i5.3268
DOI: https://doi.org/10.26483/ijarcs.v8i5.3269
DOI: https://doi.org/10.26483/ijarcs.v8i5.3270
DOI: https://doi.org/10.26483/ijarcs.v8i5.3271
DOI: https://doi.org/10.26483/ijarcs.v8i5.3272

Automated Detection of Leukemia

RupinderKaur Sandhu, Dr. Raman Maini

210-212

DOI: https://doi.org/10.26483/ijarcs.v8i5.3273
DOI: https://doi.org/10.26483/ijarcs.v8i5.3274
DOI: https://doi.org/10.26483/ijarcs.v8i5.3275
DOI: https://doi.org/10.26483/ijarcs.v8i5.3276
DOI: https://doi.org/10.26483/ijarcs.v8i5.3280
DOI: https://doi.org/10.26483/ijarcs.v8i5.3282
DOI: https://doi.org/10.26483/ijarcs.v8i5.3283
DOI: https://doi.org/10.26483/ijarcs.v8i5.3284
DOI: https://doi.org/10.26483/ijarcs.v8i5.3285
DOI: https://doi.org/10.26483/ijarcs.v8i5.3286

Network Management Using Software Defined Networking

Er.Jaspreet Singh, Er. Yadwinder Kaur

261-265

DOI: https://doi.org/10.26483/ijarcs.v8i5.3287
DOI: https://doi.org/10.26483/ijarcs.v8i5.3288
DOI: https://doi.org/10.26483/ijarcs.v8i5.3290
DOI: https://doi.org/10.26483/ijarcs.v8i5.3291
DOI: https://doi.org/10.26483/ijarcs.v8i5.3292
DOI: https://doi.org/10.26483/ijarcs.v8i5.3294
DOI: https://doi.org/10.26483/ijarcs.v8i5.3296

Monitoring Suspicious Discussions on Social Media Case Study

TRIDIB CHAKRABORTY, Jeevan Krishna Ghosh, Puja Datta, Aliva Ghosh

315-317

DOI: https://doi.org/10.26483/ijarcs.v8i5.3297
DOI: https://doi.org/10.26483/ijarcs.v8i5.3299
DOI: https://doi.org/10.26483/ijarcs.v8i5.3300
DOI: https://doi.org/10.26483/ijarcs.v8i5.3301

Survey on Security Mechanisms In NoSQL Databases

Dindoliwala Vaishali J, Dr. Morena Rustom D.

333-338

DOI: https://doi.org/10.26483/ijarcs.v8i5.3302

A Survey on Context-Based Seek For Keyword

Dipalee P.More, Prof. Ujwala M. Patil

339-342

DOI: https://doi.org/10.26483/ijarcs.v8i5.3303
DOI: https://doi.org/10.26483/ijarcs.v8i5.3304

REVIEW ON VARIOUS ROUTING PROTOCOLS IN VANETS

Er.Jayant Vats, Dr. Gaurav Tejpal, Dr. Sonal Sharma

348-353

DOI: https://doi.org/10.26483/ijarcs.v8i5.3305
DOI: https://doi.org/10.26483/ijarcs.v8i5.3306

Information Security using Adaptive Multidimensional Playfair Cipher

Krishnaraj Bhat, Dindayal Mahto, Dilip Kumar Yadav

372-380

DOI: https://doi.org/10.26483/ijarcs.v8i5.3307

IMPLEMENTATION OF EVENT EXTRACTION FROM TWITTER USING LDA

Monika Gupta, Parul Gupta, Shruti Sharma

381-385

DOI: https://doi.org/10.26483/ijarcs.v8i5.3308

Implementation of a TTS System for Devanagari Konkani Language using Festival

Nilesh B. Fal Dessai, Gaurav A. Naik, Jyoti D. Pawar

386-391

DOI: https://doi.org/10.26483/ijarcs.v8i5.3309

Preventive Measures and Incident Response for Locky Ransomware

Kulkarni Pooja Prakash, Tabrez Nafis, Dr. Siddhartha Sankar Biswas

392-395

DOI: https://doi.org/10.26483/ijarcs.v8i5.3311
DOI: https://doi.org/10.26483/ijarcs.v8i5.3312
DOI: https://doi.org/10.26483/ijarcs.v8i5.3313
DOI: https://doi.org/10.26483/ijarcs.v8i5.3314

A Review on QR Codes: Colored and Image Embedded

Seema Ahlawat, Dr. Chhavi Rana, Rashmi Sindhu

410-413

DOI: https://doi.org/10.26483/ijarcs.v8i5.3315

CLOUD COMPUTING IN HIGHER EDUCATION IN INDIA

Ruzaina Khan, Prof. M. Afshar Alam

414-422

DOI: https://doi.org/10.26483/ijarcs.v8i5.3318
DOI: https://doi.org/10.26483/ijarcs.v8i5.3319

Survey of Web Crawler Algorithms

Abhinav Garg, Kratika Gupta, Abhijeet Singh

426-428

DOI: https://doi.org/10.26483/ijarcs.v8i5.3321
DOI: https://doi.org/10.26483/ijarcs.v8i5.3322
DOI: https://doi.org/10.26483/ijarcs.v8i5.3327
DOI: https://doi.org/10.26483/ijarcs.v8i5.3328
DOI: https://doi.org/10.26483/ijarcs.v8i5.3330
DOI: https://doi.org/10.26483/ijarcs.v8i5.3331

Automotive refuge concept using embedded and computing approaches

Suraj U Rasal, Kratika Gupta, Varsha Rasal, Shraddha Shelar

458-464

DOI: https://doi.org/10.26483/ijarcs.v8i5.3333
DOI: https://doi.org/10.26483/ijarcs.v8i5.3334

Survey on Natural Language Database Interfaces

Dr.Shailender Kumar, Abhilasha Gautam, Satvic Mittal

469-473

DOI: https://doi.org/10.26483/ijarcs.v8i5.3335

Mobile Application for General Stores

Dr. D Asir Antony Gnana Singh, Dr. E. Jebamalar Leavline, R. Pravin Kumar

474-476

DOI: https://doi.org/10.26483/ijarcs.v8i5.3337
DOI: https://doi.org/10.26483/ijarcs.v8i5.3339
DOI: https://doi.org/10.26483/ijarcs.v8i5.3338
DOI: https://doi.org/10.26483/ijarcs.v8i5.3340
DOI: https://doi.org/10.26483/ijarcs.v8i5.3341
DOI: https://doi.org/10.26483/ijarcs.v8i5.3342

Vantages of Adaptive Multidimensional Playfair Cipher over AES-256 and RSA-2048

Krishnaraj Bhat, Dindayal Mahto, Dilip Kumar Yadav

498-500

DOI: https://doi.org/10.26483/ijarcs.v8i5.3343
DOI: https://doi.org/10.26483/ijarcs.v8i5.3415
DOI: https://doi.org/10.26483/ijarcs.v8i5.3344

Energy Efficient Vertical Handoff Algorithms – A Review

Priyanka Rani, Dr.Himanshu Monga, Silki Baghla, Dr.Himanshu Monga, Silki Baghla

512-516

DOI: https://doi.org/10.26483/ijarcs.v8i5.3345
DOI: https://doi.org/10.26483/ijarcs.v8i5.3350
DOI: https://doi.org/10.26483/ijarcs.v8i5.3351
DOI: https://doi.org/10.26483/ijarcs.v8i5.3352

A Trend Analysis of Information Retrieval Models

Dr.M Balamurugan, E. Iyswarya

531-534

DOI: https://doi.org/10.26483/ijarcs.v8i5.3354
DOI: https://doi.org/10.26483/ijarcs.v8i5.3355
DOI: https://doi.org/10.26483/ijarcs.v8i5.3358

Sentimental Classification of Social Media using Data Mining

Farhan Laeeq, Md. Tabrez Nafis and Mirza Rahil Beg

546-549

DOI: https://doi.org/10.26483/ijarcs.v8i5.3360
DOI: https://doi.org/10.26483/ijarcs.v8i5.3361
DOI: https://doi.org/10.26483/ijarcs.v8i5.3362
DOI: https://doi.org/10.26483/ijarcs.v8i5.3363

Segregation of waste using IOT

Harshita Joshi, Amit Mittal

565-567

DOI: https://doi.org/10.26483/ijarcs.v8i5.3364
DOI: https://doi.org/10.26483/ijarcs.v8i5.3365
DOI: https://doi.org/10.26483/ijarcs.v8i5.3366
DOI: https://doi.org/10.26483/ijarcs.v8i5.3368
DOI: https://doi.org/10.26483/ijarcs.v8i5.3370

Dynamic software metric estimation (DSME): Tool using ArgoUML

P.L. POWAR, Samar Upadhyay, M.P. Singh, Bharat Solanki

591-602

DOI: https://doi.org/10.26483/ijarcs.v8i5.3372
DOI: https://doi.org/10.26483/ijarcs.v8i5.3373

Low Cost Fire Alarm System with Sprinkler

Vikram Rajput, Aparna Bimal, Abishek K, Utkarsh Sinha, Aditya Babu K.C, S Raj kumar

607-609

DOI: https://doi.org/10.26483/ijarcs.v8i5.3374

Efficient Technique for Image morphing in natural images

Anupama Gautam, Mr. Ram Singar Verma

610-615

DOI: https://doi.org/10.26483/ijarcs.v8i5.3376

Efficient Image morphing algorithm using Laplacian Pyramids

Anupama Gautam, Mr. Ram Singar Verma

616-620

DOI: https://doi.org/10.26483/ijarcs.v8i5.3377
DOI: https://doi.org/10.26483/ijarcs.v8i5.3378
DOI: https://doi.org/10.26483/ijarcs.v8i5.3379
DOI: https://doi.org/10.26483/ijarcs.v8i5.3380
DOI: https://doi.org/10.26483/ijarcs.v8i5.3381

Students Academic Performance Using Partitioning Clustering Algorithms

Humamuddin , Md. Tabrez Nafis, Syed Taha Owais

640-644

DOI: https://doi.org/10.26483/ijarcs.v8i5.3382
DOI: https://doi.org/10.26483/ijarcs.v8i5.3383
DOI: https://doi.org/10.26483/ijarcs.v8i5.3384
DOI: https://doi.org/10.26483/ijarcs.v8i5.3215

Cyber Security Risks and Challenges in Supply Chain

Om Pal, Vandana Srivastava and Bashir Alam

662-666

DOI: https://doi.org/10.26483/ijarcs.v8i5.3385
DOI: https://doi.org/10.26483/ijarcs.v8i5.3387
DOI: https://doi.org/10.26483/ijarcs.v8i5.3390
DOI: https://doi.org/10.26483/ijarcs.v8i5.3392

Performance Analysis of Naïve Bayes Algorithm on Crime Data Using Rapid Miner

Waseem Ahmed, Dr. Siddhartha Sankar Biswas, Tabrez Nafis

683-687

DOI: https://doi.org/10.26483/ijarcs.v8i5.3393
DOI: https://doi.org/10.26483/ijarcs.v8i5.3398

AN IMAGE RETRIEVAL FRAMEWORK: A REVIEW

Mohd Aquib Ansari, Manish Dixit

692-699

DOI: https://doi.org/10.26483/ijarcs.v8i5.3399

Fuzzy Neural Networks

C.R kavitha

700-704

DOI: https://doi.org/10.26483/ijarcs.v8i5.3400
DOI: https://doi.org/10.26483/ijarcs.v8i5.3401
DOI: https://doi.org/10.26483/ijarcs.v8i5.3359
DOI: https://doi.org/10.26483/ijarcs.v8i5.3402
DOI: https://doi.org/10.26483/ijarcs.v8i5.3403

Raga Identification Using MFCC and Chroma features

Ms Kavita.M Deshmukh, Prof. Dr. Pramod. J. Deore

725-729

DOI: https://doi.org/10.26483/ijarcs.v8i5.3405
DOI: https://doi.org/10.26483/ijarcs.v8i5.3406
DOI: https://doi.org/10.26483/ijarcs.v8i5.3407

Basic Analysis of Docker Networking

Samyukta S Hegde, Jayarekha P

740-743

DOI: https://doi.org/10.26483/ijarcs.v8i5.3408
DOI: https://doi.org/10.26483/ijarcs.v8i5.3409
DOI: https://doi.org/10.26483/ijarcs.v8i5.3410
DOI: https://doi.org/10.26483/ijarcs.v8i5.3411
DOI: https://doi.org/10.26483/ijarcs.v8i5.3413
DOI: https://doi.org/10.26483/ijarcs.v8i5.3414

Text Recognition Using Image Processing

Tridib Chakraborty, Chowdhury Md Mizan, Suparna Karmakar

765-768

DOI: https://doi.org/10.26483/ijarcs.v8i5.3416
DOI: https://doi.org/10.26483/ijarcs.v8i5.3417
DOI: https://doi.org/10.26483/ijarcs.v8i5.3418
DOI: https://doi.org/10.26483/ijarcs.v8i5.3419
DOI: https://doi.org/10.26483/ijarcs.v8i5.3422

On Intuitionistic Fuzzy Rough Sets

Sheeja T K, Sunny Kuriakose A

787-792

DOI: https://doi.org/10.26483/ijarcs.v8i5.3423
DOI: https://doi.org/10.26483/ijarcs.v8i5.3424
DOI: https://doi.org/10.26483/ijarcs.v8i5.3425

PRESERVING PRIVACY DURING BIG DATA PUBLISHING USING K-ANONYMITY MODEL – A SURVEY

DIVYA SADHWANI, DR. SANJAY SILAKARI, MR. UDAY CHOURASIA

801-810

DOI: https://doi.org/10.26483/ijarcs.v8i5.3426
DOI: https://doi.org/10.26483/ijarcs.v8i5.3429

Dictionary based Sentiment Analysis of Hinglish Text

harpreet kaur, Veenu Mangat, Nidhi krail

816-822

DOI: https://doi.org/10.26483/ijarcs.v8i5.3438
DOI: https://doi.org/10.26483/ijarcs.v8i5.3440
DOI: https://doi.org/10.26483/ijarcs.v8i5.3441
DOI: https://doi.org/10.26483/ijarcs.v8i5.3444
DOI: https://doi.org/10.26483/ijarcs.v8i5.3453
DOI: https://doi.org/10.26483/ijarcs.v8i5.3454

Review On Parkinson Disease Detection Techniques

Baljinder Kaur, Dr. Himanshu Aggarwal

850-852

DOI: https://doi.org/10.26483/ijarcs.v8i5.3457
DOI: https://doi.org/10.26483/ijarcs.v8i5.3458

DATA MINING ON CUSTOMER SEGMENTATION: A REVIEW

Er.Rupampreet kaur, Er.Kiranbir kaur

857-861

DOI: https://doi.org/10.26483/ijarcs.v8i5.3479
DOI: https://doi.org/10.26483/ijarcs.v8i5.3462
DOI: https://doi.org/10.26483/ijarcs.v8i5.3463
DOI: https://doi.org/10.26483/ijarcs.v8i5.3465
DOI: https://doi.org/10.26483/ijarcs.v8i5.3467
DOI: https://doi.org/10.26483/ijarcs.v8i5.3471

Security in Cloud Based Applications

Nikhil Kumar Singh, Jitendra Kurmi

885-889

DOI: https://doi.org/10.26483/ijarcs.v8i5.3466
DOI: https://doi.org/10.26483/ijarcs.v8i5.3468
DOI: https://doi.org/10.26483/ijarcs.v8i5.3474
DOI: https://doi.org/10.26483/ijarcs.v8i5.3476
DOI: https://doi.org/10.26483/ijarcs.v8i5.3480
DOI: https://doi.org/10.26483/ijarcs.v8i5.3484
DOI: https://doi.org/10.26483/ijarcs.v8i5.3486
DOI: https://doi.org/10.26483/ijarcs.v8i5.3487

Security of Private Cloud with Log Analysis and Encryped Channel

Kuntal Shah, Prof. Chandresh Parekh, Asst.Prof. Bhadresh Gohil

922-927

DOI: https://doi.org/10.26483/ijarcs.v8i5.3489
DOI: https://doi.org/10.26483/ijarcs.v8i5.3493
DOI: https://doi.org/10.26483/ijarcs.v8i5.3498
DOI: https://doi.org/10.26483/ijarcs.v8i5.3499
DOI: https://doi.org/10.26483/ijarcs.v8i5.3501
DOI: https://doi.org/10.26483/ijarcs.v8i5.3502
DOI: https://doi.org/10.26483/ijarcs.v8i5.3503

Improved VoIP QoS over Wireless Networks

Neha Tiwari, Dr. O.P. Rishi

959-963

DOI: https://doi.org/10.26483/ijarcs.v8i5.3504

Toxic Comment Tools: A Case Study

Pooja Parekh, Hetal Patel

964-967

DOI: https://doi.org/10.26483/ijarcs.v8i5.3506
DOI: https://doi.org/10.26483/ijarcs.v8i5.3511

Performance Comparison of LEACH & PASCCC Clustering Protocols

GOPAL SHARMA, LOVE KUMAR, Varsha Sahni

976-980

DOI: https://doi.org/10.26483/ijarcs.v8i5.3513
DOI: https://doi.org/10.26483/ijarcs.v8i5.3514
DOI: https://doi.org/10.26483/ijarcs.v8i5.3515
DOI: https://doi.org/10.26483/ijarcs.v8i5.3516

A Combined Genetic Algorithm for Symmetric Travelling Salesman Problem

Avik Mitra, Baiduryya Sarkar, Somnath Bhattacharyya

995-998

DOI: https://doi.org/10.26483/ijarcs.v8i5.3517
DOI: https://doi.org/10.26483/ijarcs.v8i5.3518

Scrutinizing Near Duplicate Document Detection Techniques

Farheen Naaz, Dr. Farheen Siddique

1003-1005

DOI: https://doi.org/10.26483/ijarcs.v8i5.3519
DOI: https://doi.org/10.26483/ijarcs.v8i5.3520
DOI: https://doi.org/10.26483/ijarcs.v8i5.3521
DOI: https://doi.org/10.26483/ijarcs.v8i5.3523
DOI: https://doi.org/10.26483/ijarcs.v8i5.3536
DOI: https://doi.org/10.26483/ijarcs.v8i5.3542
DOI: https://doi.org/10.26483/ijarcs.v8i5.3552

Role of Data Mining: A Survey and its Implications

Amit Singh, Santosh Kumar Agray

1039-1042

DOI: https://doi.org/10.26483/ijarcs.v8i5.3561
DOI: https://doi.org/10.26483/ijarcs.v8i5.3562
DOI: https://doi.org/10.26483/ijarcs.v8i5.3563
DOI: https://doi.org/10.26483/ijarcs.v8i5.3564

An Effective Nearest Keyword Search In Multifaceted Datasets

L Lakshmi, P Bhaskara Reddy, C.Shoba Bindu, S.Bhavya Sri

1059-1063

DOI: https://doi.org/10.26483/ijarcs.v8i5.3566

A REVIEW OF EMPIRICAL MODELING IN SOFTWARE ENGINEERING

ManojKumar Chaudhary, Alka Alka

1064-1067

DOI: https://doi.org/10.26483/ijarcs.v8i5.3567
DOI: https://doi.org/10.26483/ijarcs.v8i5.3569
DOI: https://doi.org/10.26483/ijarcs.v8i5.3571
DOI: https://doi.org/10.26483/ijarcs.v8i5.3572

Cloud Computing Security issue with solution

Prabhjot Rihal, Dr.Parul Agarwal

1089-1091

DOI: https://doi.org/10.26483/ijarcs.v8i5.3573

Exploring the techniques of Classification Rule Mining

Rabiya Shamsheer, Dr. Parul Agarwal

1092-1094

DOI: https://doi.org/10.26483/ijarcs.v8i5.3574
DOI: https://doi.org/10.26483/ijarcs.v8i5.3575
DOI: https://doi.org/10.26483/ijarcs.v8i5.3576
DOI: https://doi.org/10.26483/ijarcs.v8i5.3577

Review of Programming Languages and Tools for Big Data Analytics

Tamanna Siddiqui, Mohammad AlKadri, Najeeb Ahmad Khan

1112-1118

DOI: https://doi.org/10.26483/ijarcs.v8i5.3578

An Overview of Some Data Mining Clustering Techniques

Anup D. Sonawane, Vijay Birchha, Preetesh Purohit

1119-1122

DOI: https://doi.org/10.26483/ijarcs.v8i5.3580

Implementation of Enhanced E-Learning in Cloud Environment using MVC Architecture

Sindhu Bharathi A, Senthilkumar T, Valarmathi A, Nalini S

1123-1126

DOI: https://doi.org/10.26483/ijarcs.v8i5.3634
DOI: https://doi.org/10.26483/ijarcs.v8i5.3655

Analysis of Robot Detection approaches for ethical and unethical robots on Web server log

Mitali Srivastava, Atul kumar Srivastava, Rakhi Garg, P. K. Mishra

1132-1134

DOI: https://doi.org/10.26483/ijarcs.v8i5.3656
DOI: https://doi.org/10.26483/ijarcs.v8i5.3657

Secure message encryption using Nth prime

Kumar shanu, Ehtiram Khan

1139-1142

DOI: https://doi.org/10.26483/ijarcs.v8i5.3658

Hand Gesture based Home Control Device using IoT

Mitangi Patel, Sharnil Pandya, Satvik Patel

1143-1146

DOI: https://doi.org/10.26483/ijarcs.v8i5.3659

Malware Detection And Analysis

Mohd Hamzah Khan, Ihtiram Raza Khan

1147-1149

DOI: https://doi.org/10.26483/ijarcs.v8i5.3660
DOI: https://doi.org/10.26483/ijarcs.v8i5.3661
DOI: https://doi.org/10.26483/ijarcs.v8i5.3662

Transient Thermoelastic Problem of Semi Infinite Rectangular Beam

N W Khobragade, Shalu Barai, M. S Warbhe

1160-1165

DOI: https://doi.org/10.26483/ijarcs.v8i5.3665
DOI: https://doi.org/10.26483/ijarcs.v8i5.3672
DOI: https://doi.org/10.26483/ijarcs.v8i5.3663

Thermoelastic Problems of a Hollow Cylinder and its Thermal Stresses

N W Khobragade, Sachin Chauthale, Sachin Chauthale

1173-1179

DOI: https://doi.org/10.26483/ijarcs.v8i5.3666
DOI: https://doi.org/10.26483/ijarcs.v8i5.3673
DOI: https://doi.org/10.26483/ijarcs.v8i5.3674

Spam Mail Detection Using Hybrid Secure Hash Based Naive Classifier

Sana Ajaz, Md. Tabrez Nafis, Vishal Sharma

1195-1199

DOI: https://doi.org/10.26483/ijarcs.v8i5.3675
DOI: https://doi.org/10.26483/ijarcs.v8i5.3664
DOI: https://doi.org/10.26483/ijarcs.v8i5.3667
DOI: https://doi.org/10.26483/ijarcs.v8i5.3715

Solution of Game Theory Problems by New Approach

N W Khobragade, Kalpana Lokhande, P. G. Khot

1214-1221

DOI: https://doi.org/10.26483/ijarcs.v8i5.3668
DOI: https://doi.org/10.26483/ijarcs.v8i5.3669
DOI: https://doi.org/10.26483/ijarcs.v8i5.3792
DOI: https://doi.org/10.26483/ijarcs.v8i5.3817

Smart City with Internet of Things

RevathiLavanya Baggam

1242-1245

DOI: https://doi.org/10.26483/ijarcs.v8i5.3825

INVESTIGATING FACE RECOGNITION Techniques for PCA AND BPNN

Rupinder Kaur, Dr. Pardeep Mittal, Ms. Shalini Aggarwal

1246-1249

DOI: https://doi.org/10.26483/ijarcs.v8i5.3826
DOI: https://doi.org/10.26483/ijarcs.v8i5.3827
DOI: https://doi.org/10.26483/ijarcs.v8i5.3830
DOI: https://doi.org/10.26483/ijarcs.v8i5.3948
DOI: https://doi.org/10.26483/ijarcs.v8i5.3949

Study of Text Content Mining for E-Commerce Web Sites

AK Shingarwade, Dr. P.N. Mulkalwar

1269-1274

DOI: https://doi.org/10.26483/ijarcs.v8i5.3961
DOI: https://doi.org/10.26483/ijarcs.v8i5.3980
DOI: https://doi.org/10.26483/ijarcs.v8i5.3991
DOI: https://doi.org/10.26483/ijarcs.v8i5.3371
DOI: https://doi.org/10.26483/ijarcs.v8i5.3427
DOI: https://doi.org/10.26483/ijarcs.v8i5.3526
DOI: https://doi.org/10.26483/ijarcs.v8i5.3547
DOI: https://doi.org/10.26483/ijarcs.v8i5.3559

Approach To Data Reduction In Data Warehouse

Md.Ishtiyaque Alam, Jawed Ahmed

1320-1323

DOI: https://doi.org/10.26483/ijarcs.v8i5.3568
DOI: https://doi.org/10.26483/ijarcs.v8i5.3570
DOI: https://doi.org/10.26483/ijarcs.v8i5.3582
DOI: https://doi.org/10.26483/ijarcs.v8i5.3607
DOI: https://doi.org/10.26483/ijarcs.v8i5.3617
DOI: https://doi.org/10.26483/ijarcs.v8i5.3618
DOI: https://doi.org/10.26483/ijarcs.v8i5.3632

Survey On Sentiment Analysis in Hindi Language

Komal Garg, Preetpal Kaur Buttar

1360-1363

DOI: https://doi.org/10.26483/ijarcs.v8i5.3973
DOI: https://doi.org/10.26483/ijarcs.v8i5.3647
DOI: https://doi.org/10.26483/ijarcs.v8i5.3649

A Review : An Optimized Technique For Image Segmentation

Arpit Kushwah, Manish Dixit, Kunal Gupta

1375-1380

DOI: https://doi.org/10.26483/ijarcs.v8i5.3996

Identification of Copper Content in Soil: A Review

S.T. Khajekar, R.R. Deshmukh

1381-1383

DOI: https://doi.org/10.26483/ijarcs.v8i5.3793

COMPREHENSIVE EVALUATION AND INTERPRETATION OF PCA ON MULTIPLE DATASETS

Rabia Nazir Mir, Abid Sarwar, Amit Sharma, Vinod Sharma

1384-1388

DOI: https://doi.org/10.26483/ijarcs.v8i5.3794

Quadratic Assignment Problem

Ankita Kalchuri, Prof. Raju Baraskar, Prof. Shikha Agarwal

1389-1394

DOI: https://doi.org/10.26483/ijarcs.v8i5.3796

Characterization of LF and LMA signal of Wire Rope Tester

Dalvir Kaur, Ritika Arora, Sarishti Chhabra, Sukesha Sharma

1395-1400

DOI: https://doi.org/10.26483/ijarcs.v8i5.3803

Node Scaling of Telecom services On Emerging Cloud

Huma Mehtab, Md Tabrez Nafis

1401-1405

DOI: https://doi.org/10.26483/ijarcs.v8i5.3807
DOI: https://doi.org/10.26483/ijarcs.v8i5.3809
DOI: https://doi.org/10.26483/ijarcs.v8i5.3815
DOI: https://doi.org/10.26483/ijarcs.v8i5.3816
DOI: https://doi.org/10.26483/ijarcs.v8i5.3820

PCA Based English Handwritten Digit Recognition

Yogish Naik G R, Amani Ali Ahmed Ali

1426-1429

DOI: https://doi.org/10.26483/ijarcs.v8i5.3253
DOI: https://doi.org/10.26483/ijarcs.v8i5.3386

Survey on various image encryption schemed Through Chaotic Maps

MissPooja Kathil, Mr. Sachin Goyal, Mr. Ratish Agrawal

1437-1441

DOI: https://doi.org/10.26483/ijarcs.v8i5.3821

A Review on Swarm Intelligence Techniques

Pooja Thakur, Chaavi Rana

1442-1446

DOI: https://doi.org/10.26483/ijarcs.v8i5.3824
DOI: https://doi.org/10.26483/ijarcs.v8i5.3829
DOI: https://doi.org/10.26483/ijarcs.v8i5.3970
DOI: https://doi.org/10.26483/ijarcs.v8i5.3988
DOI: https://doi.org/10.26483/ijarcs.v8i5.3984

Interval Type-2 Fuzzy Integral Based Iris Recognition

Thiyam Churjit Meetei, Shahin Ara Begum

1475-1481

DOI: https://doi.org/10.26483/ijarcs.v8i5.3255
DOI: https://doi.org/10.26483/ijarcs.v8i5.3310
DOI: https://doi.org/10.26483/ijarcs.v8i5.3323

Data at rest and it’s security solutions-A survey

Farheen siddiqui, Ghazala Matloob

1491-1493

DOI: https://doi.org/10.26483/ijarcs.v8i5.3436
DOI: https://doi.org/10.26483/ijarcs.v8i5.3522
DOI: https://doi.org/10.26483/ijarcs.v8i5.3555
DOI: https://doi.org/10.26483/ijarcs.v8i5.3583
DOI: https://doi.org/10.26483/ijarcs.v8i5.3616
DOI: https://doi.org/10.26483/ijarcs.v8i5.3633

The Design of Secure File Transfer with Speech Recognition

Anu Saini, Vinita Malik, Sukhdip sangwan

1519-1521

DOI: https://doi.org/10.26483/ijarcs.v8i5.3639
DOI: https://doi.org/10.26483/ijarcs.v8i5.3644
DOI: https://doi.org/10.26483/ijarcs.v8i5.3646
DOI: https://doi.org/10.26483/ijarcs.v8i5.3653
DOI: https://doi.org/10.26483/ijarcs.v8i5.3680

Artificial Intelligence based Ensemble Model for Diagnosis of Diabetes

Harsha Sethi, Anudeep Goraya, Vinod Sharma

1540-1548

DOI: https://doi.org/10.26483/ijarcs.v8i5.3805

An Application of Image Processing – License Plate Recognition

Manjit Sandhu, Sukhdeep Kaur, Jaipreet Kaur

1549-1553

DOI: https://doi.org/10.26483/ijarcs.v8i5.3819
DOI: https://doi.org/10.26483/ijarcs.v8i5.3850

A Research on data mining using machine learning

BABITA KUMARI, RAINU NANDAL, JYOTI KATARIA

1560-1566

DOI: https://doi.org/10.26483/ijarcs.v8i5.3858
DOI: https://doi.org/10.26483/ijarcs.v8i5.3875

A Mobile based Solution for School Management and Operation

Kaxa Chetanbhai Desai, Rahul Makwana, Jaiprakash Verma

1574-1577

DOI: https://doi.org/10.26483/ijarcs.v8i5.3947
DOI: https://doi.org/10.26483/ijarcs.v8i5.3965
DOI: https://doi.org/10.26483/ijarcs.v8i5.3971
DOI: https://doi.org/10.26483/ijarcs.v8i5.3977

Techniques used for determination of Biological Age

Ms.Nikita Sharma, Ms. Sakshi Sethi

1593-1596

DOI: https://doi.org/10.26483/ijarcs.v8i5.3979
DOI: https://doi.org/10.26483/ijarcs.v8i5.3983

IoT Based Shopping Store for Blind People

Anjana Jagde, Dr.Shubhangi D.C

1600-1605

DOI: https://doi.org/10.26483/ijarcs.v8i5.4008

FIXED POINT RESULTS IN RANDOM UNIFORM SPACE

Arjun kumar Mehra, Manoj Kumar Shukla

1606-1609

DOI: https://doi.org/10.26483/ijarcs.v8i5.4009

Design and Analysis of Efficient Collaborative Filtering Based Optimization Approach

Krishan Kant Yadav, Dr. Sanjiv Sharma, Dr. Manisha Singh

1610-1615

DOI: https://doi.org/10.26483/ijarcs.v8i5.4014
DOI: https://doi.org/10.26483/ijarcs.v8i5.4015
DOI: https://doi.org/10.26483/ijarcs.v8i5.4017
DOI: https://doi.org/10.26483/ijarcs.v8i5.4023
DOI: https://doi.org/10.26483/ijarcs.v8i5.4049
DOI: https://doi.org/10.26483/ijarcs.v8i5.3375
DOI: https://doi.org/10.26483/ijarcs.v8i5.3207
DOI: https://doi.org/10.26483/ijarcs.v8i5.3233

DIGITALIZATION OF STUDENT'S PROFORMA

meenakshi k, Dr. T. Senthilkumar T, Dr. A. Valarmathi A, Mrs. S. Nalini S

1656-1660

DOI: https://doi.org/10.26483/ijarcs.v8i5.3258
DOI: https://doi.org/10.26483/ijarcs.v8i5.3265
DOI: https://doi.org/10.26483/ijarcs.v8i5.3348
DOI: https://doi.org/10.26483/ijarcs.v8i5.3357
DOI: https://doi.org/10.26483/ijarcs.v8i5.3421
DOI: https://doi.org/10.26483/ijarcs.v8i5.3431

Conspectus Of Nebulizers

Guna Sahiti Kondari, Shivani Prasad, Sakshi Sethi

1697-1699

DOI: https://doi.org/10.26483/ijarcs.v8i5.3448
DOI: https://doi.org/10.26483/ijarcs.v8i5.3485
DOI: https://doi.org/10.26483/ijarcs.v8i5.3512
DOI: https://doi.org/10.26483/ijarcs.v8i5.3528
DOI: https://doi.org/10.26483/ijarcs.v8i5.3543
DOI: https://doi.org/10.26483/ijarcs.v8i5.3550

Classification in the Retrieval Phase of Case-based Reasoning

Nabanita Choudhury, Shahin Ara Begum

1728-1731

DOI: https://doi.org/10.26483/ijarcs.v8i5.3553
DOI: https://doi.org/10.26483/ijarcs.v8i5.3581
DOI: https://doi.org/10.26483/ijarcs.v8i5.3619
DOI: https://doi.org/10.26483/ijarcs.v8i5.3623
DOI: https://doi.org/10.26483/ijarcs.v8i5.3802
DOI: https://doi.org/10.26483/ijarcs.v8i5.3804
DOI: https://doi.org/10.26483/ijarcs.v8i5.3811
DOI: https://doi.org/10.26483/ijarcs.v8i5.3814
DOI: https://doi.org/10.26483/ijarcs.v8i5.3822
DOI: https://doi.org/10.26483/ijarcs.v8i5.3812

Comparative Analysis of K-Means using MapReduce

Humam Siddiqui, Safdar Tanweer

1791-1794

DOI: https://doi.org/10.26483/ijarcs.v8i5.4013
DOI: https://doi.org/10.26483/ijarcs.v8i5.4044
DOI: https://doi.org/10.26483/ijarcs.v8i5.3813

Improving the Performance of Single Core Processor using FPGA’s

SATYANARAYANA M S, ARUNA T M, DIVYARAJ G N

1806-1808

DOI: https://doi.org/10.26483/ijarcs.v8i5.3833
DOI: https://doi.org/10.26483/ijarcs.v8i5.3849

Analysis of Finger Vein Based in Recognition

Umesh Parjapati, Harkesh Sehrawat, Vikas Siwach

1818-1823

DOI: https://doi.org/10.26483/ijarcs.v8i5.3852
DOI: https://doi.org/10.26483/ijarcs.v8i5.3862
DOI: https://doi.org/10.26483/ijarcs.v8i5.3863

Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

Rajat Malik, Harkesh Sehrawat, Dr Yudhvir Singh

1835-1838

DOI: https://doi.org/10.26483/ijarcs.v8i5.3876
DOI: https://doi.org/10.26483/ijarcs.v8i5.3880
DOI: https://doi.org/10.26483/ijarcs.v8i5.3915
DOI: https://doi.org/10.26483/ijarcs.v8i5.3962

AN OVERVIEW OF B+ TREE PERFORMANCE

Amulya Singh, Bhavya Alankar

1856-1857

DOI: https://doi.org/10.26483/ijarcs.v8i5.3963

A Review on CLOUD Security and its Issues using various Symmetric Key Encryption Algorithm

MsDeepika Jalhotra, Dr. Pardeep Kumar, Ms. Shalini Aggarwal

1858-1861

DOI: https://doi.org/10.26483/ijarcs.v8i5.3966

Performance Analysis on Energy Efficient Protocols in Wireless Sensor Networks

Ms.Divya Garg, Dr. Pardeep Kumar, Ms. Shalini Aggarwal

1862-1869

DOI: https://doi.org/10.26483/ijarcs.v8i5.3967

Review of Image Fusion and its techniques

Harmanpreet Kaur, Navleen Kaur

1870-1876

DOI: https://doi.org/10.26483/ijarcs.v8i5.3968

DRIVERLESS METRO USING REGENERATIVE BRAKING SYSTEM KHUSHBOO RAHIM, MOHD. TANVEER

JAGANDEEP KAUR, KHUSHBOO RAHIM, MOHD. TANVEER and SANDEEP SONI

1877-1880

DOI: https://doi.org/10.26483/ijarcs.v8i5.3969
DOI: https://doi.org/10.26483/ijarcs.v8i5.4052

OntoExtractor : A Tool for Ontology Extraction From ER/EER diagrams

Kurman Sangeeta, Palakollu Srinivasa Rao

1885-1890

DOI: https://doi.org/10.26483/ijarcs.v8i5.3975
DOI: https://doi.org/10.26483/ijarcs.v8i5.3976
DOI: https://doi.org/10.26483/ijarcs.v8i5.3978
DOI: https://doi.org/10.26483/ijarcs.v8i5.4011
DOI: https://doi.org/10.26483/ijarcs.v8i5.3841
DOI: https://doi.org/10.26483/ijarcs.v8i5.4018
DOI: https://doi.org/10.26483/ijarcs.v8i5.4051

ANALYSIS BASED IDS FOR MOBILE AD-HOC NETWORK

PravinN Khobragade, Prof. Vimla Jethani

1922-1932

DOI: https://doi.org/10.26483/ijarcs.v8i5.4025
DOI: https://doi.org/10.26483/ijarcs.v8i5.4019
DOI: https://doi.org/10.26483/ijarcs.v8i5.4021

Sentiment Analysis of Movie Reviews

PravinN Khobragade, Prof. Vimla Jethani

1941-1949

DOI: https://doi.org/10.26483/ijarcs.v8i5.4026
DOI: https://doi.org/10.26483/ijarcs.v8i5.4045
DOI: https://doi.org/10.26483/ijarcs.v8i5.4030
DOI: https://doi.org/10.26483/ijarcs.v8i5.4027
DOI: https://doi.org/10.26483/ijarcs.v8i5.4037

Probabilistic Threshold Query on uncertain data using SVM

Ms.Kavita Shevale, Prof.Gajanan Bhole

1967-1969

DOI: https://doi.org/10.26483/ijarcs.v8i5.4040
DOI: https://doi.org/10.26483/ijarcs.v8i5.4028

Data Integrity Check in Cloud Computing using Hash Function

Shephali Singh, Puneet Sharma, Dr. Deepak Arora

1974-1978

DOI: https://doi.org/10.26483/ijarcs.v8i5.4057

FIREWALLS: A STUDY AND ITS CLASSIFICATION

Richa Sharma, Chandresh Parekh

1979-1983

DOI: https://doi.org/10.26483/ijarcs.v8i5.3412
DOI: https://doi.org/10.26483/ijarcs.v8i5.3964
DOI: https://doi.org/10.26483/ijarcs.v8i5.3478
DOI: https://doi.org/10.26483/ijarcs.v8i5.3605
DOI: https://doi.org/10.26483/ijarcs.v8i5.3643
DOI: https://doi.org/10.26483/ijarcs.v8i5.3681
DOI: https://doi.org/10.26483/ijarcs.v8i5.3775
DOI: https://doi.org/10.26483/ijarcs.v8i5.3799

Improved AES for Data Security in E-Health

Aashmeen Jammu, Dr. Harjinder Singh

2016-2020

DOI: https://doi.org/10.26483/ijarcs.v8i5.3842
DOI: https://doi.org/10.26483/ijarcs.v8i5.3846
DOI: https://doi.org/10.26483/ijarcs.v8i5.3851
DOI: https://doi.org/10.26483/ijarcs.v8i5.3866
DOI: https://doi.org/10.26483/ijarcs.v8i5.3935
DOI: https://doi.org/10.26483/ijarcs.v8i5.3942
DOI: https://doi.org/10.26483/ijarcs.v8i5.4006

Filter – PSO based approach for Feature Selection

Amit Saxena, Madan Madhaw Shrivas

2063-2073

DOI: https://doi.org/10.26483/ijarcs.v8i5.4007

Study of Vulnerabilities of ARP Spoofing and its detection using SNORT

RajneetKaur Bijral, Alka Gupta, Lalit Sen Sharma

2074-2077

DOI: https://doi.org/10.26483/ijarcs.v8i5.4016

Analysis of Image Stitching for Noisy Images using SIFT

Sarabjeet Kaur, Er. Sumandeep Kaur

2078-2082

DOI: https://doi.org/10.26483/ijarcs.v8i5.4020
DOI: https://doi.org/10.26483/ijarcs.v8i5.4024
DOI: https://doi.org/10.26483/ijarcs.v8i5.4035
DOI: https://doi.org/10.26483/ijarcs.v8i5.4039

A Comprehensive Survey of VANET Architectures and Design

Navpreet Panjrath, Ms Monika poriye

2099-2103

DOI: https://doi.org/10.26483/ijarcs.v8i5.4042

Recognizing Named Entities in Text based User Reviews

Richa Chaturvedi, Dr. Deepak Arora, Bramah Hazela, Pooja Khanna

2104-2107

DOI: https://doi.org/10.26483/ijarcs.v8i5.4046

An Hybrid Approach in Classification of Telugu Sentences

G. Pratibha, Dr.Nagaratna P Hegde

2108-2110

DOI: https://doi.org/10.26483/ijarcs.v8i5.4053
DOI: https://doi.org/10.26483/ijarcs.v8i5.4054

Investigation of Cloud Computing Security Issue

Prachi Garg, Dr. Sandeep Goel, Saurabh Garg

2117-2120

DOI: https://doi.org/10.26483/ijarcs.v8i5.4055

APP BASED DEVICE CONTROLLING SYSTEM

Tanvi.G Pareek, Raksha Padaki, Anuradha Iyer, Priya G

2121-2125

DOI: https://doi.org/10.26483/ijarcs.v8i5.4058
DOI: https://doi.org/10.26483/ijarcs.v8i5.4038

Database Connection Technology

Sonia Kumari, Manvendra Yadav, Kumari Seema Rani

2138-2143

DOI: https://doi.org/10.26483/ijarcs.v8i5.4075

SVM Based Classification of Sounds from Musical Instruments using MFCC Features

Sayantani Nandi, Madhura Banerjee, Parangama Sinha, Jayati Ghosh Dastidar

2144-2147

DOI: https://doi.org/10.26483/ijarcs.v8i5.3798
DOI: https://doi.org/10.26483/ijarcs.v8i5.3845
DOI: https://doi.org/10.26483/ijarcs.v8i5.3995
DOI: https://doi.org/10.26483/ijarcs.v8i5.4041
DOI: https://doi.org/10.26483/ijarcs.v8i5.4043
DOI: https://doi.org/10.26483/ijarcs.v8i5.4081
DOI: https://doi.org/10.26483/ijarcs.v8i5.4076

Customer Churn Prediction:A Survey

MsChinnuPJ ohny, Mr. Paul P. Mathai

2178-2181

DOI: https://doi.org/10.26483/ijarcs.v8i5.4079
DOI: https://doi.org/10.26483/ijarcs.v8i5.3881
DOI: https://doi.org/10.26483/ijarcs.v8i5.3869
DOI: https://doi.org/10.26483/ijarcs.v8i5.3388
DOI: https://doi.org/10.26483/ijarcs.v8i5.3918
DOI: https://doi.org/10.26483/ijarcs.v8i5.3985

Fog Based Cloud Computing: AReview

Rupinder Kaur, Er. Amanpreet Kaur

2207-2212

DOI: https://doi.org/10.26483/ijarcs.v8i5.3986

Penetration Testing in Wireless Networks

Harshdeep Singh, Dr. Jaswinder Singh

2213-2216

DOI: https://doi.org/10.26483/ijarcs.v8i5.4012
DOI: https://doi.org/10.26483/ijarcs.v8i5.4067

IMAGE ENHANCEMENT USING IMAGE FUSION TECHNIQUE

Mohini Yadav, Prof. Shamsher Malik

2222-2226

DOI: https://doi.org/10.26483/ijarcs.v8i5.4086
DOI: https://doi.org/10.26483/ijarcs.v8i5.4088
DOI: https://doi.org/10.26483/ijarcs.v8i5.3460

Outline and implementation of a biomedical sleep inducer

Aamir Manzoor Lone, Sakshi Sethi

2236-2240

DOI: https://doi.org/10.26483/ijarcs.v8i5.3445
DOI: https://doi.org/10.26483/ijarcs.v8i5.3614
DOI: https://doi.org/10.26483/ijarcs.v8i5.3738
DOI: https://doi.org/10.26483/ijarcs.v8i5.3855
DOI: https://doi.org/10.26483/ijarcs.v8i5.4089
DOI: https://doi.org/10.26483/ijarcs.v8i5.3867
DOI: https://doi.org/10.26483/ijarcs.v8i5.4056

Management of various risks over years in SDLC

Vinita Malik, Anu Saini, Sukhdip Sangwan, Mamta Ghalan

2277-2284

DOI: https://doi.org/10.26483/ijarcs.v8i5.4048
DOI: https://doi.org/10.26483/ijarcs.v8i5.4070

New Hybridization Technique for Enhancing Job Scheduling

Mini.Singh Ahuja, Mehmapreet Kaur

2289-2292

DOI: https://doi.org/10.26483/ijarcs.v8i5.4082

Review of Group Management Technique for Vehicular Ad-hoc Network (VANET)

Aditya Kumar Soni, Raju Baraskar, Rajeev Pandey

2293-2296

DOI: https://doi.org/10.26483/ijarcs.v8i5.3602
DOI: https://doi.org/10.26483/ijarcs.v8i5.3613
DOI: https://doi.org/10.26483/ijarcs.v8i5.3916
DOI: https://doi.org/10.26483/ijarcs.v8i5.3923

AgRo-Bot: An Autonomous Robot

SHUBHAM KHANDELWAL, NEHA KAUSHIK andSAGAR SHARMA kaushik and sharma, MANOJ KR. PANDEY, TEJENDER SINGH RAWAT

2318-2320

DOI: https://doi.org/10.26483/ijarcs.v8i5.3987
DOI: https://doi.org/10.26483/ijarcs.v8i5.3993

Confidentiality Estimation Model: Fault Perspective

Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan

2328-2332

DOI: https://doi.org/10.26483/ijarcs.v8i5.4068

Systematic Review of Smart Grid Analytics

Ashu Bhardwaj, Williamjeet Singh

2333-2338

DOI: https://doi.org/10.26483/ijarcs.v8i5.4069
DOI: https://doi.org/10.26483/ijarcs.v8i5.3806
DOI: https://doi.org/10.26483/ijarcs.v8i5.3909
DOI: https://doi.org/10.26483/ijarcs.v8i5.3959

Location Based Services Data Compression with Privacy Preserving in WSNs

KVijaya Bhaskar, Dr. R. Seshadri, Dr. A. Rama mohan Reddy

2353-2356

DOI: https://doi.org/10.26483/ijarcs.v8i5.3810
DOI: https://doi.org/10.26483/ijarcs.v8i5.3831

Research paper on diabetic data analysis

JYOTI KATARIA, BABITA KUMARI

2362-2368

DOI: https://doi.org/10.26483/ijarcs.v8i5.3861

GSM Based Patient Monitoring System

Pragati Sunil Lokhande

2369-2374

DOI: https://doi.org/10.26483/ijarcs.v8i5.3878
DOI: https://doi.org/10.26483/ijarcs.v8i5.3888
DOI: https://doi.org/10.26483/ijarcs.v8i5.3897
DOI: https://doi.org/10.26483/ijarcs.v8i5.3391

ANDROID INTERNAL ANALYSIS OF APK BY DROID_SAFE & APK TOOL

Heena Rawal, Mr. Chandresh Parekh

2397-2402

DOI: https://doi.org/10.26483/ijarcs.v8i5.3404

IoT Security and Hardware Implementation using DTMF 8870

Hemangi Khimani, Mr.Chandresh Parekh

2403-2406

DOI: https://doi.org/10.26483/ijarcs.v8i5.3461

A Analysis of LSB Technique in Video Steganography using PSNR and MSE

Anamika Saini, Kamaldeep Joshi, Kirti Sharma, Rainu Nandal

2407-2411

DOI: https://doi.org/10.26483/ijarcs.v8i5.3914
DOI: https://doi.org/10.26483/ijarcs.v8i5.3922
DOI: https://doi.org/10.26483/ijarcs.v8i5.3925
DOI: https://doi.org/10.26483/ijarcs.v8i5.3928
DOI: https://doi.org/10.26483/ijarcs.v8i5.3954
DOI: https://doi.org/10.26483/ijarcs.v8i5.4003
DOI: https://doi.org/10.26483/ijarcs.v8i5.4029
DOI: https://doi.org/10.26483/ijarcs.v8i5.4047
DOI: https://doi.org/10.26483/ijarcs.v8i5.4077

Power Evulsion through Speed Breakers using Pitman’s Rod Mechanism

SAHIL RAJPUT, ESHAN MAHAJAN, AMAN SHARMA, DEEPANSHU SHARMA, SONAL DAHIYA, RAJBIR

2446-2448

DOI: https://doi.org/10.26483/ijarcs.v8i5.4087

Data Mining Framework for Web Search Personalization

Mrs Geetha S, Prof.Rachana Dhannawat

2449-2452

DOI: https://doi.org/10.26483/ijarcs.v8i5.4096

AN ANALYTIC AND COMPARATIVE STUDY OF MAPREDUCE- A SYSTEMATIC REVIEW

Kamalpreet Kaur, Er. Gurjit Singh Bhathal, Dr. Gaurav Gupta

2453-2459

DOI: https://doi.org/10.26483/ijarcs.v8i5.4098
DOI: https://doi.org/10.26483/ijarcs.v8i5.3917
DOI: https://doi.org/10.26483/ijarcs.v8i5.3904
DOI: https://doi.org/10.26483/ijarcs.v8i5.3911
DOI: https://doi.org/10.26483/ijarcs.v8i5.4124
DOI: https://doi.org/10.26483/ijarcs.v8i5.3670
DOI: https://doi.org/10.26483/ijarcs.v8i5.3801
DOI: https://doi.org/10.26483/ijarcs.v8i5.3856
DOI: https://doi.org/10.26483/ijarcs.v8i5.3859
DOI: https://doi.org/10.26483/ijarcs.v8i5.3890
DOI: https://doi.org/10.26483/ijarcs.v8i5.3891
DOI: https://doi.org/10.26483/ijarcs.v8i5.3901
DOI: https://doi.org/10.26483/ijarcs.v8i5.3907
DOI: https://doi.org/10.26483/ijarcs.v8i5.3929

A Review : Comparative Study of Edge Detection Techniques

Arpit Kushwah, Kunal Gupta, Abhishek Agrawal, Gaurav Jain, Garima Agrawal

2528-2531

DOI: https://doi.org/10.26483/ijarcs.v8i5.4036

A Comparative Analysis of Unimodal and Multimodal Biometric Systems

Manisha Sharma, Prof. Raju Baraskar, Dr. Shikha Agrawal

2532-2539

DOI: https://doi.org/10.26483/ijarcs.v8i5.4071
DOI: https://doi.org/10.26483/ijarcs.v8i5.4094
DOI: https://doi.org/10.26483/ijarcs.v8i5.4097
DOI: https://doi.org/10.26483/ijarcs.v8i5.4107

Classification Technique for Sentiment Analysis of Twitter Data

Kirti Huda, Md Tabrez Nafis, Neshat Karim Shaukat

2551-2555

DOI: https://doi.org/10.26483/ijarcs.v8i5.3565
DOI: https://doi.org/10.26483/ijarcs.v8i5.3224
DOI: https://doi.org/10.26483/ijarcs.v8i5.3459

Model Order Reduction and Stability Analysis of Interval System

Ateet Kumar Srivastava, Awadhesh Kumar

2567-2572

DOI: https://doi.org/10.26483/ijarcs.v8i5.3277
DOI: https://doi.org/10.26483/ijarcs.v8i5.3278
DOI: https://doi.org/10.26483/ijarcs.v8i5.3336
DOI: https://doi.org/10.26483/ijarcs.v8i5.3293

Study of Image Morphing

Anupama Gautam, Ajay sahay

2587-2589

DOI: https://doi.org/10.26483/ijarcs.v8i5.3295
DOI: https://doi.org/10.26483/ijarcs.v8i5.3316
DOI: https://doi.org/10.26483/ijarcs.v8i5.4123

Defending Against Phishing: Case Studies

Shweta Sankhwar, Dhirendra Pandey

2605-2607

DOI: https://doi.org/10.26483/ijarcs.v8i5.3324

Analyzing Impact of Wavelet Thresholding for Image Compression

Dr.Rakesh Kumar Bansal, Dr Savina Bansal, Amandeep Kaur

2608-2613

DOI: https://doi.org/10.26483/ijarcs.v8i5.3389
DOI: https://doi.org/10.26483/ijarcs.v8i5.3451
DOI: https://doi.org/10.26483/ijarcs.v8i5.3452
DOI: https://doi.org/10.26483/ijarcs.v8i5.3464
DOI: https://doi.org/10.26483/ijarcs.v8i5.3507

WEB ENABLED DIGITALIZATION ADMISSION PROCESS FOR ACADEMIC INSTITUTIONS

T Mohan, Dr.T.Senthil Kumar, Dr.A. Valarmathi, Mrs. S. Nalini

2632-2636

DOI: https://doi.org/10.26483/ijarcs.v8i5.3716
DOI: https://doi.org/10.26483/ijarcs.v8i5.3717
DOI: https://doi.org/10.26483/ijarcs.v8i5.3808
DOI: https://doi.org/10.26483/ijarcs.v8i5.3912
DOI: https://doi.org/10.26483/ijarcs.v8i5.3924

Input based Attacks on web applications

Daljit Kaur, Parminder Kaur

2658-2664

DOI: https://doi.org/10.26483/ijarcs.v8i5.3946
DOI: https://doi.org/10.26483/ijarcs.v8i5.3956
DOI: https://doi.org/10.26483/ijarcs.v8i5.3972
DOI: https://doi.org/10.26483/ijarcs.v8i5.3981

A Survey of Error Correction for Next Generation Sequencing

Ramgopal Ahirwal, Prof. Anjana Deen, Dr. Piyush Kumar Shukla

2680-2682

DOI: https://doi.org/10.26483/ijarcs.v8i5.3982

REVIEW ON VARIOUS HAZE REMOVAL TECHNIQUES

Er.Sukhdeep Kaur, Er.Navleen Kaur

2683-2687

DOI: https://doi.org/10.26483/ijarcs.v8i5.4022

Improved Key Management in MANETS using Neural Networks

Naresh Kumari, Yudhvir Singh, Barjesh Kochar

2688-2690

DOI: https://doi.org/10.26483/ijarcs.v8i5.4072

REVIEW ON DNA COMPUTING BASED AUTHENTICATION TECHNIQUES

Er.Simranpreet Kaur, Er.VarinderKaur Attri

2691-2694

DOI: https://doi.org/10.26483/ijarcs.v8i5.4074

Review of Cyber Threats in Social Networking Websites

Amrinder singh, Amardeep singh

2695-2699

DOI: https://doi.org/10.26483/ijarcs.v8i5.4102
DOI: https://doi.org/10.26483/ijarcs.v8i5.4103
DOI: https://doi.org/10.26483/ijarcs.v8i5.4080
DOI: https://doi.org/10.26483/ijarcs.v8i5.3906
DOI: https://doi.org/10.26483/ijarcs.v8i5.4119

Task Scheduling tn Cloud Computing using Various Techniques

Jaspinder Kaur, Brahmaleen Kaur Sidhu

2716-2719

DOI: https://doi.org/10.26483/ijarcs.v8i5.4120

A Review on Different types of Spam Filtering Techniques

Pooja Revar, Arpita Shah, Jitali Patel, Pimal Khanpara

2720-2723

DOI: https://doi.org/10.26483/ijarcs.v8i5.4108
DOI: https://doi.org/10.26483/ijarcs.v8i5.4059
DOI: https://doi.org/10.26483/ijarcs.v8i5.4121
DOI: https://doi.org/10.26483/ijarcs.v8i5.4122

Review of web usage of data mining in web mining

Arjun sidana, Dr. Himanshu aggarwal

2742-2746

DOI: https://doi.org/10.26483/ijarcs.v8i5.4128
DOI: https://doi.org/10.26483/ijarcs.v8i5.3919
DOI: https://doi.org/10.26483/ijarcs.v8i5.4140
DOI: https://doi.org/10.26483/ijarcs.v8i5.4165
DOI: https://doi.org/10.26483/ijarcs.v8i5.4130
DOI: https://doi.org/10.26483/ijarcs.v8i5.3546

MODIFIED SVD-PCA TECHNIQUE FOR TRAFFIC INCIDENT DETECTION

Shagufta Afreen, Suraiya Parween, Suraiya Parween

2772-2776

DOI: https://doi.org/10.26483/ijarcs.v8i5.4063
DOI: https://doi.org/10.26483/ijarcs.v8i5.4109

Improved Data Security Using Steganography

TwinkalJ Patel, Chandresh D. Parekh

2782-2785

DOI: https://doi.org/10.26483/ijarcs.v8i5.4204
DOI: https://doi.org/10.26483/ijarcs.v8i5.4131

Grid Solar Hybrid Speed Controller For Electric Vehicle

SubhashChandra Saini, Deepak Sharma

2792-2798

DOI: https://doi.org/10.26483/ijarcs.v8i5.4132
DOI: https://doi.org/10.26483/ijarcs.v8i5.4139

The Notorious Nine: Top Cloud Computing Security Challenges in 2017

AbdulMajid Farooqi, Tabrez Nafis, Kafiyah Usvub

2804-2808

DOI: https://doi.org/10.26483/ijarcs.v8i5.4261
DOI: https://doi.org/10.26483/ijarcs.v8i5.4271