DOI: https://doi.org/10.26483/ijarcs.v8i7

Published: 2017-08-28

DOI: https://doi.org/10.26483/ijarcs.v8i7.4185
DOI: https://doi.org/10.26483/ijarcs.v8i7.4060
DOI: https://doi.org/10.26483/ijarcs.v8i7.4195
DOI: https://doi.org/10.26483/ijarcs.v8i7.4183

BIOMETRIC BASED CITIZEN INFORMATION SYSTEM

Sheena Mushtaq, Nowsheen Manzoor, Mrs. Yasmeen

19-21

DOI: https://doi.org/10.26483/ijarcs.v8i7.4196

Algorithmic Design to Mitigate Risks by Neuro- Fuzzy Techniques

Vinita Malik, Guarav Manchanda, Sukhdip Sangwan, Deepesh Malik

22-27

DOI: https://doi.org/10.26483/ijarcs.v8i7.4152

MATLAB BASED(GRAPHICAL USER INTERFACE) ENVIRONMENT SENSING BOT

Sunaila Mushtaq, Rumaisa Shameem, Mrs Yasmeen

28-30

DOI: https://doi.org/10.26483/ijarcs.v8i7.4202

Analytical Findings on Data Mining Algorithms

Vinita Malik, Mamta Ghalan, Sukhdip Sangwan

31-34

DOI: https://doi.org/10.26483/ijarcs.v8i7.4153
DOI: https://doi.org/10.26483/ijarcs.v8i7.4179
DOI: https://doi.org/10.26483/ijarcs.v8i7.4105

IMAGE SCRAMBLING USING QUANTUM DOT BITWISE XOR.

Mohd Iqbal Sheikh, Dr.Rafiq Ahmad Khan

44-47

DOI: https://doi.org/10.26483/ijarcs.v8i7.4180

ENCRYPTION/DECRYPTION USING ELLIPTICAL CURVE CRYPTOGRAPHY

AnsahJeelani Zargar, Mehreen Manzoor, Taha Mukhtar

48-51

DOI: https://doi.org/10.26483/ijarcs.v8i7.4208

EYE PHONE-HAND FREE MOBILE CONTROL: A Review

ZubairM Paul, Saba Hilal, Nazimul Islam Bukhari

52-54

DOI: https://doi.org/10.26483/ijarcs.v8i7.4226

CORTANA-INTELLIGENT PERSONAL DIGITAL ASSISTANT: A REVIEW

ZubairM Paul, HeenaReyaz Bhat, Tanveer lone

55-57

DOI: https://doi.org/10.26483/ijarcs.v8i7.4225
DOI: https://doi.org/10.26483/ijarcs.v8i7.4189
DOI: https://doi.org/10.26483/ijarcs.v8i7.4210
DOI: https://doi.org/10.26483/ijarcs.v8i7.4190
DOI: https://doi.org/10.26483/ijarcs.v8i7.3627
DOI: https://doi.org/10.26483/ijarcs.v8i7.3884
DOI: https://doi.org/10.26483/ijarcs.v8i7.3957
DOI: https://doi.org/10.26483/ijarcs.v8i7.4246
DOI: https://doi.org/10.26483/ijarcs.v8i7.4298
DOI: https://doi.org/10.26483/ijarcs.v8i7.4032
DOI: https://doi.org/10.26483/ijarcs.v8i7.4050
DOI: https://doi.org/10.26483/ijarcs.v8i7.4095
DOI: https://doi.org/10.26483/ijarcs.v8i7.4113
DOI: https://doi.org/10.26483/ijarcs.v8i7.4136
DOI: https://doi.org/10.26483/ijarcs.v8i7.4137
DOI: https://doi.org/10.26483/ijarcs.v8i7.4141
DOI: https://doi.org/10.26483/ijarcs.v8i7.4142

A NOBLE ENERGY SCAVENGING TECHNIQUE FOR WIRELESS BODY AREA NETWORK

Jobanpreet Kaur, Er. Birinder Singh, Er. Jatinder Singh

144-148

DOI: https://doi.org/10.26483/ijarcs.v8i7.4143

A SURVEY ON SUMMARIZATION OF EMAILS WITH CLUE WORDS

ErKuldeep Kaur, Prof. Anantdeep Kaur

149-150

DOI: https://doi.org/10.26483/ijarcs.v8i7.4144
DOI: https://doi.org/10.26483/ijarcs.v8i7.4145
DOI: https://doi.org/10.26483/ijarcs.v8i7.4146

MOUSE CURSOR CONTROL SYTEM BASED ON SSVEP

Navpreet Kaur, Er. Birinder Singh, Er. Jatinder Singh

162-167

DOI: https://doi.org/10.26483/ijarcs.v8i7.4147
DOI: https://doi.org/10.26483/ijarcs.v8i7.4280

CROP SIMULATION MODEL FOR MALWA REGION PUNJAB

Parmeet Kaur, Er. Sikander Singh Cheema

172-175

DOI: https://doi.org/10.26483/ijarcs.v8i7.4148

BIG DATA AND ANALYSIS OF WEATHER FORECASTING SYSTEM

Simranjot Kaur, Er. Sikander Singh Cheema

176-179

DOI: https://doi.org/10.26483/ijarcs.v8i7.4149
DOI: https://doi.org/10.26483/ijarcs.v8i7.4311

NETWORK CODING GAIN OPTIMIZATION IN WIRELESS AD-HOC NETWORKS

V Prashanthi, Dr.D. Suresh Babu, Dr.C.V.Guru Rao

185-188

DOI: https://doi.org/10.26483/ijarcs.v8i7.4151

ROBUST FUZZY NEURO SYSTEM FOR BIG DATA ANALYTICS

Aman taneja, Kamna Solanki, Dr. Sandeep Dalal

189-193

DOI: https://doi.org/10.26483/ijarcs.v8i7.4164
DOI: https://doi.org/10.26483/ijarcs.v8i7.4181
DOI: https://doi.org/10.26483/ijarcs.v8i7.4182

STOCHASTIC MULTICRITERIA ACCEPTABILITY BASED ROUTING TECHNIQUE FOR AD HOC NETWORK

Sonu Shrivastava, Ratish Agrawal, Yogendra Pratap Singh Maravi, Sachin Goyal

202-208

DOI: https://doi.org/10.26483/ijarcs.v8i7.3960
DOI: https://doi.org/10.26483/ijarcs.v8i7.4184

A SURVEY ON WEBSITE APPLICATION INTRUSION

Mitali Mittal, Prof. Sunil Malviya

213-217

DOI: https://doi.org/10.26483/ijarcs.v8i7.4186
DOI: https://doi.org/10.26483/ijarcs.v8i7.4187
DOI: https://doi.org/10.26483/ijarcs.v8i7.4192
DOI: https://doi.org/10.26483/ijarcs.v8i7.4194
DOI: https://doi.org/10.26483/ijarcs.v8i7.4206
DOI: https://doi.org/10.26483/ijarcs.v8i7.4209

A REVIEW ON VARIOUS ROUTING PROTOCOLS BASED ON CLUSTERING IN WSN

Er.Simranpreet kaur, Er. Shivani Sharma, Er. Shivani Sharma

245-249

DOI: https://doi.org/10.26483/ijarcs.v8i7.4211

THE IMPACT OF CROWDSOURCING IN SOFTWARE ENGINEERING: SOFTWARE TESTING PERSPECTIVE

Anoop Upadhyay, Mohd Waris Khan, Pawan Kumar Churasia

250-252

DOI: https://doi.org/10.26483/ijarcs.v8i7.4306
DOI: https://doi.org/10.26483/ijarcs.v8i7.4219
DOI: https://doi.org/10.26483/ijarcs.v8i7.4222
DOI: https://doi.org/10.26483/ijarcs.v8i7.4223
DOI: https://doi.org/10.26483/ijarcs.v8i7.4236

A COMPARATIVE STUDY OF VARIOUS TYPES OF SORTING TECHNIQUES

Pavleen Kaur, Shivani Mahajan, Ms. Harneet Kour

273-275

DOI: https://doi.org/10.26483/ijarcs.v8i7.4239
DOI: https://doi.org/10.26483/ijarcs.v8i7.4243
DOI: https://doi.org/10.26483/ijarcs.v8i7.4234

EFFECTIVE ANALYSIS OF BRAIN TUMOR USING HYBRID DATA MINING TECHNIQUES

BVKIRANMA YEE, Dr.T.V. RAJINIKANTH, DR.S.NAGINI NAGINI

286-293

DOI: https://doi.org/10.26483/ijarcs.v8i7.4237

ACO-SA: ENHANCED OPTIMIZATION FOR TSP

Sudeepta Thukral, Chander Diwaker

294-297

DOI: https://doi.org/10.26483/ijarcs.v8i7.4244
DOI: https://doi.org/10.26483/ijarcs.v8i7.4245
DOI: https://doi.org/10.26483/ijarcs.v8i7.4004

A PROPOSED STRUCTURED DIGITAL INVESTIGATION AND DOCUMENTATION MODEL (DIDM)

Arfiya Siddique, M Afshar Alam, Osama Chaudhary

310-316

DOI: https://doi.org/10.26483/ijarcs.v8i7.4218
DOI: https://doi.org/10.26483/ijarcs.v8i7.4221
DOI: https://doi.org/10.26483/ijarcs.v8i7.4228

MAMMOGRAM IMAGES DETECTION USING SUPPORT VECTOR MACHINES

RAJA SEKAR MUMMALANENI, Dr.N. Sandhya

329-334

DOI: https://doi.org/10.26483/ijarcs.v8i7.4290
DOI: https://doi.org/10.26483/ijarcs.v8i7.4241

AUTHENTICATION METHOD FOR SECURE COMMUNICATION IN MOBILE IP

Abdurahem El Atman Igrair, Dr,Raghav Yadav

340-345

DOI: https://doi.org/10.26483/ijarcs.v8i7.4264

GRAY HOLE ATTACK ON HYBRID 5G NETWORK

Anshu Bhan, Surinder Singh Khurana

346-350

DOI: https://doi.org/10.26483/ijarcs.v8i7.4265

OPTIMIZED SINK MOBILITY AWARE HETEROGENEOUS PROTOCOL OF WSN

Harmeet Singh, Dr. Ashish Kumar Luhach, Dr. Harjit Pal Singh, Er. Vikas Khullar

351-353

DOI: https://doi.org/10.26483/ijarcs.v8i7.4268

REVIEW ON SINK MOBILITY BASED OPTIMIZED HETEROGENEOUS WIRELESS SENSOR NETWORK

Harmeet Singh, Dr. Ashish Kumar Luhach, Dr. Harjit Pal Singh, Er. Vikas Khullar

354-357

DOI: https://doi.org/10.26483/ijarcs.v8i7.4269
DOI: https://doi.org/10.26483/ijarcs.v8i7.4276
DOI: https://doi.org/10.26483/ijarcs.v8i7.4277
DOI: https://doi.org/10.26483/ijarcs.v8i7.4031

HYPERSPECTRAL ANALYSIS OF SOIL TOTAL NITROGEN USING ASD FILEDSPEC 4

Ashwini Dilip Padmanabhi, Saima Ansari, Dr. R. R. Deshmukh

372-376

DOI: https://doi.org/10.26483/ijarcs.v8i7.4230
DOI: https://doi.org/10.26483/ijarcs.v8i7.4279
DOI: https://doi.org/10.26483/ijarcs.v8i7.4293

DATA MINING TECHNIQUES WITH WEB LOG: A REVIEW

KarunaNidhi Pandagre, Dr S. Veenadhari

384-386

DOI: https://doi.org/10.26483/ijarcs.v8i7.4294
DOI: https://doi.org/10.26483/ijarcs.v8i7.4175
DOI: https://doi.org/10.26483/ijarcs.v8i7.4229
DOI: https://doi.org/10.26483/ijarcs.v8i7.4295

A SURVEY ON BRAIN TUMOR IDENTIFICATION THROUGH MEDICAL IMAGES

Priyanshu Tripathi, Mehak Saini, Madhwendra Nath, Sanju Saini, K K Saini

406-408

DOI: https://doi.org/10.26483/ijarcs.v8i7.4296
DOI: https://doi.org/10.26483/ijarcs.v8i7.4253
DOI: https://doi.org/10.26483/ijarcs.v8i7.4349

SCRUTINIZING PERMISSION BASED ATTACK ON ANDROID OS PLATFORM DEVICES

Faiz Mohammad Faqiry, Rizwanur Rahman, Deepak Singh Tomar, Deepak Singh Tomar

421-426

DOI: https://doi.org/10.26483/ijarcs.v8i7.4212
DOI: https://doi.org/10.26483/ijarcs.v8i7.4214
DOI: https://doi.org/10.26483/ijarcs.v8i7.4274
DOI: https://doi.org/10.26483/ijarcs.v8i7.4278
DOI: https://doi.org/10.26483/ijarcs.v8i7.4313
DOI: https://doi.org/10.26483/ijarcs.v8i7.4150
DOI: https://doi.org/10.26483/ijarcs.v8i7.4217
DOI: https://doi.org/10.26483/ijarcs.v8i7.4238
DOI: https://doi.org/10.26483/ijarcs.v8i7.4267
DOI: https://doi.org/10.26483/ijarcs.v8i7.4284
DOI: https://doi.org/10.26483/ijarcs.v8i7.4292
DOI: https://doi.org/10.26483/ijarcs.v8i7.4299
DOI: https://doi.org/10.26483/ijarcs.v8i7.4305

A REVIEW ON DATA MINING: SCOPE AND APPLICATIONS IN AGRICULTURE

Gurpinder Singh, Kanwalpreet Singh Atwal

499-502

DOI: https://doi.org/10.26483/ijarcs.v8i7.4307

RECOMMENDATION SYSTEMS: A REVIEW REPORT

Kunika Arora, Shekhar Singh, Dr. Vikram Bali

503-507

DOI: https://doi.org/10.26483/ijarcs.v8i7.4308
DOI: https://doi.org/10.26483/ijarcs.v8i7.4309
DOI: https://doi.org/10.26483/ijarcs.v8i7.4314

HEART BEAT MONITORING SYSTEM and SECURITY USING ANDROID

Bhaskar Niraghatam, M V Ramanamurthy, R. Sai Bhavani, G Rama Devi

515-519

DOI: https://doi.org/10.26483/ijarcs.v8i7.4347
DOI: https://doi.org/10.26483/ijarcs.v8i7.4348
DOI: https://doi.org/10.26483/ijarcs.v8i7.4255

THRESHOLD SEGMENTATION USING MODIFIED 2D-OTSU PSO ALGORITHM

Raja lakshmi Saravanan, Dr. P. Subashini

530-538

DOI: https://doi.org/10.26483/ijarcs.v8i7.4272
DOI: https://doi.org/10.26483/ijarcs.v8i7.4373
DOI: https://doi.org/10.26483/ijarcs.v8i7.4377
DOI: https://doi.org/10.26483/ijarcs.v8i7.4352

IMPLEMENTATION OF NETWORK ARCHITECTURE

SYED EHTESHAM UL HAQ, Suraiyaa Parveen

555-560

DOI: https://doi.org/10.26483/ijarcs.v8i7.3247
DOI: https://doi.org/10.26483/ijarcs.v8i7.4188
DOI: https://doi.org/10.26483/ijarcs.v8i7.4220
DOI: https://doi.org/10.26483/ijarcs.v8i7.4256

SECURE SEARCH OVER ENCRYPTED DATA TECHNIQUES : SURVEY

Prof. Gajanan Bhole, SwatiT Harane, Prof. Milind Gayakwad

575-577

DOI: https://doi.org/10.26483/ijarcs.v8i7.4266
DOI: https://doi.org/10.26483/ijarcs.v8i7.4297
DOI: https://doi.org/10.26483/ijarcs.v8i7.4351
DOI: https://doi.org/10.26483/ijarcs.v8i7.4372
DOI: https://doi.org/10.26483/ijarcs.v8i7.4375
DOI: https://doi.org/10.26483/ijarcs.v8i7.4171
DOI: https://doi.org/10.26483/ijarcs.v8i7.4260
DOI: https://doi.org/10.26483/ijarcs.v8i7.4289
DOI: https://doi.org/10.26483/ijarcs.v8i7.4316

MULTI CORE BASED REAL TIME RESOUCE ALLOCATION AND SCHEDULING IN CLOUD

Bharati S Pochal, Shantashri Mallikarjun Pujari

622-626

DOI: https://doi.org/10.26483/ijarcs.v8i7.4337

A COMPREHENSIVE STUDY AND COMPARISON OF VARIOUS METHODS ON DATA LEAKAGES

B Raja Koti, Dr. GVS Raj Kumar, Dr. Y. Srinivas

627-631

DOI: https://doi.org/10.26483/ijarcs.v8i7.4338
DOI: https://doi.org/10.26483/ijarcs.v8i7.4341
DOI: https://doi.org/10.26483/ijarcs.v8i7.4343
DOI: https://doi.org/10.26483/ijarcs.v8i7.4354

SECURITY AND PRIVACY APPROACH OF CLOUD COMPUTING ENVIRONMENT

Jahangeer Qadiree, Pratima Gautam, Neha Prasad

648-651

DOI: https://doi.org/10.26483/ijarcs.v8i7.4355
DOI: https://doi.org/10.26483/ijarcs.v8i7.4358
DOI: https://doi.org/10.26483/ijarcs.v8i7.4359
DOI: https://doi.org/10.26483/ijarcs.v8i7.4361

N-GRAMS SOLUTION FOR ERROR DETECTION AND CORRECTION IN HINDI LANGUAGE

Shailza Kanwar, Manoj Kumar Sachan, Gurpreet Singh

667-670

DOI: https://doi.org/10.26483/ijarcs.v8i7.4364
DOI: https://doi.org/10.26483/ijarcs.v8i7.4366
DOI: https://doi.org/10.26483/ijarcs.v8i7.4370
DOI: https://doi.org/10.26483/ijarcs.v8i7.4371

INSIGHT OF IMAGE SEGMENTATION TECHNIQUES

Madhwendra Nath, Mehak Saini, Priyanshu Tripathi, Sanju Saini, K K Saini

682-685

DOI: https://doi.org/10.26483/ijarcs.v8i7.4374
DOI: https://doi.org/10.26483/ijarcs.v8i7.4378
DOI: https://doi.org/10.26483/ijarcs.v8i7.4381
DOI: https://doi.org/10.26483/ijarcs.v8i7.4382
DOI: https://doi.org/10.26483/ijarcs.v8i7.4395

IMPLEMENTATION OF AES ALGORITHM ON FPGA FOR LOW AREA CONSUMPTION

Gurpinder Kaur, Dr. Amandeep Singh Sappal

704-707

DOI: https://doi.org/10.26483/ijarcs.v8i7.4407

A STUDY ON LONG TERM RAINFALL PATTERN OF DHUBRI AND GUWAHATI IN ASSAM, INDIA: A TIME SERIES APPROACH

A.N. Patowary, N. Purakasthay, K. Goswami, P. J. Hazarika, B. Pathak

708-713

DOI: https://doi.org/10.26483/ijarcs.v8i7.4405
DOI: https://doi.org/10.26483/ijarcs.v8i7.4408
DOI: https://doi.org/10.26483/ijarcs.v8i7.4429

A REVIEW ON K-MODE CLUSTERING ALGORITHM

Manisha Goyal, Shruti Aggarwal

725-729

DOI: https://doi.org/10.26483/ijarcs.v8i7.4301
DOI: https://doi.org/10.26483/ijarcs.v8i7.4335
DOI: https://doi.org/10.26483/ijarcs.v8i7.4345
DOI: https://doi.org/10.26483/ijarcs.v8i7.4410

REVIEW ON VARIOUS ROUTING PROTOCOLS IN VANETS

Er.Sachin Khurana, Dr. Gaurav Tejpal, Dr. Sonal Sharma

748-753

DOI: https://doi.org/10.26483/ijarcs.v8i7.4502
DOI: https://doi.org/10.26483/ijarcs.v8i7.4390
DOI: https://doi.org/10.26483/ijarcs.v8i7.4397
DOI: https://doi.org/10.26483/ijarcs.v8i7.4402

SUPER PIXEL BASED VIRTUAL TEXTURE MAPPING OF IMAGE SYNTHESIS

Tirumalasetty Leela Subhasri, D. Veeraiah

773-781

DOI: https://doi.org/10.26483/ijarcs.v8i7.4413
DOI: https://doi.org/10.26483/ijarcs.v8i7.4416

ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS: A REVIEW

Tejinder Kaur Khattra, Dr. Manish Mahajan

788-791

DOI: https://doi.org/10.26483/ijarcs.v8i7.4422
DOI: https://doi.org/10.26483/ijarcs.v8i7.4430
DOI: https://doi.org/10.26483/ijarcs.v8i7.4432
DOI: https://doi.org/10.26483/ijarcs.v8i7.4445
DOI: https://doi.org/10.26483/ijarcs.v8i7.4453
DOI: https://doi.org/10.26483/ijarcs.v8i7.4483
DOI: https://doi.org/10.26483/ijarcs.v8i7.4491
DOI: https://doi.org/10.26483/ijarcs.v8i7.4495

ASPECT BASED SENTIMENT ANALYSIS OF HINDI TEXT REVIEW

Komal Garg, Preetpal kaur Buttar

831-836

DOI: https://doi.org/10.26483/ijarcs.v8i7.4503

IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD

Vimmi Pandey, Dr. Mridula Dubey

837-840

DOI: https://doi.org/10.26483/ijarcs.v8i7.4505
DOI: https://doi.org/10.26483/ijarcs.v8i7.4350

WASTE SEGREGATION USING RFID TECHNOLOGY

Sushma Margaret, Sharanya Pamadi Sridhar

845-847

DOI: https://doi.org/10.26483/ijarcs.v8i7.4394

ADAPTIVE NEURAL NETWORK FOR SKETCH BASED IMAGE RETRIEVAL

Suchitra Agrawal, Rajeev Kumar Singh, Uday Pratap Singh

848-852

DOI: https://doi.org/10.26483/ijarcs.v8i7.4411
DOI: https://doi.org/10.26483/ijarcs.v8i7.4499

MOBILE APPLICATION FOR VEHICULAR AUTO LOCKING SYSTEM

Dr.Meeta Singh, Mayank Dogra, Yuvraj Singh, Neeraj Bhateja

857-859

DOI: https://doi.org/10.26483/ijarcs.v8i7.4506
DOI: https://doi.org/10.26483/ijarcs.v8i7.4527

WEB PAGE ANTICIPATION SYSTEM USING MARKOV MODEL

shivangi sorout, Dr. Balkishan .

867-872

DOI: https://doi.org/10.26483/ijarcs.v8i7.3883
DOI: https://doi.org/10.26483/ijarcs.v8i7.4312
DOI: https://doi.org/10.26483/ijarcs.v8i7.4376

SOME FUNCTIONS DEFINED BY -CLOSED SET

Manisha Shrivastava, Purushottam Jha

887-895

DOI: https://doi.org/10.26483/ijarcs.v8i7.4526

WEB BROWSER FORENSICS: GOOGLE CHROME

Digvijaysinh Mahendrasinh Rathod

896-899

DOI: https://doi.org/10.26483/ijarcs.v8i7.4433
DOI: https://doi.org/10.26483/ijarcs.v8i7.4525

CLASSIFICATION OF JOBS USING LIVE DATA IN CLOUD COMPUTING

falak khursheed, Mohd.Shahid Hussain

910-914

DOI: https://doi.org/10.26483/ijarcs.v8i7.4213
DOI: https://doi.org/10.26483/ijarcs.v8i7.4486

A REVIEW ON HYBRID GEO-TEXTUAL INDEXING TECHNIQUES

Sulbha Kishor Powar, Dr. Ganesh Magar

919-922

DOI: https://doi.org/10.26483/ijarcs.v8i7.4507
DOI: https://doi.org/10.26483/ijarcs.v8i7.4528
DOI: https://doi.org/10.26483/ijarcs.v8i7.4559

A SURVEY REPORT ON VIRTUAL CARE TAKER-VOICE GUIDER

Arram Sriram, Ravi Raju Bandlamudi, Adiraju Prashanth Rao

932-935

DOI: https://doi.org/10.26483/ijarcs.v8i7.4455
DOI: https://doi.org/10.26483/ijarcs.v8i7.4460
DOI: https://doi.org/10.26483/ijarcs.v8i7.4461
DOI: https://doi.org/10.26483/ijarcs.v8i7.4471

DATA HIDING IN IMAGE USING CRYPTOGRAPHY AND STEGANOGRAPHY: AN INVESTIGATION

Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani

953-956

DOI: https://doi.org/10.26483/ijarcs.v8i7.4472
DOI: https://doi.org/10.26483/ijarcs.v8i7.4484

STUDY OF IMAGE TAMPERING AND REVIEW OF TAMPERING DETECTION TECHNIQUES

C. Rajalakshmi, Dr.M.Germanus Alex, Dr.R. Balasubramanian

963-967

DOI: https://doi.org/10.26483/ijarcs.v8i7.4541
DOI: https://doi.org/10.26483/ijarcs.v8i7.4545
DOI: https://doi.org/10.26483/ijarcs.v8i7.4553
DOI: https://doi.org/10.26483/ijarcs.v8i7.4555
DOI: https://doi.org/10.26483/ijarcs.v8i7.4424

SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS

Danisha Shaik, C. Shoba Bindu, P. Dileep Kumar Reddy

989-992

DOI: https://doi.org/10.26483/ijarcs.v8i7.4465
DOI: https://doi.org/10.26483/ijarcs.v8i7.4469
DOI: https://doi.org/10.26483/ijarcs.v8i7.4543

IMPLICATIONS OF LEGACYSOFTWARESYSTEMMODERNIZATION – A SURVEY IN A CHANGED SCENARIO

H.Seetharama Tantry, Murulidhar N.N, K. Chandrasekaran

1002-1008

DOI: https://doi.org/10.26483/ijarcs.v8i7.4556
DOI: https://doi.org/10.26483/ijarcs.v8i7.4470
DOI: https://doi.org/10.26483/ijarcs.v8i7.4532
DOI: https://doi.org/10.26483/ijarcs.v8i7.4554
DOI: https://doi.org/10.26483/ijarcs.v8i7.4566
DOI: https://doi.org/10.26483/ijarcs.v8i7.4365

A PANOPTICS OF SENTIMENTAL ANALYSIS

VENKATA RAJU KALLIPALLI, Dr. M. Sridhar, Dr. M. Sridhar, Dr. K. Vijayalakshmi, Dr. K. Vijayalakshmi

1036-1041

DOI: https://doi.org/10.26483/ijarcs.v8i7.4448
DOI: https://doi.org/10.26483/ijarcs.v8i7.4531
DOI: https://doi.org/10.26483/ijarcs.v8i7.4537

NOVEL RISK ASSESSMENT FRAMEWORK FOR SMART GRID

Ravinder Kumar, Anil Kumar

1051-1054

DOI: https://doi.org/10.26483/ijarcs.v8i7.4538
DOI: https://doi.org/10.26483/ijarcs.v8i7.4544
DOI: https://doi.org/10.26483/ijarcs.v8i7.4560
DOI: https://doi.org/10.26483/ijarcs.v8i7.4558
DOI: https://doi.org/10.26483/ijarcs.v8i7.4406
DOI: https://doi.org/10.26483/ijarcs.v8i7.4409
DOI: https://doi.org/10.26483/ijarcs.v8i7.4500
DOI: https://doi.org/10.26483/ijarcs.v8i7.4463
DOI: https://doi.org/10.26483/ijarcs.v8i7.4468

ANALYZING THE EFFECTS OF MEDITATION ON ELECTROENCEPHALOGRAPH SIGNALS

Kulvir Kaur, Karamjeet Singh, R.S. Uppal

1093-1096

DOI: https://doi.org/10.26483/ijarcs.v8i7.4584
DOI: https://doi.org/10.26483/ijarcs.v8i7.4520

RARE CLASS PROBLEM IN DATA MINING: REVIEW

Snehlata S. Dongre, Latesh G. Malik

1102-1105

DOI: https://doi.org/10.26483/ijarcs.v8i7.4530

MIDDLEWARE OF MULTI CLOUD COMPUTING SYSTEM : AN ANALYSIS AND REVIEW

B.J.D Kalyani, Dr. Kolasani Ramchand H Rao

1106-1108

DOI: https://doi.org/10.26483/ijarcs.v8i7.4540
DOI: https://doi.org/10.26483/ijarcs.v8i7.4564
DOI: https://doi.org/10.26483/ijarcs.v8i7.4573

A REVIEW ON VARIOUS- TECNIQUES OF IMAGE ENCRYPTION

Sanjeev Sharma, Navleen Kaur

1117-1121

DOI: https://doi.org/10.26483/ijarcs.v8i7.4575
DOI: https://doi.org/10.26483/ijarcs.v8i7.4446
DOI: https://doi.org/10.26483/ijarcs.v8i7.4586
DOI: https://doi.org/10.26483/ijarcs.v8i7.4557
DOI: https://doi.org/10.26483/ijarcs.v8i7.4572
DOI: https://doi.org/10.26483/ijarcs.v8i7.4574
DOI: https://doi.org/10.26483/ijarcs.v8i7.4579

A MULTI-LEVEL VISUAL TRACKING ALGORITHM FOR AUTONOMOUS VEHICLES

Narsimlu K, Dr. T. V. Rajini Kanth, Devendra Rao Guntupalli, Anil Kuvvarapu

1156-1162

DOI: https://doi.org/10.26483/ijarcs.v8i7.4421
DOI: https://doi.org/10.26483/ijarcs.v8i7.4479

A COMPARATIVE STUDY ON THRESHOLDING TECHNIQUES FOR GRAY IMAGE BINARIZATION

Kalaiselvi Thiruvenkadam, Nagaraja Perumal, Indhu V

1168-1172

DOI: https://doi.org/10.26483/ijarcs.v8i7.4510

THE b-CHROMATIC NUMBER OF HELM GRAPH

Nadeem Ansari, R S Chandel, Rizwana Jamal

1173-1175

DOI: https://doi.org/10.26483/ijarcs.v8i7.4529
DOI: https://doi.org/10.26483/ijarcs.v8i7.4533
DOI: https://doi.org/10.26483/ijarcs.v8i7.4539
DOI: https://doi.org/10.26483/ijarcs.v8i7.4546
DOI: https://doi.org/10.26483/ijarcs.v8i7.4550
DOI: https://doi.org/10.26483/ijarcs.v8i7.4578
DOI: https://doi.org/10.26483/ijarcs.v8i7.4582
DOI: https://doi.org/10.26483/ijarcs.v8i7.4585
DOI: https://doi.org/10.26483/ijarcs.v8i7.4598
DOI: https://doi.org/10.26483/ijarcs.v8i7.4310
DOI: https://doi.org/10.26483/ijarcs.v8i7.4542

DEMOGRAPHIC ANALYSIS OF DENGUE FEVER USING DATA MINING

Ramandeep Kaur, Gaurav Gupta, Gurjit Singh Bhathal

1233-1237

DOI: https://doi.org/10.26483/ijarcs.v8i7.4565

AN IMPROVED THINNING ALGORITHM FOR FINGERPRINT RECOGNITION

Meghna Babubhai Patel, Dr. Satyen M. Parikh, Dr. Ashok R. Patel

1238-1244

DOI: https://doi.org/10.26483/ijarcs.v8i7.4534
DOI: https://doi.org/10.26483/ijarcs.v8i7.4576
DOI: https://doi.org/10.26483/ijarcs.v8i7.4581

DEPLOYMENT OF LOW INTERACTION HONEYPOT IN A PRIVATE NETWORK

Jashanpreet Singh Toor, Er. Abhinav Bhandari

1255-1258

DOI: https://doi.org/10.26483/ijarcs.v8i7.4583
DOI: https://doi.org/10.26483/ijarcs.v8i7.4587