DOI: https://doi.org/10.26483/ijarcs.v8i8

Published: 2017-10-20

DOI: https://doi.org/10.26483/ijarcs.v8i8.4512
DOI: https://doi.org/10.26483/ijarcs.v8i8.4567
DOI: https://doi.org/10.26483/ijarcs.v8i8.4571
DOI: https://doi.org/10.26483/ijarcs.v8i8.4563
DOI: https://doi.org/10.26483/ijarcs.v8i8.4627
DOI: https://doi.org/10.26483/ijarcs.v8i8.4628
DOI: https://doi.org/10.26483/ijarcs.v8i8.4619
DOI: https://doi.org/10.26483/ijarcs.v8i8.4629
DOI: https://doi.org/10.26483/ijarcs.v8i8.4630

A WAVELET APPROACH FOR MEDICAL IMAGE DENOISING

Gagandeep Kaur, Romika Choudhary, Ashish Vats

46-50

DOI: https://doi.org/10.26483/ijarcs.v8i8.4621

EXPLOITING NOISE AND TEXTURAL FEATURES FOR PASSIVE IMAGE FORENSICS

Surbhi Gupta, Neeraj Mohan, Parvinder Singh Sandhu

51-53

DOI: https://doi.org/10.26483/ijarcs.v8i8.3397
DOI: https://doi.org/10.26483/ijarcs.v8i8.4631
DOI: https://doi.org/10.26483/ijarcs.v8i8.4623
DOI: https://doi.org/10.26483/ijarcs.v8i8.4625
DOI: https://doi.org/10.26483/ijarcs.v8i8.4632

DYNAMIC QUERY FORMS FOR HANDLING RANK BASED DATABASE QUERIES

Dr. B. Rama, K.Sai Prasad, Vijaykumar D Pawar

74-77

DOI: https://doi.org/10.26483/ijarcs.v8i8.4639
DOI: https://doi.org/10.26483/ijarcs.v8i8.4614

THE ROAD TO DOCKER: A SURVEY

Gaurav Bhatia, Arjun Choudhary, Vipin Gupta

83-87

DOI: https://doi.org/10.26483/ijarcs.v8i8.4618
DOI: https://doi.org/10.26483/ijarcs.v8i8.4602
DOI: https://doi.org/10.26483/ijarcs.v8i8.4640
DOI: https://doi.org/10.26483/ijarcs.v8i8.4638
DOI: https://doi.org/10.26483/ijarcs.v8i8.4606

DRN HYBRID MODEL FOR PREDICTING AUTISM USING RAPID MINER TOOL

Ramya Rajagopal, B.S.E. Zoraida B.S.E. Zoraida

111-115

DOI: https://doi.org/10.26483/ijarcs.v8i8.4604
DOI: https://doi.org/10.26483/ijarcs.v8i8.4641
DOI: https://doi.org/10.26483/ijarcs.v8i8.4666
DOI: https://doi.org/10.26483/ijarcs.v8i8.4668
DOI: https://doi.org/10.26483/ijarcs.v8i8.4617
DOI: https://doi.org/10.26483/ijarcs.v8i8.4772
DOI: https://doi.org/10.26483/ijarcs.v8i8.4636
DOI: https://doi.org/10.26483/ijarcs.v8i8.4667
DOI: https://doi.org/10.26483/ijarcs.v8i8.4673
DOI: https://doi.org/10.26483/ijarcs.v8i8.4671
DOI: https://doi.org/10.26483/ijarcs.v8i8.4633

DEVELOPING SURVEILLANCE CHALLENGES IN THE INTERNET OF THINGS (IOT)

shankar lingam macharla, Raghavendra GS, Dr.A. M. Sudhakara

173-176

DOI: https://doi.org/10.26483/ijarcs.v8i8.4643
DOI: https://doi.org/10.26483/ijarcs.v8i8.4591
DOI: https://doi.org/10.26483/ijarcs.v8i8.4592
DOI: https://doi.org/10.26483/ijarcs.v8i8.4615
DOI: https://doi.org/10.26483/ijarcs.v8i8.4687
DOI: https://doi.org/10.26483/ijarcs.v8i8.4688
DOI: https://doi.org/10.26483/ijarcs.v8i8.4689

DEVICE ENABLED ARCHITECTURE FOR CONTEXT AWARE APPLICATIONS

G K Mohan Devarakonda, Sundara Krishna Y K

214-216

DOI: https://doi.org/10.26483/ijarcs.v8i8.4600
DOI: https://doi.org/10.26483/ijarcs.v8i8.4613

COMPARISON OF SANSKRIT MACHINE TRANSLATION SYSTEMS

Neha Sadana, Dr. Dhavleesh Rattan

223-225

DOI: https://doi.org/10.26483/ijarcs.v8i8.4622

A SURVEY ON CLASSIFICATION TECHNIQUES USED FOR RAINFALL FORECASTING

VenkataNagendra Kolluru, Dr. Maligela Ussenaiah

226-229

DOI: https://doi.org/10.26483/ijarcs.v8i8.4645
DOI: https://doi.org/10.26483/ijarcs.v8i8.4648

INVENTION OF GAMMA PROTOCOL FOR VANET USING MODULAR ARITHMETIC TECHNIQUES

Venkatamangarao Nampally, Dr. S. Ananthi, Dr. K. Padmanabhan, Dr. M. Raghavender Sharma, J Rama, Dr. K. R. balaji, Arun ananthanarayanan

233-238

DOI: https://doi.org/10.26483/ijarcs.v8i8.4661
DOI: https://doi.org/10.26483/ijarcs.v8i8.4691

LOW –ENERGY ADAPTIVE CLUSTERING HIERARCHY USING VIRTUAL GIRD METHOD

Meenakshi Yadav, Anoop Bhola, Chandra Kumar Jha

246-249

DOI: https://doi.org/10.26483/ijarcs.v8i8.4702
DOI: https://doi.org/10.26483/ijarcs.v8i8.4714

SENTIMENT ANALYSIS: AN APPROACH TO OPINION MINING FROM TWITTER DATA USING R

Sumita Mishra, Pooja Khanna, Sachin Kumar, Anant Sinha

252-256

DOI: https://doi.org/10.26483/ijarcs.v8i8.4716

ADVANCE LEARNING SYSTEM WITH THE USE OF INFORMATION TECHNOLOGY

Dr.Jigneshkumar.A Chauhan, Prof.Jigarkumar D.Patel, Dr.Satyen M.Parikh

257-259

DOI: https://doi.org/10.26483/ijarcs.v8i8.4722

NATURAL LANGUAGE PROCESSING ITS TYPES

shipra goyal goyal, Dhavleesh Rattan

260-263

DOI: https://doi.org/10.26483/ijarcs.v8i8.4362
DOI: https://doi.org/10.26483/ijarcs.v8i8.4651
DOI: https://doi.org/10.26483/ijarcs.v8i8.4682

PRIVACY ENHANCEMENT IN CLOUD ENVIRONMENT THROUGH TRUSTED THIRD PARTY APPROACH

Nibretu Yirdew, Sheik Khadar Ahmad Mnoj, Prof.D. Lalitha Bhaskari

273-277

DOI: https://doi.org/10.26483/ijarcs.v8i8.4700
DOI: https://doi.org/10.26483/ijarcs.v8i8.4637
DOI: https://doi.org/10.26483/ijarcs.v8i8.4653
DOI: https://doi.org/10.26483/ijarcs.v8i8.4683
DOI: https://doi.org/10.26483/ijarcs.v8i8.4590
DOI: https://doi.org/10.26483/ijarcs.v8i8.4699
DOI: https://doi.org/10.26483/ijarcs.v8i8.4676

A REVIEW ON DIFFERENT THREATS ON QUANTUM KEY DISTRIBUTION PROTOCOL

Chinmoy Ghosh, Amit Parag, Shrayasi Datta

307-311

DOI: https://doi.org/10.26483/ijarcs.v8i8.4680
DOI: https://doi.org/10.26483/ijarcs.v8i8.4704
DOI: https://doi.org/10.26483/ijarcs.v8i8.4706
DOI: https://doi.org/10.26483/ijarcs.v8i8.4708

IMPACT STUDY OF TEACHING MATHEMATICS USING ICT ENABLED LEARNING

Rahul Chandra Kushwaha, Achintya Singhal

333-336

DOI: https://doi.org/10.26483/ijarcs.v8i8.4715

A SECURE AND ROBUST CONGESTION CONTROL MODEL WITH FRAGMENTATION FOR CLUSTERED DISTRIBUTED DATABASE SYSTEM

Surya Pratap Singh, Arvind Kumar Maurya, Manish Mishra, Upendra Nath Tripathi

337-342

DOI: https://doi.org/10.26483/ijarcs.v8i8.4577
DOI: https://doi.org/10.26483/ijarcs.v8i8.4611
DOI: https://doi.org/10.26483/ijarcs.v8i8.4626

INTRUSION DETECTION SYSTEMS: A REVIEW

D. Ashok Kumar, SR Venugopalan

356-370

DOI: https://doi.org/10.26483/ijarcs.v8i8.4703

PERFORMANCE ANALYSIS OF ISM BAND ANTENNAS: A SURVEY

neha minhas, Ashok Kumar, Sarbjeet Singh

371-375

DOI: https://doi.org/10.26483/ijarcs.v8i8.4705
DOI: https://doi.org/10.26483/ijarcs.v8i8.4711
DOI: https://doi.org/10.26483/ijarcs.v8i8.4735

A SURVEY REPORT ON TECHNIQUES FOR DATA CONFIDENTIALITY IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION

Dhruva Gaidhani, Joshua Koyeerath, Neel Kudu, Prof. Mahendra Mehra

389-394

DOI: https://doi.org/10.26483/ijarcs.v8i8.4746

A NEW STAD MODEL TO PREDICT THE DIABETES MELLITUS

N.Aswin Vignesh, Dr.D.I.George Amalarethinam

395-398

DOI: https://doi.org/10.26483/ijarcs.v8i8.4774

METHOD FOR INCREASING BRAIN INTELLIGENCE (MIBI)

Rimmy Chuchra, Raj Seth2and Inderpal Singh

399-404

DOI: https://doi.org/10.26483/ijarcs.v8i8.4775
DOI: https://doi.org/10.26483/ijarcs.v8i8.4773

Fuzzy based Multi-Metric Path Ranking Scheme for Multipath Routing

Shalini Aggarwal, Pardeep Kumar, Shuchita Upadhyaya

407-411

DOI: https://doi.org/10.26483/ijarcs.v8i8.4644

CHALLENGES TO TASK AND WORKFLOW SCHEDULING IN CLOUD ENVIRONMENT

Amanpreet kaur, Dr. Bikrampal Kaur, Dr. Dheerendra Singh

412-415

DOI: https://doi.org/10.26483/ijarcs.v8i8.4752
DOI: https://doi.org/10.26483/ijarcs.v8i8.4764

COLLABORATIVE CLUSTERING PROTOCOL IN WIRELESS SENSOR NETWORKS

Tewodrose Tilahun Dejen, Professor Kuda Nageswara Rao

421-428

DOI: https://doi.org/10.26483/ijarcs.v8i8.4763

BLOCKCHAIN: AN ANALYSIS ON NEXT-GENERATION INTERNET

ATUL KUMAR VERMA, Mr. Arpit Garg

429-432

DOI: https://doi.org/10.26483/ijarcs.v8i8.4769
DOI: https://doi.org/10.26483/ijarcs.v8i8.4783

A NOVEL AUTOMATIC C TO NVIDIACUDA CODE OPTIMIZATION FRAMEWORK

Srinivas Ch., Dr. Niraj Upadhyay, Dr A. Govardhan

438-447

DOI: https://doi.org/10.26483/ijarcs.v8i8.4738
DOI: https://doi.org/10.26483/ijarcs.v8i8.4788
DOI: https://doi.org/10.26483/ijarcs.v8i8.4805
DOI: https://doi.org/10.26483/ijarcs.v8i8.4607

MACHINE TRANSLITERATION FOR INDIAN LANGUAGES: A REVIEW

Anupama Sharma, Dr. Dhavleesh Rattan

463-464

DOI: https://doi.org/10.26483/ijarcs.v8i8.4620
DOI: https://doi.org/10.26483/ijarcs.v8i8.4679
DOI: https://doi.org/10.26483/ijarcs.v8i8.4624
DOI: https://doi.org/10.26483/ijarcs.v8i8.4642
DOI: https://doi.org/10.26483/ijarcs.v8i8.4561
DOI: https://doi.org/10.26483/ijarcs.v8i8.4713

A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS

Gaurav Agrawal, Shivank Kumar Soni, Chetan Agrawal

499-504

DOI: https://doi.org/10.26483/ijarcs.v8i8.4771
DOI: https://doi.org/10.26483/ijarcs.v8i8.4794
DOI: https://doi.org/10.26483/ijarcs.v8i8.4806

SECURE AND INTELLIGENT POWER MANAGEMENT SCHEMA FOR HETEROGENOUS DISTRIBUTED WIRELESS MULTIMEDIA SENSOR NETWORKS

Surya Pratap Singh, Avinash Singh, Arvind Kumar Maurya, Upendra Nath Tripathi

520-524

DOI: https://doi.org/10.26483/ijarcs.v8i8.4721
DOI: https://doi.org/10.26483/ijarcs.v8i8.4733
DOI: https://doi.org/10.26483/ijarcs.v8i8.4737
DOI: https://doi.org/10.26483/ijarcs.v8i8.4804

FAULT-DETECTION ON MULTI-ROBOT PATH PLANNING

Ashutosh Kumar Singh, Naveen Kumar

539-543

DOI: https://doi.org/10.26483/ijarcs.v8i8.4832

DATA PRIVACY IN ENCRYPTED RELATIONAL DATA USING K-NN CLASIFICATION

M. Sheshikala, R. Vijaya Praash, M. Archana

544-548

DOI: https://doi.org/10.26483/ijarcs.v8i8.4834
DOI: https://doi.org/10.26483/ijarcs.v8i8.4776

A REVIEW ON PLC MODELING TECHNIQUES FOR RESIDENTIAL NETWORKS

Shashidhar Kasthala, G.K.D Prasanna Venkatesan

558-561

DOI: https://doi.org/10.26483/ijarcs.v8i8.4808
DOI: https://doi.org/10.26483/ijarcs.v8i8.4852
DOI: https://doi.org/10.26483/ijarcs.v8i8.4854

OVERLAPPED PHYSICAL CHANNELS LOAD MEASUREMENT IN 802.11 NETWORKS

Danielle Saliba, Rodrigue Imad, Sebastien Houcke

571-579

DOI: https://doi.org/10.26483/ijarcs.v8i8.4810
DOI: https://doi.org/10.26483/ijarcs.v8i8.4841
DOI: https://doi.org/10.26483/ijarcs.v8i8.4793
DOI: https://doi.org/10.26483/ijarcs.v8i8.4844
DOI: https://doi.org/10.26483/ijarcs.v8i8.4847
DOI: https://doi.org/10.26483/ijarcs.v8i8.4846
DOI: https://doi.org/10.26483/ijarcs.v8i8.4791
DOI: https://doi.org/10.26483/ijarcs.v8i8.4859
DOI: https://doi.org/10.26483/ijarcs.v8i8.4801
DOI: https://doi.org/10.26483/ijarcs.v8i8.4833
DOI: https://doi.org/10.26483/ijarcs.v8i8.4856
DOI: https://doi.org/10.26483/ijarcs.v8i8.4842
DOI: https://doi.org/10.26483/ijarcs.v8i8.4853
DOI: https://doi.org/10.26483/ijarcs.v8i8.4868
DOI: https://doi.org/10.26483/ijarcs.v8i8.4800
DOI: https://doi.org/10.26483/ijarcs.v8i8.4840
DOI: https://doi.org/10.26483/ijarcs.v8i8.4861
DOI: https://doi.org/10.26483/ijarcs.v8i8.4835

REVERSIBLE DATA-HIDING SCHEMES FOR ENCRYPTED IMAGE: A REVIEW

Anoop Chaturvedi, Piyush Kumar Shukla

658-660

DOI: https://doi.org/10.26483/ijarcs.v8i8.4830
DOI: https://doi.org/10.26483/ijarcs.v8i8.4867

A SURVEY ON NEW APPROACHES OF INTERNET OF THINGS DATA MINING

Sallauddin Mohmmad, G. Sunil, Ranganath Kanakam

666-673

DOI: https://doi.org/10.26483/ijarcs.v8i8.4849
DOI: https://doi.org/10.26483/ijarcs.v8i8.4866
DOI: https://doi.org/10.26483/ijarcs.v8i8.4845

IMAGE COMPRESSION USING DECISION TREE TECHNIQUE

AMANPREET KAUR, Balkrishan Jindal

682-688

DOI: https://doi.org/10.26483/ijarcs.v8i8.4812

CO-OPERATIVE SOCIETY APP - AN ANDROID E-BROCHURE

Shweta Borikar, Kanchan Yadav, Shradha Bhimte, Piyush Anjankar

689-691

DOI: https://doi.org/10.26483/ijarcs.v8i8.4836
DOI: https://doi.org/10.26483/ijarcs.v8i8.4755

BIG SENTIMENT ANALYSIS USING K-MEANS CLUSTERING: A SURVEY

Shalini Yadav, Sunita Yadwad, Prakshi Yadav

695-700

DOI: https://doi.org/10.26483/ijarcs.v8i8.4850
DOI: https://doi.org/10.26483/ijarcs.v8i8.4855
DOI: https://doi.org/10.26483/ijarcs.v8i8.4877
DOI: https://doi.org/10.26483/ijarcs.v8i8.4879
DOI: https://doi.org/10.26483/ijarcs.v8i8.4837
DOI: https://doi.org/10.26483/ijarcs.v8i8.4843
DOI: https://doi.org/10.26483/ijarcs.v8i8.4848
DOI: https://doi.org/10.26483/ijarcs.v8i8.4881
DOI: https://doi.org/10.26483/ijarcs.v8i8.4839
DOI: https://doi.org/10.26483/ijarcs.v8i8.4803