DOI: https://doi.org/10.26483/ijarcs.v8i9

Published: 2017-12-20

DOI: https://doi.org/10.26483/ijarcs.v8i9.4869
DOI: https://doi.org/10.26483/ijarcs.v8i9.4734
DOI: https://doi.org/10.26483/ijarcs.v8i9.4923

ANDROID MALWARE DETECTION USING HAML

Mahima Choudhary, Brij Kishore

14-19

DOI: https://doi.org/10.26483/ijarcs.v8i9.4781
DOI: https://doi.org/10.26483/ijarcs.v8i9.4797

THE ASSESSMENT OF RISKS IN PUBLIC CLOUD ENVIRONMENT BY DEVELOPING MULTINOMINAL LOGISTIC REGRESSION MODEL

Sri Bindu Mareedu, Seetha Rama Prasad Mylavarapu, Sravani Guntupalli

25-30

DOI: https://doi.org/10.26483/ijarcs.v8i9.4813
DOI: https://doi.org/10.26483/ijarcs.v8i9.4825

SESSION PASSWORD AUTHENTICATION USING IMAGE - BASED SYSTEM [IBS]

Shivamurthaiah Mallaiah, Praveen Kumar K, Sitesh Kumar Sinha, Manasa L.R

34-36

DOI: https://doi.org/10.26483/ijarcs.v8i9.4851
DOI: https://doi.org/10.26483/ijarcs.v8i9.4858

AGILITY: THE NEED OF AN HOUR FOR SOFTWARE INDUSTRY

Tushar Vinayak Sambare, Gulabchand K Gupta

41-46

DOI: https://doi.org/10.26483/ijarcs.v8i9.4886
DOI: https://doi.org/10.26483/ijarcs.v8i9.4904
DOI: https://doi.org/10.26483/ijarcs.v8i9.4905
DOI: https://doi.org/10.26483/ijarcs.v8i9.4906
DOI: https://doi.org/10.26483/ijarcs.v8i9.4907
DOI: https://doi.org/10.26483/ijarcs.v8i9.4908

SIZE ESTIMATION AT DESIGN STAGES OF SYSTEM DEVELOPMENT

Dr. Madhu Bhan, Dr.Rajanikanth K, Dr. T.V. Suresh Kumar

76-81

DOI: https://doi.org/10.26483/ijarcs.v8i9.4909
DOI: https://doi.org/10.26483/ijarcs.v8i9.4912
DOI: https://doi.org/10.26483/ijarcs.v8i9.4913
DOI: https://doi.org/10.26483/ijarcs.v8i9.4914
DOI: https://doi.org/10.26483/ijarcs.v8i9.4920
DOI: https://doi.org/10.26483/ijarcs.v8i9.4921
DOI: https://doi.org/10.26483/ijarcs.v8i9.4924
DOI: https://doi.org/10.26483/ijarcs.v8i9.4889
DOI: https://doi.org/10.26483/ijarcs.v8i9.4898

AUTOMATIC SPEECH RECOGNITION APPROACH FOR DIVERSE VOICE COMMANDS

Muheet ahmed butt, MEHAK MEHRAJ, MS. ARTI GOEL, Majid Zaman

137-144

DOI: https://doi.org/10.26483/ijarcs.v8i9.4910
DOI: https://doi.org/10.26483/ijarcs.v8i9.4894
DOI: https://doi.org/10.26483/ijarcs.v8i9.4940
DOI: https://doi.org/10.26483/ijarcs.v8i9.4888
DOI: https://doi.org/10.26483/ijarcs.v8i9.4815

ANALYSIS OF SMART STORE SOLUTIONS USING PROXIMITY TECHNOLOGIES

Shreyas Dighe, Prathamesh Churi, Mokshit Jain, Abhinandan Desai, Yug Desai, Prof.Mohini Reddy

170-176

DOI: https://doi.org/10.26483/ijarcs.v8i9.4818

SMART TRANSPORT SYSTEM USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY

shreyas vitthal mahangade, Rahul Khose Khose, Vicky Salunkhe, Nikhil Angane, Poonam Gupta

177-179

DOI: https://doi.org/10.26483/ijarcs.v8i9.4896

DATA ANALYTICS IN BANKING

Rishabh Jamar, Javan Rajpopat, Prathamesh Churi, Serena Lekhrajani

180-183

DOI: https://doi.org/10.26483/ijarcs.v8i9.4927
DOI: https://doi.org/10.26483/ijarcs.v8i9.4929
DOI: https://doi.org/10.26483/ijarcs.v8i9.4942
DOI: https://doi.org/10.26483/ijarcs.v8i9.4945

OVERVIEW OF COGNITIVE RADIO NETWORKS

Shelly Berwal, Vikas Sindhu

198-201

DOI: https://doi.org/10.26483/ijarcs.v8i9.4946
DOI: https://doi.org/10.26483/ijarcs.v8i9.4953
DOI: https://doi.org/10.26483/ijarcs.v8i9.4974
DOI: https://doi.org/10.26483/ijarcs.v8i9.4975
DOI: https://doi.org/10.26483/ijarcs.v8i9.4976
DOI: https://doi.org/10.26483/ijarcs.v8i9.4977

DDOS ATTACK ON WIRELESS SENSOR NETWORK: A REVIEW

Priya Pandey, Maneela Jain, Rajneesh Pachouri

227-229

DOI: https://doi.org/10.26483/ijarcs.v8i9.5009
DOI: https://doi.org/10.26483/ijarcs.v8i9.5010
DOI: https://doi.org/10.26483/ijarcs.v8i9.4897

-ANALYSIS OF RELEVANCY USING RAPID MINER WITH AN EXPERIMENTAL STUDY ON POPULAR DISCUSSION FORUM

Radhika Patthi, Dr P.Suresh Varma, M. Santosh, Dr.G.V. Rao, K. Kamakshaiah

240-244

DOI: https://doi.org/10.26483/ijarcs.v8i9.4899
DOI: https://doi.org/10.26483/ijarcs.v8i9.4928

ANNOTATING FEATURES EXTRACTED THROUGH LATENT DIRICHLET ALLOCATION FOR FEATURE BASED OPINION MINING

Padmapani Prakash Tribhuvan, Sunil G. Bhirud, Ratnadeep R. Deshmukh

251-255

DOI: https://doi.org/10.26483/ijarcs.v8i9.4939
DOI: https://doi.org/10.26483/ijarcs.v8i9.4943

SECURITY AND DDOS MECHANISMS IN INTERNET OF THINGS

Jeet kaur, Anju Bhandari Gandhi

261-265

DOI: https://doi.org/10.26483/ijarcs.v8i9.5008
DOI: https://doi.org/10.26483/ijarcs.v8i9.5012
DOI: https://doi.org/10.26483/ijarcs.v8i9.4857
DOI: https://doi.org/10.26483/ijarcs.v8i9.4870

AN INSIGHT INTO THE USAGE OF BIG DATA ANALYTICS

Chandralekha M, Dr. N. Shenbagavadivu

281-283

DOI: https://doi.org/10.26483/ijarcs.v8i9.4937

REVIEW OF SENTIMENT ANALYSIS ON TWITTER DATA USING PYTHON

Surabhi Thorat, Prajakta Deshpande, Vikrant Shaga

284-286

DOI: https://doi.org/10.26483/ijarcs.v8i9.4956
DOI: https://doi.org/10.26483/ijarcs.v8i9.5002
DOI: https://doi.org/10.26483/ijarcs.v8i9.5003
DOI: https://doi.org/10.26483/ijarcs.v8i9.5043

IMPROVING CLOUD SECURITY BY THE APPLICATION OF DE-DUPLICATION

Sweety ., Preety Mahajan, Aastha Mahajan

299-307

DOI: https://doi.org/10.26483/ijarcs.v8i9.5057
DOI: https://doi.org/10.26483/ijarcs.v8i9.5060
DOI: https://doi.org/10.26483/ijarcs.v8i9.5061
DOI: https://doi.org/10.26483/ijarcs.v8i9.4875
DOI: https://doi.org/10.26483/ijarcs.v8i9.4902
DOI: https://doi.org/10.26483/ijarcs.v8i9.4915

INVERSE SIGNED DOMINATING FUNCTIONS OF CORONA AND ROOTED PRODUCT GRAPHS

shobha Rani C, S. Jeelani Begum, G. S. S. Raju

331-336

DOI: https://doi.org/10.26483/ijarcs.v8i9.4930
DOI: https://doi.org/10.26483/ijarcs.v8i9.4936
DOI: https://doi.org/10.26483/ijarcs.v8i9.4968
DOI: https://doi.org/10.26483/ijarcs.v8i9.4969
DOI: https://doi.org/10.26483/ijarcs.v8i9.4971
DOI: https://doi.org/10.26483/ijarcs.v8i9.4984
DOI: https://doi.org/10.26483/ijarcs.v8i9.5011

DATABASE QUERY OPTIMIZATION USING GENETIC ALGORITHM

Megha B Auti, Prof. Sandeep Gore

376-378

DOI: https://doi.org/10.26483/ijarcs.v8i9.5023

ROUGH TOPOLOGY ON APPROXIMATION SPACES

Sheeja T K, Sunny Kuriakose A.

379-384

DOI: https://doi.org/10.26483/ijarcs.v8i9.5028

VIRTUAL MACHINE MIGRATION: A COMPARATIVE STUDY

Varun Jasuja, RAJESH KUMAR SINGH

385-392

DOI: https://doi.org/10.26483/ijarcs.v8i9.5036
DOI: https://doi.org/10.26483/ijarcs.v8i9.5042
DOI: https://doi.org/10.26483/ijarcs.v8i9.5044
DOI: https://doi.org/10.26483/ijarcs.v8i9.5045
DOI: https://doi.org/10.26483/ijarcs.v8i9.5053

A REVIEW OF ARTIFICIAL INTELLIGENCE SYSTEMS

Mrs.E Sreedevi, Mr.K. Saravanan, Dr.V. Subhamathi

418-421

DOI: https://doi.org/10.26483/ijarcs.v8i9.5095

SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

P Daniel Sundarraj, Dr.K. Arulanandam,

422-424

DOI: https://doi.org/10.26483/ijarcs.v8i9.5100
DOI: https://doi.org/10.26483/ijarcs.v8i9.5101

BIG DATA ANALYTICS: AN EPITOME

VISHAL BATVIA, Drashti Patel, Parth Goel, Dr. Mamta Padole

429-433

DOI: https://doi.org/10.26483/ijarcs.v8i9.5102

MINING OF CRIMINAL MINDSET AND GEOSPATIAL CRIME PATTERN DETECTION

Anchal Oberai, Malika Jain, Gautam Khosla, Monika Arora, Priyanka Dewan

434-437

DOI: https://doi.org/10.26483/ijarcs.v8i9.4862
DOI: https://doi.org/10.26483/ijarcs.v8i9.4989
DOI: https://doi.org/10.26483/ijarcs.v8i9.4993
DOI: https://doi.org/10.26483/ijarcs.v8i9.5034
DOI: https://doi.org/10.26483/ijarcs.v8i9.5144
DOI: https://doi.org/10.26483/ijarcs.v8i9.5146
DOI: https://doi.org/10.26483/ijarcs.v8i9.5078
DOI: https://doi.org/10.26483/ijarcs.v8i9.4981
DOI: https://doi.org/10.26483/ijarcs.v8i9.5079

DEVELOPMENT MOBILE APPLICATION TO IMPROVE MEDICAL SERVICE (USING GOOGLE MAPS)

Dr. Osman ANasr, Enayat Ali, Dr. Eltyeb E.Abed Elgabar

477-481

DOI: https://doi.org/10.26483/ijarcs.v8i9.5147
DOI: https://doi.org/10.26483/ijarcs.v8i9.5006
DOI: https://doi.org/10.26483/ijarcs.v8i9.5017
DOI: https://doi.org/10.26483/ijarcs.v8i9.5041

COLLUSION BW HOLE ATTACK

Sunil Kumar Jangir, Naveen Hemrajani

496-500

DOI: https://doi.org/10.26483/ijarcs.v8i9.5054

A REVIEW ON EEG CONTROL SMART WHEEL CHAIR

Yumlembam Rahul, Rupam Kumar Sharma, Nissi Paul

501-507

DOI: https://doi.org/10.26483/ijarcs.v8i9.5067
DOI: https://doi.org/10.26483/ijarcs.v8i9.5071
DOI: https://doi.org/10.26483/ijarcs.v8i9.5077

BER PERFORMANCE REVIEW OF WIMAX MIMO SYSTEM

Parul Sangwan, Vikas Nandal

517-521

DOI: https://doi.org/10.26483/ijarcs.v8i9.5085
DOI: https://doi.org/10.26483/ijarcs.v8i9.5098

IMPUTING THE MISSING VALUES IN IOT USING ESTCP MODEL

MrsI..Priya Stella. Mary, Dr. L. Arockiam

532-536

DOI: https://doi.org/10.26483/ijarcs.v8i9.5145
DOI: https://doi.org/10.26483/ijarcs.v8i9.4954
DOI: https://doi.org/10.26483/ijarcs.v8i9.5058

IMPLEMENTATION OF SMART PARKING MANAGEMENT SYSTEM USING APACHE TOMCAT SERVER

N Shirisha, M Anila, Raswitha Bandi, B Durga Sri

549-553

DOI: https://doi.org/10.26483/ijarcs.v8i9.5182
DOI: https://doi.org/10.26483/ijarcs.v8i9.5174
DOI: https://doi.org/10.26483/ijarcs.v8i9.5178
DOI: https://doi.org/10.26483/ijarcs.v8i9.5181

USER STORIES FOR PROPOSED WEB APPLICATION USING AGILE APPROACH

Sapna K Jadhav, Dr. Vikrant Shaga, Surabhi D. Thorat

570-573

DOI: https://doi.org/10.26483/ijarcs.v8i9.5148
DOI: https://doi.org/10.26483/ijarcs.v8i9.5189
DOI: https://doi.org/10.26483/ijarcs.v8i9.5184
DOI: https://doi.org/10.26483/ijarcs.v8i9.5187
DOI: https://doi.org/10.26483/ijarcs.v8i9.5069
DOI: https://doi.org/10.26483/ijarcs.v8i9.5158
DOI: https://doi.org/10.26483/ijarcs.v8i9.5179
DOI: https://doi.org/10.26483/ijarcs.v8i9.5165
DOI: https://doi.org/10.26483/ijarcs.v8i9.5167
DOI: https://doi.org/10.26483/ijarcs.v8i9.5177

IMPLEMENTATION OF A FORMAT MIGRATION USING SAAS MODEL

R Karthik, N Sirisha, G Divya Jyothi, B Raswitha, B Durga Sri

623-626

DOI: https://doi.org/10.26483/ijarcs.v8i9.5175
DOI: https://doi.org/10.26483/ijarcs.v8i9.5109

A QUIZZING SYSTEM FOR BLIND AND VISUALLY IMPAIRED CANDIDATES

Michael Hosein, Réginald Cherenfant Jasmin

633-641

DOI: https://doi.org/10.26483/ijarcs.v8i9.4807
DOI: https://doi.org/10.26483/ijarcs.v8i9.4950
DOI: https://doi.org/10.26483/ijarcs.v8i9.4962

FUTURE NETWORKS – AN SOA PERSPECTIVE DESIGN GOALS

Ravi Kumar Merugumala, Y.K.Sundara Krishna

649-654

DOI: https://doi.org/10.26483/ijarcs.v8i9.5001
DOI: https://doi.org/10.26483/ijarcs.v8i9.5070

A REVIEW ON TRUST BASED SECURE ROUTING PROTOCOLS IN AD-HOC NETWORKS

Sandeep Patil, Dr. L.S. Admuthe, Dr. M. R. Patil

661-668

DOI: https://doi.org/10.26483/ijarcs.v8i9.5075
DOI: https://doi.org/10.26483/ijarcs.v8i9.5082
DOI: https://doi.org/10.26483/ijarcs.v8i9.5132
DOI: https://doi.org/10.26483/ijarcs.v8i9.5150
DOI: https://doi.org/10.26483/ijarcs.v8i9.5173
DOI: https://doi.org/10.26483/ijarcs.v8i9.5176
DOI: https://doi.org/10.26483/ijarcs.v8i9.5185
DOI: https://doi.org/10.26483/ijarcs.v8i9.5193
DOI: https://doi.org/10.26483/ijarcs.v8i9.5197

USER INTERFACES TO DATABASES - A SURVEY

D. MABUNI, Dr. G.A. Ramachandra

710-713

DOI: https://doi.org/10.26483/ijarcs.v8i9.5201
DOI: https://doi.org/10.26483/ijarcs.v8i9.5202

A LOCAL APPROACH TO GABOR WAVELET BASED FACE RECOGNITION SYSTEM

kailash sharma, Ramchandra R. Manthalkar

718-722

DOI: https://doi.org/10.26483/ijarcs.v8i9.5126
DOI: https://doi.org/10.26483/ijarcs.v8i9.5204
DOI: https://doi.org/10.26483/ijarcs.v8i9.4759
DOI: https://doi.org/10.26483/ijarcs.v8i9.4919

AN EASY, SMART & INTELLIGENT WAY TO LEARN: “ONLINE EDUCATIONâ€

Prince Sharma, Kaptan Bhardwaj, Divya Bhardwaj

735-737

DOI: https://doi.org/10.26483/ijarcs.v8i9.5122
DOI: https://doi.org/10.26483/ijarcs.v8i9.5210
DOI: https://doi.org/10.26483/ijarcs.v8i9.5212
DOI: https://doi.org/10.26483/ijarcs.v8i9.5194
DOI: https://doi.org/10.26483/ijarcs.v8i9.5064
DOI: https://doi.org/10.26483/ijarcs.v8i9.5188

A MINI REVIEW ON RADAR FUNDAMENTALS AND CONCEPT OF JAMMING

R Karthik, P Anjaneyulu, B Annapurna, P Haribabu, T Vijetha

763-767

DOI: https://doi.org/10.26483/ijarcs.v8i9.5195
DOI: https://doi.org/10.26483/ijarcs.v8i9.5203
DOI: https://doi.org/10.26483/ijarcs.v8i9.5213
DOI: https://doi.org/10.26483/ijarcs.v8i9.5219
DOI: https://doi.org/10.26483/ijarcs.v8i9.5166
DOI: https://doi.org/10.26483/ijarcs.v8i9.4917

ADVANCE AUTOMATED RAILWAY CROSSING SYSTEM

Pawan singh, Akansh Saxena

794-796

DOI: https://doi.org/10.26483/ijarcs.v8i9.5025
DOI: https://doi.org/10.26483/ijarcs.v8i9.5092

A TABLEAU TOOL FOR AN EFFECTIVE EVENT MANAGEMENT

Saikumar Senagavarapu, S. Yogitha, K. Soumya, S. Sai Kumar, L. Ravi Kumar, M. Sundarababu

801-803

DOI: https://doi.org/10.26483/ijarcs.v8i9.5097
DOI: https://doi.org/10.26483/ijarcs.v8i9.5149
DOI: https://doi.org/10.26483/ijarcs.v8i9.5160

A VIRTUAL TOUR PLANNER - A PREDICTION REVIEW ARTICLE

L. Ravi Kumar, S. Sai Kumar, P.Vineela Rani, P. Varshitha, Ch. Rineesha, N. Swetha, M. Sowjanya

815-818

DOI: https://doi.org/10.26483/ijarcs.v8i9.5209

A NEARBY PLACE THROUGH A GRAPHICAL REPRESENTATION

T. Vyshnavi, S.N.S.M. Praneetha, M. Jahnavi, Dr. J. Rajendra Prasad

819-821

DOI: https://doi.org/10.26483/ijarcs.v8i9.5214
DOI: https://doi.org/10.26483/ijarcs.v8i9.5229

EVALUATION OF IMAGE DEHAZING BY PSO BASED DARK CHANNEL PRIOR

Poonam ., Dr. V K Banga, Gurjit singh

829-833

DOI: https://doi.org/10.26483/ijarcs.v8i9.5211
DOI: https://doi.org/10.26483/ijarcs.v8i9.5228

ENHANCING THE SECURITY OF IoT DATA USING MULTILEVEL ENCRYPTION

A Vithya Vijayalakshmi, Dr. L. Arockiam

841-845

DOI: https://doi.org/10.26483/ijarcs.v8i9.4959

A REVIEW ON IMAGE SEGMENTATION TECHNIQUES WITH AN APPLICATION PERSPECTIVE

Nishi Mehta, Kinjal Munot, Sakshi Mishra, Ratnesh N. Chaturvedi

846-850

DOI: https://doi.org/10.26483/ijarcs.v8i9.5099
DOI: https://doi.org/10.26483/ijarcs.v8i9.5164
DOI: https://doi.org/10.26483/ijarcs.v8i9.5180
DOI: https://doi.org/10.26483/ijarcs.v8i9.5186
DOI: https://doi.org/10.26483/ijarcs.v8i9.5196
DOI: https://doi.org/10.26483/ijarcs.v8i9.5205
DOI: https://doi.org/10.26483/ijarcs.v8i9.4903