DOI: https://doi.org/10.26483/ijarcs.v8i9

Published: 2017-12-20

ANDROID MALWARE DETECTION USING HAML

Mahima Choudhary, Brij Kishore

14-19

THE ASSESSMENT OF RISKS IN PUBLIC CLOUD ENVIRONMENT BY DEVELOPING MULTINOMINAL LOGISTIC REGRESSION MODEL

Sri Bindu Mareedu, Seetha Rama Prasad Mylavarapu, Sravani Guntupalli

25-30

SESSION PASSWORD AUTHENTICATION USING IMAGE - BASED SYSTEM [IBS]

Shivamurthaiah Mallaiah, Praveen Kumar K, Sitesh Kumar Sinha, Manasa L.R

34-36

AGILITY: THE NEED OF AN HOUR FOR SOFTWARE INDUSTRY

Tushar Vinayak Sambare, Gulabchand K Gupta

41-46

SIZE ESTIMATION AT DESIGN STAGES OF SYSTEM DEVELOPMENT

Dr. Madhu Bhan, Dr.Rajanikanth K, Dr. T.V. Suresh Kumar

76-81

AUTOMATIC SPEECH RECOGNITION APPROACH FOR DIVERSE VOICE COMMANDS

Muheet ahmed butt, MEHAK MEHRAJ, MS. ARTI GOEL, Majid Zaman

137-144

ANALYSIS OF SMART STORE SOLUTIONS USING PROXIMITY TECHNOLOGIES

Shreyas Dighe, Prathamesh Churi, Mokshit Jain, Abhinandan Desai, Yug Desai, Prof.Mohini Reddy

170-176

SMART TRANSPORT SYSTEM USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY

shreyas vitthal mahangade, Rahul Khose Khose, Vicky Salunkhe, Nikhil Angane, Poonam Gupta

177-179

DATA ANALYTICS IN BANKING

Rishabh Jamar, Javan Rajpopat, Prathamesh Churi, Serena Lekhrajani

180-183

OVERVIEW OF COGNITIVE RADIO NETWORKS

Shelly Berwal, Vikas Sindhu

198-201

DDOS ATTACK ON WIRELESS SENSOR NETWORK: A REVIEW

Priya Pandey, Maneela Jain, Rajneesh Pachouri

227-229

-ANALYSIS OF RELEVANCY USING RAPID MINER WITH AN EXPERIMENTAL STUDY ON POPULAR DISCUSSION FORUM

Radhika Patthi, Dr P.Suresh Varma, M. Santosh, Dr.G.V. Rao, K. Kamakshaiah

240-244

ANNOTATING FEATURES EXTRACTED THROUGH LATENT DIRICHLET ALLOCATION FOR FEATURE BASED OPINION MINING

Padmapani Prakash Tribhuvan, Sunil G. Bhirud, Ratnadeep R. Deshmukh

251-255

SECURITY AND DDOS MECHANISMS IN INTERNET OF THINGS

Jeet kaur, Anju Bhandari Gandhi

261-265

AN INSIGHT INTO THE USAGE OF BIG DATA ANALYTICS

Chandralekha M, Dr. N. Shenbagavadivu

281-283

REVIEW OF SENTIMENT ANALYSIS ON TWITTER DATA USING PYTHON

Surabhi Thorat, Prajakta Deshpande, Vikrant Shaga

284-286

IMPROVING CLOUD SECURITY BY THE APPLICATION OF DE-DUPLICATION

Sweety ., Preety Mahajan, Aastha Mahajan

299-307

INVERSE SIGNED DOMINATING FUNCTIONS OF CORONA AND ROOTED PRODUCT GRAPHS

shobha Rani C, S. Jeelani Begum, G. S. S. Raju

331-336

DATABASE QUERY OPTIMIZATION USING GENETIC ALGORITHM

Megha B Auti, Prof. Sandeep Gore

376-378

ROUGH TOPOLOGY ON APPROXIMATION SPACES

Sheeja T K, Sunny Kuriakose A.

379-384

VIRTUAL MACHINE MIGRATION: A COMPARATIVE STUDY

Varun Jasuja, RAJESH KUMAR SINGH

385-392

A REVIEW OF ARTIFICIAL INTELLIGENCE SYSTEMS

Mrs.E Sreedevi, Mr.K. Saravanan, Dr.V. Subhamathi

418-421

SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

P Daniel Sundarraj, Dr.K. Arulanandam,

422-424

BIG DATA ANALYTICS: AN EPITOME

VISHAL BATVIA, Drashti Patel, Parth Goel, Dr. Mamta Padole

429-433

MINING OF CRIMINAL MINDSET AND GEOSPATIAL CRIME PATTERN DETECTION

Anchal Oberai, Malika Jain, Gautam Khosla, Monika Arora, Priyanka Dewan

434-437

DEVELOPMENT MOBILE APPLICATION TO IMPROVE MEDICAL SERVICE (USING GOOGLE MAPS)

Dr. Osman ANasr, Enayat Ali, Dr. Eltyeb E.Abed Elgabar

477-481

COLLUSION BW HOLE ATTACK

Sunil Kumar Jangir, Naveen Hemrajani

496-500

A REVIEW ON EEG CONTROL SMART WHEEL CHAIR

Yumlembam Rahul, Rupam Kumar Sharma, Nissi Paul

501-507

BER PERFORMANCE REVIEW OF WIMAX MIMO SYSTEM

Parul Sangwan, Vikas Nandal

517-521

IMPUTING THE MISSING VALUES IN IOT USING ESTCP MODEL

MrsI..Priya Stella. Mary, Dr. L. Arockiam

532-536

IMPLEMENTATION OF SMART PARKING MANAGEMENT SYSTEM USING APACHE TOMCAT SERVER

N Shirisha, M Anila, Raswitha Bandi, B Durga Sri

549-553

USER STORIES FOR PROPOSED WEB APPLICATION USING AGILE APPROACH

Sapna K Jadhav, Dr. Vikrant Shaga, Surabhi D. Thorat

570-573

IMPLEMENTATION OF A FORMAT MIGRATION USING SAAS MODEL

R Karthik, N Sirisha, G Divya Jyothi, B Raswitha, B Durga Sri

623-626

A QUIZZING SYSTEM FOR BLIND AND VISUALLY IMPAIRED CANDIDATES

Michael Hosein, Réginald Cherenfant Jasmin

633-641

FUTURE NETWORKS – AN SOA PERSPECTIVE DESIGN GOALS

Ravi Kumar Merugumala, Y.K.Sundara Krishna

649-654

A REVIEW ON TRUST BASED SECURE ROUTING PROTOCOLS IN AD-HOC NETWORKS

Sandeep Patil, Dr. L.S. Admuthe, Dr. M. R. Patil

661-668

USER INTERFACES TO DATABASES - A SURVEY

D. MABUNI, Dr. G.A. Ramachandra

710-713

A LOCAL APPROACH TO GABOR WAVELET BASED FACE RECOGNITION SYSTEM

kailash sharma, Ramchandra R. Manthalkar

718-722

AN EASY, SMART & INTELLIGENT WAY TO LEARN: “ONLINE EDUCATIONâ€

Prince Sharma, Kaptan Bhardwaj, Divya Bhardwaj

735-737

A MINI REVIEW ON RADAR FUNDAMENTALS AND CONCEPT OF JAMMING

R Karthik, P Anjaneyulu, B Annapurna, P Haribabu, T Vijetha

763-767

ADVANCE AUTOMATED RAILWAY CROSSING SYSTEM

Pawan singh, Akansh Saxena

794-796

A TABLEAU TOOL FOR AN EFFECTIVE EVENT MANAGEMENT

Saikumar Senagavarapu, S. Yogitha, K. Soumya, S. Sai Kumar, L. Ravi Kumar, M. Sundarababu

801-803

A VIRTUAL TOUR PLANNER - A PREDICTION REVIEW ARTICLE

L. Ravi Kumar, S. Sai Kumar, P.Vineela Rani, P. Varshitha, Ch. Rineesha, N. Swetha, M. Sowjanya

815-818

A NEARBY PLACE THROUGH A GRAPHICAL REPRESENTATION

T. Vyshnavi, S.N.S.M. Praneetha, M. Jahnavi, Dr. J. Rajendra Prasad

819-821

EVALUATION OF IMAGE DEHAZING BY PSO BASED DARK CHANNEL PRIOR

Poonam ., Dr. V K Banga, Gurjit singh

829-833

ENHANCING THE SECURITY OF IoT DATA USING MULTILEVEL ENCRYPTION

A Vithya Vijayalakshmi, Dr. L. Arockiam

841-845

A REVIEW ON IMAGE SEGMENTATION TECHNIQUES WITH AN APPLICATION PERSPECTIVE

Nishi Mehta, Kinjal Munot, Sakshi Mishra, Ratnesh N. Chaturvedi

846-850