DOI: https://doi.org/10.26483/ijarcs.v3i5

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v3i5.1359
DOI: https://doi.org/10.26483/ijarcs.v3i5.1360
DOI: https://doi.org/10.26483/ijarcs.v3i5.1361
DOI: https://doi.org/10.26483/ijarcs.v3i5.1362

Ranking by Quality in Spatial Data Using Top-k Preference Theory

Dwibhashyam Srilalitha, K.Venkata Ramana, M.Vamsi Krishna

37-42

DOI: https://doi.org/10.26483/ijarcs.v3i5.1324

Load Balancing Techniques for Web Proxy Cache Clusters

Najat O. Alsaiari, Ayman G. Fayoumi

43-48

DOI: https://doi.org/10.26483/ijarcs.v3i5.1363

On Improving the Energy Efficiency of a Sensor Node in Multi-Patient Monitoring System

Merris Mary Chacko, Meena Jose,Sneha baby thomas, R.K.Nadesh

49-55

DOI: https://doi.org/10.26483/ijarcs.v3i5.1316

Data Validation System For A Relational Database

Kabari, Ledisi Giok, BAAH, Barida

56-61

DOI: https://doi.org/10.26483/ijarcs.v3i5.1322
DOI: https://doi.org/10.26483/ijarcs.v3i5.6071
DOI: https://doi.org/10.26483/ijarcs.v3i5.1358

Context Informatics in Ubiquitous Computing

Prof. Ajay Gadicha, Prof. Vijay B. Gadicha, Dr. A.S.Alvi

72-77

DOI: https://doi.org/10.26483/ijarcs.v3i5.1311
DOI: https://doi.org/10.26483/ijarcs.v3i5.1364
DOI: https://doi.org/10.26483/ijarcs.v3i5.1365
DOI: https://doi.org/10.26483/ijarcs.v3i5.1366
DOI: https://doi.org/10.26483/ijarcs.v3i5.1367
DOI: https://doi.org/10.26483/ijarcs.v3i5.1368

Handling Missing Values in A Dataset

Emeka, Chinedu E, Okonkwo Obi R

104-109

DOI: https://doi.org/10.26483/ijarcs.v3i5.1369
DOI: https://doi.org/10.26483/ijarcs.v3i5.1370
DOI: https://doi.org/10.26483/ijarcs.v3i5.1354
DOI: https://doi.org/10.26483/ijarcs.v3i5.1371
DOI: https://doi.org/10.26483/ijarcs.v3i5.1317

Advances In Mobile Voting

Somayeh Izadi, Saeed Zahedi,Kamran Morovati, Reza Ebrahimi Atani, Hadi Foroutan Jazi

127-131

DOI: https://doi.org/10.26483/ijarcs.v3i5.1372

Wireless Sensor Networks: A Performance Study of IEEE 802.15.4 Standard

M. Subramanya Bhat, J.T. Devaraju, D. Shwetha

132-135

DOI: https://doi.org/10.26483/ijarcs.v3i5.1342
DOI: https://doi.org/10.26483/ijarcs.v3i5.1319

A Survey of Regression Testing Techniques

Ahmed S. Ghiduk, Moheb R. Girgis, Eman H. Abd-Elkawy

140-148

DOI: https://doi.org/10.26483/ijarcs.v3i5.1373

Image Processing Based Automated Border Surveillance

Ankur Srivastava, Akhilesh Tripathi, Chetan Swaroop Sharma

149-153

DOI: https://doi.org/10.26483/ijarcs.v3i5.1320

An Automatic Road Sign Recognizer for an Intelligent Transport System

Md.Imran Hossain, Dr. Md. Mahabubur Rahman, Tapan Kumar Godder

154-157

DOI: https://doi.org/10.26483/ijarcs.v3i5.1374
DOI: https://doi.org/10.26483/ijarcs.v3i5.1375

Robust Authentication Model for ATM: a Biometric Strategy Measure for Enhancing E-Banking Security in Nigeria

Moses Okechukwu Onyesolu, McChester Odoh,Allwell Ononiwu Akanwa, Victor Chekume Nwasor

164-169

DOI: https://doi.org/10.26483/ijarcs.v3i5.1376
DOI: https://doi.org/10.26483/ijarcs.v3i5.1321

Information Retrieval: An Overview

Kuyoro Shade O., Ibikunle Frank A, Abel Samuel B.

175-178

DOI: https://doi.org/10.26483/ijarcs.v3i5.1349
DOI: https://doi.org/10.26483/ijarcs.v3i5.1345
DOI: https://doi.org/10.26483/ijarcs.v3i5.1326
DOI: https://doi.org/10.26483/ijarcs.v3i5.1356

A Survey on Taxonomy of Wireless Ad hoc Networks

A Narayana Rao, Dr Ch D V SubbaRao

187-192

DOI: https://doi.org/10.26483/ijarcs.v3i5.1347
DOI: https://doi.org/10.26483/ijarcs.v3i5.1396

Bluetooth Broadcasting: An Information Dissemination System

Bhushan G. Emekar, Sourabh S. Kulkarni

199-203

DOI: https://doi.org/10.26483/ijarcs.v3i5.1377

Data Hiding in Video using Least Bit Technique

Anupama. H.S, Naveen M S, Prasun Kumar, Cauvery.N.K, Ravi Kallappa, Vivek Kumar

204-207

DOI: https://doi.org/10.26483/ijarcs.v3i5.1357
DOI: https://doi.org/10.26483/ijarcs.v3i5.1340
DOI: https://doi.org/10.26483/ijarcs.v3i5.1378
DOI: https://doi.org/10.26483/ijarcs.v3i5.1346
DOI: https://doi.org/10.26483/ijarcs.v3i5.1351
DOI: https://doi.org/10.26483/ijarcs.v3i5.1352

A Study on Metadata Standards for Semantic Annotation of Learning Objects

Kalla. Madhu Sudhana, Dr V. Cyril Raj, Dr T.Ravi

234-238

DOI: https://doi.org/10.26483/ijarcs.v3i5.1355
DOI: https://doi.org/10.26483/ijarcs.v3i5.1391

K-means with Empirical Mode Decomposition for Classification of Remote Sensing Image

B. Saichandana, B.Srinivasa Rao,Dr.K.Srinivas, Visakhapatnam, India

245-248

DOI: https://doi.org/10.26483/ijarcs.v3i5.1339
DOI: https://doi.org/10.26483/ijarcs.v3i5.1394
DOI: https://doi.org/10.26483/ijarcs.v3i5.1343

An Efficient Semantic Web Search Engine

Shaik Mahaboob Basha, Sayed Yasin, Md. Amanatulla

256-259

DOI: https://doi.org/10.26483/ijarcs.v3i5.1395
DOI: https://doi.org/10.26483/ijarcs.v3i5.1313
DOI: https://doi.org/10.26483/ijarcs.v3i5.6072

Prosperity, Vulnerabilities and Security Threats in WSN

Surbhi Gupta, Amit Chaudhary, Bhumica Verma

269-272

DOI: https://doi.org/10.26483/ijarcs.v3i5.1325
DOI: https://doi.org/10.26483/ijarcs.v3i5.1314

Data Aggregation Security in Wireless Sensor Network

Pawan Kumar Goel, Dr. Vinit Kumar Sharma

278-282

DOI: https://doi.org/10.26483/ijarcs.v3i5.1348

Cloud Based Health Monitoring System

Meena jose, Merris mary chacko,Sneha baby thomas, R.K.Nadesh

283-286

DOI: https://doi.org/10.26483/ijarcs.v3i5.1315
DOI: https://doi.org/10.26483/ijarcs.v3i5.1323
DOI: https://doi.org/10.26483/ijarcs.v3i5.1318
DOI: https://doi.org/10.26483/ijarcs.v3i5.1420
DOI: https://doi.org/10.26483/ijarcs.v3i5.1341
DOI: https://doi.org/10.26483/ijarcs.v3i5.1344
DOI: https://doi.org/10.26483/ijarcs.v3i5.1422
DOI: https://doi.org/10.26483/ijarcs.v3i5.1353
DOI: https://doi.org/10.26483/ijarcs.v3i5.1421
DOI: https://doi.org/10.26483/ijarcs.v3i5.1350

A Clustering Method Using Simplified Swarm Intelligence Algorithm

Subarna Sinha, Asmita Bhaumik,Aditi Deb, Jhunu Debbarma

338-342

DOI: https://doi.org/10.26483/ijarcs.v3i5.1338
DOI: https://doi.org/10.26483/ijarcs.v3i5.1312
DOI: https://doi.org/10.26483/ijarcs.v3i5.1423