DOI: https://doi.org/10.26483/ijarcs.v4i11

Published: 2017-01-13

Improvements on Heuristic Algorithms for Solving Traveling Salesman Problem

Gözde Kızılateş, Fidan Nuriyeva, Murat Erşen Berberler

1-8

DOI: https://doi.org/10.26483/ijarcs.v4i11.1916

Message communication using Phase Shifting Method (PSM)

Debabrata Samanta, Syed Khutubuddin Ahmed Khadri, Mousumi Paul

9-11

DOI: https://doi.org/10.26483/ijarcs.v4i11.1936
DOI: https://doi.org/10.26483/ijarcs.v4i11.1937
DOI: https://doi.org/10.26483/ijarcs.v4i11.1938
DOI: https://doi.org/10.26483/ijarcs.v4i11.1939
DOI: https://doi.org/10.26483/ijarcs.v4i11.1940
DOI: https://doi.org/10.26483/ijarcs.v4i11.1941
DOI: https://doi.org/10.26483/ijarcs.v4i11.1928

A Fuzzy Based Approach for Student Admission Recommendation into Seminary

S. Kalyani, R V S Ratna Kumar, S. Ram Prasad Reddy

50-53

DOI: https://doi.org/10.26483/ijarcs.v4i11.1942

Comparative analysis of AODV, DSR, DSDV varying pause time.

S. V. Gumaste, Dr. M. U. Kharat., Dr. V. M. Thakare

54-57

DOI: https://doi.org/10.26483/ijarcs.v4i11.1943
DOI: https://doi.org/10.26483/ijarcs.v4i11.1914
DOI: https://doi.org/10.26483/ijarcs.v4i11.1944
DOI: https://doi.org/10.26483/ijarcs.v4i11.1947
DOI: https://doi.org/10.26483/ijarcs.v4i11.1926
DOI: https://doi.org/10.26483/ijarcs.v4i11.1918

Privacy Issues Regarding Personal Data In Cloud Computing

Anjul K. S. Rai, Dr. Samidha D. Sharma

84-85

DOI: https://doi.org/10.26483/ijarcs.v4i11.1915

Secure Aggregation in Wireless Sensor Networks: A Review

Rakesh Sharma, Matish Garg, Pinki Sharma

86-92

DOI: https://doi.org/10.26483/ijarcs.v4i11.1945
DOI: https://doi.org/10.26483/ijarcs.v4i11.1920
DOI: https://doi.org/10.26483/ijarcs.v4i11.1921
DOI: https://doi.org/10.26483/ijarcs.v4i11.1946
DOI: https://doi.org/10.26483/ijarcs.v4i11.1924

Enhanced Gap Sequencing Shell Sort

Agam Verma, Jitender Kumar Sharma

113-118

DOI: https://doi.org/10.26483/ijarcs.v4i11.1934

Color Histogram based Image Retrieval – A Survey

Pushpalatha .K.R, Chaitra.M, Asha Gowda Karegowda

119-126

DOI: https://doi.org/10.26483/ijarcs.v4i11.1948
DOI: https://doi.org/10.26483/ijarcs.v4i11.1949
DOI: https://doi.org/10.26483/ijarcs.v4i11.1932
DOI: https://doi.org/10.26483/ijarcs.v4i11.1933
DOI: https://doi.org/10.26483/ijarcs.v4i11.1927

Enhanced Speed Processing of Data using in-Memory Analytics

T.Selva Divya, M.Jayanthi, V.Vinoth Kumar

149-153

DOI: https://doi.org/10.26483/ijarcs.v4i11.1950
DOI: https://doi.org/10.26483/ijarcs.v4i11.1951
DOI: https://doi.org/10.26483/ijarcs.v4i11.1952

Enhancement of Content Distribution and Verification in Network Coding

S.P. Anandraj, G.Sukhaveerji,S.Poornima, K.Jhonson

162-165

DOI: https://doi.org/10.26483/ijarcs.v4i10.1923

Software Fault Prediction using Inteligence Techniques

Anita Nair, Amit Arya,Anurag Shrivastava, Vishal Shrivastava

166-169

DOI: https://doi.org/10.26483/ijarcs.v4i9.1917
DOI: https://doi.org/10.26483/ijarcs.v4i11.1919
DOI: https://doi.org/10.26483/ijarcs.v4i11.1922
DOI: https://doi.org/10.26483/ijarcs.v4i11.1929
DOI: https://doi.org/10.26483/ijarcs.v4i11.1930

Remote Control and Automation of Agriculture Devices Using Android Technology

Ajit Bande, Mrs. V.R. Waghmare,Komal Bhalerao, Tushar Deshmukh, Mukund Jadhav

187-189

DOI: https://doi.org/10.26483/ijarcs.v4i11.1912

Human Identification using MDA,LDA,BPNN,NN Techniques

Namita Kakkar, Neha Mehan, Robindeep Kaur

190-194

DOI: https://doi.org/10.26483/ijarcs.v4i11.1953
DOI: https://doi.org/10.26483/ijarcs.v4i11.1955
DOI: https://doi.org/10.26483/ijarcs.v4i11.1956

A Study of Association Rule Mining Algorithms

Ila Chandrakar, Mari Kirthima

204-206

DOI: https://doi.org/10.26483/ijarcs.v4i11.1931
DOI: https://doi.org/10.26483/ijarcs.v4i11.1957
DOI: https://doi.org/10.26483/ijarcs.v4i11.1958
DOI: https://doi.org/10.26483/ijarcs.v4i11.1954
DOI: https://doi.org/10.26483/ijarcs.v4i11.6029
DOI: https://doi.org/10.26483/ijarcs.v4i11.1935