DOI: https://doi.org/10.26483/ijarcs.v5i7

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v5i7.2285

Novel Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks

Tata Jagannadha Swamy, Dr.KVSVR Prasad, Dr. Garimella Ramamurthy

9-15

DOI: https://doi.org/10.26483/ijarcs.v5i7.2286
DOI: https://doi.org/10.26483/ijarcs.v5i7.2269

Parametric Analysis of FIR Digital Filter for Wireless VoIP System

Sansar Chand, Harjit Pal Singh,Jasbinder Singh, Anurag Sharma

21-25

DOI: https://doi.org/10.26483/ijarcs.v5i7.2288
DOI: https://doi.org/10.26483/ijarcs.v5i7.2262

Implementing Security in Mobile Agents by using AES Technique

Mitali Sachdeva, Amit Chhabra, Arvind Sharma

34-39

DOI: https://doi.org/10.26483/ijarcs.v5i7.2263
DOI: https://doi.org/10.26483/ijarcs.v5i7.2289
DOI: https://doi.org/10.26483/ijarcs.v5i7.2290

Prototype of Information System of Tangible Cultural Heritage Documents Management

Khafiizh Hastuti, Abu Salam,L. Budi Handoko, Erwin Yudi Hidayat

50-54

DOI: https://doi.org/10.26483/ijarcs.v5i7.2291
DOI: https://doi.org/10.26483/ijarcs.v5i7.2265

Computerized Board Game: Dara

Ndukwe, I.G, Nwulu, E. A., Damwesh, T. T.

59-62

DOI: https://doi.org/10.26483/ijarcs.v5i7.2292
DOI: https://doi.org/10.26483/ijarcs.v5i7.2293

Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks

Emmanuel C. Ogu, Alao, O.D., Omotunde, A.A, Ogbonna A.C., Izang A.A

67-71

DOI: https://doi.org/10.26483/ijarcs.v5i7.2294
DOI: https://doi.org/10.26483/ijarcs.v5i7.2295
DOI: https://doi.org/10.26483/ijarcs.v5i7.2281

Multi Focus Image Fusion Using Discrete Wavelet Transform Algorithm

M.Mohamed Suhail, P.V.Ganeshkumar,R.Balamurugan, Dr.A.Muthukumaravel

83-87

DOI: https://doi.org/10.26483/ijarcs.v5i7.2296
DOI: https://doi.org/10.26483/ijarcs.v5i7.2268
DOI: https://doi.org/10.26483/ijarcs.v5i7.2297
DOI: https://doi.org/10.26483/ijarcs.v5i7.2266

A Survey on Pre-processing of Microarray Gene Expression Data

Dr. Subhendu ku. Pani, Ajoy ku. Mishra, Dr. Bikram Kesari Ratha

103-104

DOI: https://doi.org/10.26483/ijarcs.v5i7.2298

QR-Code based Digital Wallet

Sharvil Shetty, Trilok Shetty, Rohit Amale

105-109

DOI: https://doi.org/10.26483/ijarcs.v5i7.2264

Sorting of Numbers in a Graph-Theoretic Approach

Sinchan Sengupta, Ritwika Law

110-115

DOI: https://doi.org/10.26483/ijarcs.v5i7.2284
DOI: https://doi.org/10.26483/ijarcs.v5i7.2300

Block Ciphers in Cryptograpy

Prof. Saroj Singh

120-126

DOI: https://doi.org/10.26483/ijarcs.v5i7.2267

A Review on Web Security and Its Applications

Shikha Vashist, Ayush Gupta

127-129

DOI: https://doi.org/10.26483/ijarcs.v5i7.2272
DOI: https://doi.org/10.26483/ijarcs.v5i7.2273

Authenticating a webpage using CAPTCHA image

R. Kanimozhi, Dr. D. Jagadeesan

133-135

DOI: https://doi.org/10.26483/ijarcs.v5i7.2276
DOI: https://doi.org/10.26483/ijarcs.v5i7.2301
DOI: https://doi.org/10.26483/ijarcs.v5i7.2280

Driver Fatigue Detection Based On Eye Track: A Survey

S. Padma Rubhan, B. Anuradha, H..Anandha kumar

147-149

DOI: https://doi.org/10.26483/ijarcs.v5i7.2302
DOI: https://doi.org/10.26483/ijarcs.v5i7.2303

Soft Biometrics Techniques – A Technical Review

Suhail Tomar, K. Senthil Kumar, D. Malathi

153-157

DOI: https://doi.org/10.26483/ijarcs.v5i7.2304
DOI: https://doi.org/10.26483/ijarcs.v5i7.2277
DOI: https://doi.org/10.26483/ijarcs.v5i7.2305
DOI: https://doi.org/10.26483/ijarcs.v5i7.2278
DOI: https://doi.org/10.26483/ijarcs.v5i7.2306
DOI: https://doi.org/10.26483/ijarcs.v5i7.2282

Creating Graph Databases From Relational Databases: An Implementation

Mr. S. Bordoloi, Dr. B. Kalita,Deep Kumar Das, Sabiha Hussain Barlaskar

179-182

DOI: https://doi.org/10.26483/ijarcs.v5i7.2307

A Review on Cloud Computing Security Issues

Amarbeer Kaur, Nitin Bhagat

183-186

DOI: https://doi.org/10.26483/ijarcs.v5i7.2308
DOI: https://doi.org/10.26483/ijarcs.v5i7.2312

Predicting Child's Health using Big Data Analytics

Vishal Johri, Varun Singh, Ishan Srivastava

193-198

DOI: https://doi.org/10.26483/ijarcs.v5i7.2309

Performance Analysis On Decision Tree Algorithms

Miss Nalanda B Dudde, Dr Mrs S.S. Apte

199-201

DOI: https://doi.org/10.26483/ijarcs.v5i7.2310

Performance Analysis on Traffic Sensitive Vertical HandOff Algorithm TSVHOA

A. Bhuvaneswari, E. George Dharma Prakash Raj, P. Rajeswari

202-204

DOI: https://doi.org/10.26483/ijarcs.v5i7.2313
DOI: https://doi.org/10.26483/ijarcs.v5i7.2279

A Review on Data Mining and Its Applications

Shikha Vashist, Ayush Gupta

209-210

DOI: https://doi.org/10.26483/ijarcs.v5i7.6012

A Secure Smart Card Based on Remote user Authentication Protocol

K.Vijay Kumar, Dr. N. Chandra Sekhar Reddy, Gaddam Geetha

211-216

DOI: https://doi.org/10.26483/ijarcs.v5i7.2283

Unsupervised Image Segmentation using ROR

Dr B.L. Shivakumar, B.Suresh Kumar

217-221

DOI: https://doi.org/10.26483/ijarcs.v5i7.2314
DOI: https://doi.org/10.26483/ijarcs.v5i7.2287

Artificial Immune System to Protect Social Network

Rajneeshkaur K. Bedi, Oshin Kavdia,Gauri Bhide, Vaidehi Donglikar

228-231

DOI: https://doi.org/10.26483/ijarcs.v5i7.2315
DOI: https://doi.org/10.26483/ijarcs.v5i7.2316
DOI: https://doi.org/10.26483/ijarcs.v5i7.2274
DOI: https://doi.org/10.26483/ijarcs.v5i7.2317
DOI: https://doi.org/10.26483/ijarcs.v5i7.2311

Performance Metrics for Selection of Quality Hidden Web Documents

Rashmi Agarwal, Niraj Singhal, Prem Sagar

248-252

DOI: https://doi.org/10.26483/ijarcs.v5i7.2318
DOI: https://doi.org/10.26483/ijarcs.v5i7.2270
DOI: https://doi.org/10.26483/ijarcs.v5i7.2275
DOI: https://doi.org/10.26483/ijarcs.v5i7.2320

An Overview of the Achievements of Operating System Architectures

Maminor Gbubemi Ukeh, Kuyoro Shade O.,Ogunojemite Y, Akinlade B

266-269

DOI: https://doi.org/10.26483/ijarcs.v5i7.2319

INTRUDER DETECION SYSTEM USING IMAGE PROCESSING

Laxman Tawade, Abida Bapu Aboobacker

270-278

DOI: https://doi.org/10.26483/ijarcs.v5i7.2299

Design and Implementation of Frequency Hopping using Hardware Descriptive Language

Bilal Ahmad, Syed Asfandyar Gilani, Malik Junaid Aziz

279-281

DOI: https://doi.org/10.26483/ijarcs.v5i7.2271

Video Segmentation and Video Indexing For E-Learning

Laxman Tawade, Abida Bapu Aboobacker

282-287

DOI: https://doi.org/10.26483/ijarcs.v5i7.6013