DOI: https://doi.org/10.26483/ijarcs.v6i2

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v6i2.2436
DOI: https://doi.org/10.26483/ijarcs.v6i2.2430
DOI: https://doi.org/10.26483/ijarcs.v6i2.2417

HASCII Encryption Algorithm

Hemang Tailor, Akshat Gandhi,Chintan Doshi, Sahil Ajmera

14-18

DOI: https://doi.org/10.26483/ijarcs.v6i2.2420
DOI: https://doi.org/10.26483/ijarcs.v6i2.2422
DOI: https://doi.org/10.26483/ijarcs.v6i2.2432
DOI: https://doi.org/10.26483/ijarcs.v6i2.2433

An Application Launcher using A Resistive Touchscreen

Shenoy Anush Keshav, ShahRunal Vibhash,Valvi Supriya Prakash, Prof. Sunil Katkar, Prof. Vikrant A. Agaskar

35-37

DOI: https://doi.org/10.26483/ijarcs.v6i2.2437
DOI: https://doi.org/10.26483/ijarcs.v6i2.2415
DOI: https://doi.org/10.26483/ijarcs.v6i2.2426
DOI: https://doi.org/10.26483/ijarcs.v6i2.2431

Vehicular Ad-hoc Network (VANET) - Privacy and Security

Anil Kr. Panghal, Sharda Rani, Poonam

51-53

DOI: https://doi.org/10.26483/ijarcs.v6i2.2438

Efficient Way Of Web Development Using Python And Flask

Fankar Armash Aslam, Hawa Nabeel Mohammed, Prof. P. S. Lokhande

54-57

DOI: https://doi.org/10.26483/ijarcs.v6i2.2434
DOI: https://doi.org/10.26483/ijarcs.v6i2.2435
DOI: https://doi.org/10.26483/ijarcs.v6i2.2419

Quick Pay A Micro-payment

Tulika Harsulkar, Asmita More, Bhakti Mahadik , Suchita Patil

67-71

DOI: https://doi.org/10.26483/ijarcs.v6i2.2416
DOI: https://doi.org/10.26483/ijarcs.v6i2.2421
DOI: https://doi.org/10.26483/ijarcs.v6i2.2439
DOI: https://doi.org/10.26483/ijarcs.v6i2.2414
DOI: https://doi.org/10.26483/ijarcs.v6i2.2424

Intelligent Placement Portal for Engineering Education

Khan Nida, Hajee Saima, P.S. Lokhande

92-95

DOI: https://doi.org/10.26483/ijarcs.v6i2.2423
DOI: https://doi.org/10.26483/ijarcs.v6i2.2442

Wireless Video Surveillance Robot Controlled using Simple Bluetooth Android Application

Shoeb Maroof Shaikh, Khan Sufiyan,Asgar Ali, Mir Ibrahim, Prof. Kalpana Bodke

100-103

DOI: https://doi.org/10.26483/ijarcs.v6i2.2443

SELinux & Linux Repository: Introduction

Anjali Kundu, Parveen Bano

104-105

DOI: https://doi.org/10.26483/ijarcs.v6i2.2440

Operative use of Image Stitching Algorithm Based on Feature Extraction

Dalwai Azhar Khan Afzal Khan, Ansari Mohd.Manzoor Maqsood, Khan Mubashir Abdul Rashid Khan

106-111

DOI: https://doi.org/10.26483/ijarcs.v6i2.2444

Implementation of Path Navigator for Smart Devices using Augmented Reality

Arfat Zubair Patel, Kazi Aquib Javed,Syed Ashraf Ali, Hamza Mohammed Noor Patel, Abdul Mugeesh Abdul Mateen

112-116

DOI: https://doi.org/10.26483/ijarcs.v6i2.2445
DOI: https://doi.org/10.26483/ijarcs.v6i2.2428

A Review on Wireless Sensor Network Security

Gurwinder Singh, Nitin Bhagat

121-123

DOI: https://doi.org/10.26483/ijarcs.v6i2.2446

A Tool for Video Forgery Detection in Video Sequences

Saminda Premaratne, A.S.C.I Piyumalie, L.L.T Pubudini, B.U.S Senarathne, K.M Thilakarathne

124-127

DOI: https://doi.org/10.26483/ijarcs.v6i2.2425
DOI: https://doi.org/10.26483/ijarcs.v6i2.2427
DOI: https://doi.org/10.26483/ijarcs.v6i2.2447

Review of Generation of Time Table Using Genetic Algorithm Implemented in Java

Khan Arman, Khan Sabir Ali, Choudhary Suhel, Prof. Kalpana R. Bodke

137-141

DOI: https://doi.org/10.26483/ijarcs.v6i2.2449
DOI: https://doi.org/10.26483/ijarcs.v6i2.2441
DOI: https://doi.org/10.26483/ijarcs.v6i2.2450
DOI: https://doi.org/10.26483/ijarcs.v6i2.2451

A Review on BlackHole Attack Issues

Gurbir Singh, Nitin Bhagat

157-160

DOI: https://doi.org/10.26483/ijarcs.v6i2.2448

A Review on Security Issues in VANET

Namarpreet Kaur, Aman Arora

161-165

DOI: https://doi.org/10.26483/ijarcs.v6i2.2455
DOI: https://doi.org/10.26483/ijarcs.v6i2.2453
DOI: https://doi.org/10.26483/ijarcs.v6i2.2452

A Review on Security Issues in Cloud Computing

Harmanjeet Kaur, Ms. Neha Bhardwaj

178-182

DOI: https://doi.org/10.26483/ijarcs.v6i2.2454

Document Classification using Neural Networks Based on Words

Vallari Kothari, Chaitanya Naik, Zankhana Rana

183-188

DOI: https://doi.org/10.26483/ijarcs.v6i2.2429