DOI: https://doi.org/10.26483/ijarcs.v6i6

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v6i6.2522
DOI: https://doi.org/10.26483/ijarcs.v6i6.2521

Request-Routing for Content Delivery Networks (CDN)

Omotunde, A. A, Okolie, S.O ,Adekunle, Y.A,Izang,, A.A, Ebiesuwa

10-16

DOI: https://doi.org/10.26483/ijarcs.v6i6.2538
DOI: https://doi.org/10.26483/ijarcs.v6i6.5996

Solve Some of the Problems of Linked List

Reza Jafari Ziarani, Payam Morad Abadi, Mohammad Amin Madadi

20-21

DOI: https://doi.org/10.26483/ijarcs.v6i6.2539
DOI: https://doi.org/10.26483/ijarcs.v6i6.2524
DOI: https://doi.org/10.26483/ijarcs.v6i6.2540
DOI: https://doi.org/10.26483/ijarcs.v6i6.2541

An Empirical Analysis of Classification Trees Algorithm for Protein Datsets

R. Ranjani Rani, P. Manikandan, Dr.D. Ramya Chitra

34-39

DOI: https://doi.org/10.26483/ijarcs.v6i6.2542
DOI: https://doi.org/10.26483/ijarcs.v6i6.2525
DOI: https://doi.org/10.26483/ijarcs.v6i6.2537
DOI: https://doi.org/10.26483/ijarcs.v6i6.2543
DOI: https://doi.org/10.26483/ijarcs.v6i6.2544
DOI: https://doi.org/10.26483/ijarcs.v6i6.2545
DOI: https://doi.org/10.26483/ijarcs.v6i6.2535
DOI: https://doi.org/10.26483/ijarcs.v6i6.2549

A Review on Reliability Oriented Routing Protocol in WSN

Navreet kaur, Amanjot kaur, Diviya Bharti

69-71

DOI: https://doi.org/10.26483/ijarcs.v6i6.2546
DOI: https://doi.org/10.26483/ijarcs.v6i6.2536

Garage Parking Automation System

Shivendra Pratap Singh, Ankur Kumar Jain

75-79

DOI: https://doi.org/10.26483/ijarcs.v6i6.2547
DOI: https://doi.org/10.26483/ijarcs.v6i6.2548

A Research on various Attacks in VANET

Namarpreet Kaur, Aman Arora

85-88

DOI: https://doi.org/10.26483/ijarcs.v6i6.2550
DOI: https://doi.org/10.26483/ijarcs.v6i6.2526

An Inexpensive Wearable Android Accessory

Kaustav Basu, Prabal Banerjee, Proyag Pal

94-98

DOI: https://doi.org/10.26483/ijarcs.v6i6.2527
DOI: https://doi.org/10.26483/ijarcs.v6i6.2551
DOI: https://doi.org/10.26483/ijarcs.v6i6.2528
DOI: https://doi.org/10.26483/ijarcs.v6i6.2552

Framework for Opinion Mining from Web Blogs

Nishikant Bele, Bikram Kesari Ratha

113-116

DOI: https://doi.org/10.26483/ijarcs.v6i6.2553

Watermarking using DWT and PCA

Sonam Rani, Shailja Kumari

117-120

DOI: https://doi.org/10.26483/ijarcs.v6i6.2529
DOI: https://doi.org/10.26483/ijarcs.v6i6.2530
DOI: https://doi.org/10.26483/ijarcs.v6i6.2533
DOI: https://doi.org/10.26483/ijarcs.v6i6.2531

A New Scheduling Method for Workflows on Cloud Computing

Seyed Ebrahim Dashti, Amir masoud Rahmani

133-145

DOI: https://doi.org/10.26483/ijarcs.v6i6.2523
DOI: https://doi.org/10.26483/ijarcs.v6i6.2562
DOI: https://doi.org/10.26483/ijarcs.v6i6.5997

Cloud Computing and Physical Health

Brijesh K. Upadhayay

153-158

DOI: https://doi.org/10.26483/ijarcs.v6i6.2554
DOI: https://doi.org/10.26483/ijarcs.v6i6.2555
DOI: https://doi.org/10.26483/ijarcs.v6i6.2556
DOI: https://doi.org/10.26483/ijarcs.v6i6.2557

Novel Approach to Factorize the RSA Public Key Encryption

Ms. Mrinalini shringirishi, Dr. Manoj Gupta,Yashpal singh, Anil Kumar Solanki, Ms. Pritee Gupta

172-176

DOI: https://doi.org/10.26483/ijarcs.v6i6.2558

Compression algorithm for images (Using P2C& P4C Algoritm)

Reza Jafari Ziarani, Payam Morad Abadi, Mohammad Amin Madadi

177-179

DOI: https://doi.org/10.26483/ijarcs.v6i6.2563
DOI: https://doi.org/10.26483/ijarcs.v6i6.2560
DOI: https://doi.org/10.26483/ijarcs.v6i6.2532
DOI: https://doi.org/10.26483/ijarcs.v6i6.2534
DOI: https://doi.org/10.26483/ijarcs.v6i6.2559

Security Challenges in Big Data: Review

Vivekanand Vivekanand, Dr.B.M Vidyavathi

199-201

DOI: https://doi.org/10.26483/ijarcs.v6i6.2561

A Survey on Privacy Preserving and Access Control in Public Clouds

Radhika Makadia, Abhilash Kumar Patra, Rashmi R

202-206

DOI: https://doi.org/10.26483/ijarcs.v6i6.2564