DOI: https://doi.org/10.26483/ijarcs.v8i3

Published: 2017-04-30

DOI: https://doi.org/10.26483/ijarcs.v8i3.2937
DOI: https://doi.org/10.26483/ijarcs.v8i3.2938
DOI: https://doi.org/10.26483/ijarcs.v8i3.2939
DOI: https://doi.org/10.26483/ijarcs.v8i3.2940
DOI: https://doi.org/10.26483/ijarcs.v8i3.2942

Big Data: An Introduction

Bhimendra Pal Singh, Alka Agrawal

21-22

DOI: https://doi.org/10.26483/ijarcs.v8i3.2943
DOI: https://doi.org/10.26483/ijarcs.v8i3.2944

A Review Paper on Software Defined Networking

Sumit badotra, Japinder Singh

29-36

DOI: https://doi.org/10.26483/ijarcs.v8i3.2945
DOI: https://doi.org/10.26483/ijarcs.v8i3.2946

A Review on CBIR by Cascading Features & SVM

Savita Savita, Sandeep Jain, Prof. (Dr.) K.K. Paliwal

42-45

DOI: https://doi.org/10.26483/ijarcs.v8i3.3193
DOI: https://doi.org/10.26483/ijarcs.v8i3.2947
DOI: https://doi.org/10.26483/ijarcs.v8i3.2948
DOI: https://doi.org/10.26483/ijarcs.v8i3.2950
DOI: https://doi.org/10.26483/ijarcs.v8i3.2951
DOI: https://doi.org/10.26483/ijarcs.v8i3.2952
DOI: https://doi.org/10.26483/ijarcs.v8i3.2953
DOI: https://doi.org/10.26483/ijarcs.v8i3.2954

Lossless Compression of VC Shares in RGB Color Space

M. Mary Shanthi Rani, G.Germine Mary

79-85

DOI: https://doi.org/10.26483/ijarcs.v8i3.2955
DOI: https://doi.org/10.26483/ijarcs.v8i3.2956
DOI: https://doi.org/10.26483/ijarcs.v8i3.2957
DOI: https://doi.org/10.26483/ijarcs.v8i3.2959
DOI: https://doi.org/10.26483/ijarcs.v8i3.2960
DOI: https://doi.org/10.26483/ijarcs.v8i3.2961
DOI: https://doi.org/10.26483/ijarcs.v8i3.2962
DOI: https://doi.org/10.26483/ijarcs.v8i3.2963
DOI: https://doi.org/10.26483/ijarcs.v8i3.2964
DOI: https://doi.org/10.26483/ijarcs.v8i3.2965

An Enhanced Bat Algorithm for Data Clustering Problems

Neeraj Dahiya, Surjeet Dalal, Savita Khatri

141-146

DOI: https://doi.org/10.26483/ijarcs.v8i3.2966
DOI: https://doi.org/10.26483/ijarcs.v8i3.2967

Typed Malayalam Character Recognition

Amalu Johns, Jibrael Jos

152-156

DOI: https://doi.org/10.26483/ijarcs.v8i3.2968
DOI: https://doi.org/10.26483/ijarcs.v8i3.2969
DOI: https://doi.org/10.26483/ijarcs.v8i3.2970
DOI: https://doi.org/10.26483/ijarcs.v8i3.2971

Perceptrons Helping to Secure VANETs

Ekta Narwal, Sumeet Gill

181-184

DOI: https://doi.org/10.26483/ijarcs.v8i3.2972

Deactivation of Reactive Jammers in Wireless Sensor Networks

Supreetha Patel, Pallavi R, Nandini P

185-188

DOI: https://doi.org/10.26483/ijarcs.v8i3.2973
DOI: https://doi.org/10.26483/ijarcs.v8i3.2974
DOI: https://doi.org/10.26483/ijarcs.v8i3.2975
DOI: https://doi.org/10.26483/ijarcs.v8i3.2976
DOI: https://doi.org/10.26483/ijarcs.v8i3.2978
DOI: https://doi.org/10.26483/ijarcs.v8i3.2979
DOI: https://doi.org/10.26483/ijarcs.v8i3.2980
DOI: https://doi.org/10.26483/ijarcs.v8i3.2981
DOI: https://doi.org/10.26483/ijarcs.v8i3.2982

A Survey on Web Structure Mining

Kuber Mohan, Jitendra Kurmi, Sanjay Kumar

227-232

DOI: https://doi.org/10.26483/ijarcs.v8i3.2984
DOI: https://doi.org/10.26483/ijarcs.v8i3.2986
DOI: https://doi.org/10.26483/ijarcs.v8i3.2987
DOI: https://doi.org/10.26483/ijarcs.v8i3.2988

A Survey on Crwaling Strategy

Swati G. Bhoi, Prof. Ujwala M. Patil

250-253

DOI: https://doi.org/10.26483/ijarcs.v8i3.2989
DOI: https://doi.org/10.26483/ijarcs.v8i3.2990
DOI: https://doi.org/10.26483/ijarcs.v8i3.2991
DOI: https://doi.org/10.26483/ijarcs.v8i3.2992
DOI: https://doi.org/10.26483/ijarcs.v8i3.2993

Book Recommendation using Cosine Similarity

Rofeca Giri Rymmai, Saleema JS

276-281

DOI: https://doi.org/10.26483/ijarcs.v8i3.2995
DOI: https://doi.org/10.26483/ijarcs.v8i3.2996
DOI: https://doi.org/10.26483/ijarcs.v8i3.2998
DOI: https://doi.org/10.26483/ijarcs.v8i3.2999

Public Key Cryptographic Technique Based On Suzuki 2-Group

Akshaykumar Meshram, Chandrashekhar Meshram, N.W. Khobragade

300-305

DOI: https://doi.org/10.26483/ijarcs.v8i3.3000
DOI: https://doi.org/10.26483/ijarcs.v8i3.3003

Distributed Database for Bookstore Application

Dr. D. Asir Antony Gnana Singh, Dr. E. Jebamalar Leavline, Srinivasan Malini

309-312

DOI: https://doi.org/10.26483/ijarcs.v8i3.3004

Mobile Application for m-Learning

Dr. D. Asir Antony Gnana Singh, Dr. E. Jebamalar Leavline, Janani Selvam

313-316

DOI: https://doi.org/10.26483/ijarcs.v8i3.3005
DOI: https://doi.org/10.26483/ijarcs.v8i3.3006
DOI: https://doi.org/10.26483/ijarcs.v8i3.3007
DOI: https://doi.org/10.26483/ijarcs.v8i3.3008
DOI: https://doi.org/10.26483/ijarcs.v8i3.3009
DOI: https://doi.org/10.26483/ijarcs.v8i3.3010
DOI: https://doi.org/10.26483/ijarcs.v8i3.3012
DOI: https://doi.org/10.26483/ijarcs.v8i3.3013

EEG Signals Analysis for motor imagery based on Curvelet Transform

Subhani Shaik, Dr. Uppu Ravibabu, Shaik Subhani

350-356

DOI: https://doi.org/10.26483/ijarcs.v8i3.3014
DOI: https://doi.org/10.26483/ijarcs.v8i3.3015
DOI: https://doi.org/10.26483/ijarcs.v8i3.3016
DOI: https://doi.org/10.26483/ijarcs.v8i3.3017
DOI: https://doi.org/10.26483/ijarcs.v8i3.3018

Generalization for Multidimensional Playfair Cipher

Krishnaraj Bhat, Dindayal Mahto, Dilip Kumar Yadav

379-381

DOI: https://doi.org/10.26483/ijarcs.v8i3.3019

Application of Fuzzy Logic in Financial Markets for Decision Making

Prof. T. Venkat Narayana Rao, Kushal Reddy

382-386

DOI: https://doi.org/10.26483/ijarcs.v8i3.3020

Cloud Enabled Smart Parking System Based on Internet of Things

T. Venkat Narayana Rao, Shaik Khasim Saheb, Patel Bharath Kumar Goud

387-391

DOI: https://doi.org/10.26483/ijarcs.v8i3.3021

Design of Architecture for Efficient Integration of Internet of Things and Cloud Computing

T. Venkat Narayana Rao, Shaik Khasim Saheb, A. Janiki Ram Reddy

392-396

DOI: https://doi.org/10.26483/ijarcs.v8i3.3022

Preventing Drunken Driving Accidents using IoT

T. Venkat Narayana Rao, Karttik Reddy Yellu

397-400

DOI: https://doi.org/10.26483/ijarcs.v8i3.3023
DOI: https://doi.org/10.26483/ijarcs.v8i3.3024

The AES-256 Cryptosystem Resists Quantum Attacks

Sandeep Kumar Rao, Dindayal Mahto, Dr. Dilip Kumar Yadav

404-408

DOI: https://doi.org/10.26483/ijarcs.v8i3.3025

A Survey of Database Buffer Cache Management Approaches

Priti M. Tailor, Prof. Rustom D. Morena

409-413

DOI: https://doi.org/10.26483/ijarcs.v8i3.3026
DOI: https://doi.org/10.26483/ijarcs.v8i3.3027
DOI: https://doi.org/10.26483/ijarcs.v8i3.3028

Parameterized Reliable Trust Model in Grid Computing using Regression

G Mahesh Kumar, Dr. S Ramachandram, Dr. Jayadev Gyani

423-430

DOI: https://doi.org/10.26483/ijarcs.v8i3.3030

Security Challenges for Communications on IOT & Big Data

Dr. Pankaj Pathak, Dr. Nitesh Vyas, IndiaSomeshwar Joshi

431-437

DOI: https://doi.org/10.26483/ijarcs.v8i3.3031
DOI: https://doi.org/10.26483/ijarcs.v8i3.3032
DOI: https://doi.org/10.26483/ijarcs.v8i3.3033

A Novel Approach to Maintain the Real Time Instantaneous Data from Patient Using Ultra Low Power Micro Controller

S. Boopathy, S. Aravid Pandi, S. Bharathi, R. Bharathiraja, L. Kiruthika

452-455

DOI: https://doi.org/10.26483/ijarcs.v8i3.3034
DOI: https://doi.org/10.26483/ijarcs.v8i3.3035
DOI: https://doi.org/10.26483/ijarcs.v8i3.3036
DOI: https://doi.org/10.26483/ijarcs.v8i3.3037
DOI: https://doi.org/10.26483/ijarcs.v8i3.3038

An Approach for Optical Character Recognition on Grid Infrastructure Using Kohonen Neural Network

Shantanu Chaudhary, Swarnima Garg, Sathyaraj R, Abhinav Behera

485-490

DOI: https://doi.org/10.26483/ijarcs.v8i3.3039
DOI: https://doi.org/10.26483/ijarcs.v8i3.3040
DOI: https://doi.org/10.26483/ijarcs.v8i3.3041
DOI: https://doi.org/10.26483/ijarcs.v8i3.3042

Road Damage Classification using Back Propagation Algorithm

Pradityo Utomo, Tomi Tristono, Arief Budiman, Rosyid Kholilur Rohman

510-514

DOI: https://doi.org/10.26483/ijarcs.v8i3.3043
DOI: https://doi.org/10.26483/ijarcs.v8i3.3044
DOI: https://doi.org/10.26483/ijarcs.v8i3.3045
DOI: https://doi.org/10.26483/ijarcs.v8i3.3046
DOI: https://doi.org/10.26483/ijarcs.v8i3.3047
DOI: https://doi.org/10.26483/ijarcs.v8i3.3048
DOI: https://doi.org/10.26483/ijarcs.v8i3.3049
DOI: https://doi.org/10.26483/ijarcs.v8i3.3050

Reliable certificate less general verification for CPSS against malevolent auditors

Neha Chawhan, B. Mamatha, Neha George, Mrunal Shasthri

552-554

DOI: https://doi.org/10.26483/ijarcs.v8i3.3051
DOI: https://doi.org/10.26483/ijarcs.v8i3.3052
DOI: https://doi.org/10.26483/ijarcs.v8i3.3053
DOI: https://doi.org/10.26483/ijarcs.v8i3.3054

Smart Choice – Content Based Clothing Recommendation System

Shweta Sharma, Mrs. Asma Parveen. I. Siddavattam, Shilpa Sharma, Ravjot Tuteja

575-578

DOI: https://doi.org/10.26483/ijarcs.v8i3.3055

Implementation of Encryption Algorithm for Data Security in Cloud Computing

Khasim Shaik, N.Sharath kumar, Thota Venkat Narayana Rao

579-583

DOI: https://doi.org/10.26483/ijarcs.v8i3.3056

Securing Transactions in E-Commerce using Visual Cryptography and Steganography

T. Venkat Narayana Rao, Karnati Yashwanth Reddy, Ganji Dinesh Kumar

584-591

DOI: https://doi.org/10.26483/ijarcs.v8i3.3057
DOI: https://doi.org/10.26483/ijarcs.v8i3.3059
DOI: https://doi.org/10.26483/ijarcs.v8i3.3060
DOI: https://doi.org/10.26483/ijarcs.v8i3.3061
DOI: https://doi.org/10.26483/ijarcs.v8i3.3062
DOI: https://doi.org/10.26483/ijarcs.v8i3.3063

Cloud Computing and its Emerging Need: Advantages and Issues

Surabhi Kaul, Kanika Sood, Anurag Jain

618-624

DOI: https://doi.org/10.26483/ijarcs.v8i3.3064

Cloud Computing and its issues

Kanika Sood, Anurag Jain, Surabhi Kaul

625-631

DOI: https://doi.org/10.26483/ijarcs.v8i3.3065
DOI: https://doi.org/10.26483/ijarcs.v8i3.3066

Checkpoint – An Online Descriptive Answers Grading Tool

Shivam Upadhyay, Charusheela Nehete, Vasant Powar, Jitesh Wadhwani

637-640

DOI: https://doi.org/10.26483/ijarcs.v8i3.3067

MPPT for Wind Energy Conversion with Simplified Curve Fitting Approach

Mohammad Waseem Akram, Mohammad Naushad, Nicky Balani

641-643

DOI: https://doi.org/10.26483/ijarcs.v8i3.3068
DOI: https://doi.org/10.26483/ijarcs.v8i3.3070
DOI: https://doi.org/10.26483/ijarcs.v8i3.3071

A Study on Performance of Cricket Players using Factor Analysis Approach

Sricharan Shah, Partha Jyoti Hazarika, Jiten Hazarika

656-660

DOI: https://doi.org/10.26483/ijarcs.v8i3.3072
DOI: https://doi.org/10.26483/ijarcs.v8i3.3073
DOI: https://doi.org/10.26483/ijarcs.v8i3.3074
DOI: https://doi.org/10.26483/ijarcs.v8i3.3075
DOI: https://doi.org/10.26483/ijarcs.v8i3.3076

Predictive Model for Material Behavior Prediction

Hemanth. K.S, Sreenivasa . H.V

687-690

DOI: https://doi.org/10.26483/ijarcs.v8i3.3077

Sketch Based Image Retrieval with Cosine Similarity

Y. Jhansi, Dr. E. Sreenivasa Reddy

691-695

DOI: https://doi.org/10.26483/ijarcs.v8i3.3078

Survey on Data Security Issues in Cloud Computing

Sanjay Kumar, Ram Singar Verma, Kuber Mohan

696-701

DOI: https://doi.org/10.26483/ijarcs.v8i3.3079
DOI: https://doi.org/10.26483/ijarcs.v8i3.3080

Techniques to Improve Network Lifetime of Wireless Sensor Networks -A Survey

Prof. Rashmi Deshmukh, Prof. Rachana Deshmukh, Dr. Rahul S. Khokale

707-710

DOI: https://doi.org/10.26483/ijarcs.v8i3.3081
DOI: https://doi.org/10.26483/ijarcs.v8i3.3082
DOI: https://doi.org/10.26483/ijarcs.v8i3.3083
DOI: https://doi.org/10.26483/ijarcs.v8i3.3084
DOI: https://doi.org/10.26483/ijarcs.v8i3.3085

A Comparative Study and Survey on Existing DNA Compression Techniques

Alam Jahaan, DR. T.N. Ravi, Dr. S. Panneer Arokiaraj

732-735

DOI: https://doi.org/10.26483/ijarcs.v8i3.3086

Comparative Study of Stock Prediction System using Regression Techniques

Utkarsh Sinha, Nihal Vidyala, Shraey Saxena, Prof. Sathyaraj R

736-739

DOI: https://doi.org/10.26483/ijarcs.v8i3.3087
DOI: https://doi.org/10.26483/ijarcs.v8i3.3088
DOI: https://doi.org/10.26483/ijarcs.v8i3.3089
DOI: https://doi.org/10.26483/ijarcs.v8i3.3090
DOI: https://doi.org/10.26483/ijarcs.v8i3.3091
DOI: https://doi.org/10.26483/ijarcs.v8i3.3092
DOI: https://doi.org/10.26483/ijarcs.v8i3.3093

Power Enhancement Techniques of 5G

Ankita Gulia, Dr.Amita Dhankhar, Dr. Kamna Solanki

769-773

DOI: https://doi.org/10.26483/ijarcs.v8i3.3094
DOI: https://doi.org/10.26483/ijarcs.v8i3.3095
DOI: https://doi.org/10.26483/ijarcs.v8i3.3096
DOI: https://doi.org/10.26483/ijarcs.v8i3.3097
DOI: https://doi.org/10.26483/ijarcs.v8i3.3098

A Recent Study over Cyber Security and its Elements

Jitendra Jain, Dr. Parashu Ram Pal

791-793

DOI: https://doi.org/10.26483/ijarcs.v8i3.3099
DOI: https://doi.org/10.26483/ijarcs.v8i3.3101
DOI: https://doi.org/10.26483/ijarcs.v8i3.3102

Advance Resource Reservation based on Context Aware Workload

Parimal Gajre, Prof. Vivek Prasad, Dr. Madhuri Bhavsar

804-808

DOI: https://doi.org/10.26483/ijarcs.v8i3.3103

Efficient Resource Scheduling in Cloud Computing

Harshil Mehta, Vivek Kumar Prasad, Dr. Madhuri Bhavsar

809-815

DOI: https://doi.org/10.26483/ijarcs.v8i3.3104
DOI: https://doi.org/10.26483/ijarcs.v8i3.3105

Task Scheduling in Cloud Computing

Vivek Manglani, Abhilasha Jain, Prof. Vivek Prasad

821-825

DOI: https://doi.org/10.26483/ijarcs.v8i3.3106
DOI: https://doi.org/10.26483/ijarcs.v8i3.3107

Importance and Challenges of Social Media Text

Shailendra Kumar Singh, Manoj Kumar Sachan

831-834

DOI: https://doi.org/10.26483/ijarcs.v8i3.3108

Drug Side Effect Analyser Using Machine Learning

Adarsh Bhat G, Abhilash Prajwal Dsouza, Rajgopal K.T, Jayadeva Bhat K, Mahesh Mahesh

835-838

DOI: https://doi.org/10.26483/ijarcs.v8i3.3109
DOI: https://doi.org/10.26483/ijarcs.v8i3.3110
DOI: https://doi.org/10.26483/ijarcs.v8i3.3111

Web Application and Server Exploitation

Ms. Gurline Kaur, Sonia Sonia

847-851

DOI: https://doi.org/10.26483/ijarcs.v8i3.3112
DOI: https://doi.org/10.26483/ijarcs.v8i3.3113

Performance Evaluation of Routing Protocol in Internet of Things using Netsim

Gurpreet Singh, Amandeep Kaur Cheema, Nishant Kapoor

856-859

DOI: https://doi.org/10.26483/ijarcs.v8i3.3114

Fast Handover Algorithm for Mobility Management in VANETs

R. Pushpavani, K. Thamizhmaran, T. Ravichandran

860-863

DOI: https://doi.org/10.26483/ijarcs.v8i3.3115
DOI: https://doi.org/10.26483/ijarcs.v8i3.3116
DOI: https://doi.org/10.26483/ijarcs.v8i3.3117
DOI: https://doi.org/10.26483/ijarcs.v8i3.3118
DOI: https://doi.org/10.26483/ijarcs.v8i3.3119
DOI: https://doi.org/10.26483/ijarcs.v8i3.3120

Teacher’s Assistant- Automatic Question Paper Generator

Neekita Salvankar, Mrs. Jayashree Hajgude, Heenal Sikka, Pranav Sharma

889-893

DOI: https://doi.org/10.26483/ijarcs.v8i3.3121
DOI: https://doi.org/10.26483/ijarcs.v8i3.3122

Implementing Levels of Security using Multimodal Architecture

Prachi Kharge, Kinnri Sinha, Ajit Pandey, Sathyaraj R

899-905

DOI: https://doi.org/10.26483/ijarcs.v8i3.3123

Determining the Effect of Similar Queries in Cache-based Cloud Datastores

Ruchi Nanda, Prof. Swati V. Chande, Prof. Krishna S. Sharma

906-910

DOI: https://doi.org/10.26483/ijarcs.v8i3.3124
DOI: https://doi.org/10.26483/ijarcs.v8i3.3125
DOI: https://doi.org/10.26483/ijarcs.v8i3.3126

Implement PAPR Reduction in OFDM System Using SAS DCT with Companding

A. Kayalvizhi, K. Thamizhmaran, G. Ramprabhu

922-925

DOI: https://doi.org/10.26483/ijarcs.v8i3.3127
DOI: https://doi.org/10.26483/ijarcs.v8i3.3128
DOI: https://doi.org/10.26483/ijarcs.v8i3.3129
DOI: https://doi.org/10.26483/ijarcs.v8i3.3130
DOI: https://doi.org/10.26483/ijarcs.v8i3.3131
DOI: https://doi.org/10.26483/ijarcs.v8i3.3132
DOI: https://doi.org/10.26483/ijarcs.v8i3.3140

Computer Ethics from Obscure to Ubiquitous

Juneed Iqbal, Bilal Maqbool Beigh

983-990

DOI: https://doi.org/10.26483/ijarcs.v8i3.3141
DOI: https://doi.org/10.26483/ijarcs.v8i3.3142
DOI: https://doi.org/10.26483/ijarcs.v8i3.3143

Medical signal steganography using curvelet Transform

Prasana Vadivambiga.P, Murugeswari. G

1001-1006

DOI: https://doi.org/10.26483/ijarcs.v8i3.3176
DOI: https://doi.org/10.26483/ijarcs.v8i3.3145
DOI: https://doi.org/10.26483/ijarcs.v8i3.3146

A Review On Video Steganography Techniques

Anamika Saini, Kamaldeep Joshi, Sachin Allawadhi

1015-1020

DOI: https://doi.org/10.26483/ijarcs.v8i3.3147
DOI: https://doi.org/10.26483/ijarcs.v8i3.3148
DOI: https://doi.org/10.26483/ijarcs.v8i3.3149
DOI: https://doi.org/10.26483/ijarcs.v8i3.3150
DOI: https://doi.org/10.26483/ijarcs.v8i3.3151

Fault Prediction and Mitigation in Cloud Computing

Vidhi Sutaria, Vivek K Prasad, Dr. Madhuri Bhavsar

1042-1050

DOI: https://doi.org/10.26483/ijarcs.v8i3.3152
DOI: https://doi.org/10.26483/ijarcs.v8i3.3153
DOI: https://doi.org/10.26483/ijarcs.v8i3.3155

Review on Fall Detection Techniques based on Elder People

Ramandeep Kaur, Dr. Pankaj Deep Kaur

1062-1067

DOI: https://doi.org/10.26483/ijarcs.v8i3.3177
DOI: https://doi.org/10.26483/ijarcs.v8i3.3157
DOI: https://doi.org/10.26483/ijarcs.v8i3.3158
DOI: https://doi.org/10.26483/ijarcs.v8i3.3159
DOI: https://doi.org/10.26483/ijarcs.v8i3.3160

A Survey on Heuristic Approach for Task Scheduling in Cloud Computing

Neha Sharma, Dr. Sanjay Tyagi, Swati Atri

1089-1092

DOI: https://doi.org/10.26483/ijarcs.v8i3.3161
DOI: https://doi.org/10.26483/ijarcs.v8i3.3162

State of Art Survey of Travel based Recommendation System

Yashasvee Shukla, Dr. Jyoti Jyoti

1098-1102

DOI: https://doi.org/10.26483/ijarcs.v8i3.3163

Region Based Data Hiding in Medical Images

M.Mary Shanthi Rani, S. Lakshmanan

1103-1107

DOI: https://doi.org/10.26483/ijarcs.v8i3.3165
DOI: https://doi.org/10.26483/ijarcs.v8i3.3166
DOI: https://doi.org/10.26483/ijarcs.v8i3.3167

A Survey: Opinion Mining Its Tools and Techniques

Tamanna Sachdeva, Divya Kauhik, Shruti Sharma

1120-1124

DOI: https://doi.org/10.26483/ijarcs.v8i3.3168

Security Mechanism for CSMA/CD Networks: A Survey

Shubham Singh, Nensi Kansagara

1125-1127

DOI: https://doi.org/10.26483/ijarcs.v8i3.3169
DOI: https://doi.org/10.26483/ijarcs.v8i3.3170
DOI: https://doi.org/10.26483/ijarcs.v8i3.3171

HIPI Based Biometric probe image retrieval using Big Image data

Mohd Ahmed Abdul Mannan, Gulabchand K. Gupta

1136-1139

DOI: https://doi.org/10.26483/ijarcs.v8i3.3172

A Secured Image Transmission Using Videos

R. Saranya Devi, Dr. M. Pushpa Rani

1140-1143

DOI: https://doi.org/10.26483/ijarcs.v8i3.3173

Multipurpose Street Smart Garbage bin based on Iot

Dharna Kaushik, Mr. Sumit Yadav

1144-1149

DOI: https://doi.org/10.26483/ijarcs.v8i3.3174
DOI: https://doi.org/10.26483/ijarcs.v8i3.3175

Congestion Management in Deregulated Electricity Power Market using STATCOM and TCSC

Akanksha Singh, Santosh Kumar Singh, Sudhir Kumar Srivastava

1155-1159

DOI: https://doi.org/10.26483/ijarcs.v8i3.3182

Scalable Geo Web Techniques using Spatial Data Mining for Air Pollution

Dharmendra Singh, Md. Safdar Tanweer, Md Tabrez Nafis

1160-1166

DOI: https://doi.org/10.26483/ijarcs.v8i3.3183
DOI: https://doi.org/10.26483/ijarcs.v8i3.3184
DOI: https://doi.org/10.26483/ijarcs.v8i3.3185

Study of Various Heuristic Approaches in Cloud Computing

Pooja Mangla, Dr. Sandip Kr. Goyal

1175-1179

DOI: https://doi.org/10.26483/ijarcs.v8i3.3186
DOI: https://doi.org/10.26483/ijarcs.v8i3.3187

Path Navigation using Bluetooth Low Energy-Beacon

Ojasvini Dhingra, Rashmi Popli

1189-1192

DOI: https://doi.org/10.26483/ijarcs.v8i3.3188

SMALL DATA CHALLENGE: HOW TO USE OTHER PEOPLE’S DATA WHEN YOU DON’T HAVE YOUR OWN -SOFTWARE REUSABILITY

Kamisetty Yeshwanth, Lakkysetty Nikhil, Praveen Raja, N. Jaya Krishna Naidu

1193-1198

DOI: https://doi.org/10.26483/ijarcs.v8i3.3189

Web Crawler : Review of Different Types of Web Crawler, Its Issues, Applications and Research Opportunities

Keyur Desai, Virala Devulapalli, Prof. Smita Agrawal, Prof. Preeti Kathiria, Dr. Atul Patel

1199-1202

DOI: https://doi.org/10.26483/ijarcs.v8i3.3190
DOI: https://doi.org/10.26483/ijarcs.v8i3.3191
DOI: https://doi.org/10.26483/ijarcs.v8i3.3192

The Rising Flood of Big Data and Its Analysis

Kiran Padwar, Dr. Mahesh Kumar Pawar, Dr. Ratish Agrawal

1211-1217

DOI: https://doi.org/10.26483/ijarcs.v8i3.3202

Disease Symptoms Analysis Using Data Mining Techniques to Predict Diabetes Risk

Jawad Kamal, Dr Safdar Tanveer, Md. Tabrez Nafis

1218-1223

DOI: https://doi.org/10.26483/ijarcs.v8i3.3203

Harmonic Mitigation Using DC Self Supported Shunt Active Power Filter

Santosh Kumar Singh, Akanksha Singh, Sudhir Kumar Srivastava

1224-1227

DOI: https://doi.org/10.26483/ijarcs.v8i3.3539
DOI: https://doi.org/10.26483/ijarcs.v8i3.3540

Analysis of Iridology using Zhang- Suen’s Algorithm

J. Sahaya Sheeba Mangalam, Dr. S. T. Deepa

1233-1237

DOI: https://doi.org/10.26483/ijarcs.v8i3.4084

ADAPTIVE MOBILE LEARNING FRAMEWORK BASED ON LITERATURE

Shivani Shrimali, Prof. (Dr.) Shiv Singh Sarangdevot, Tarun Shrimali

1238-1241

DOI: https://doi.org/10.26483/ijarcs.v8i3.6429