DOI: https://doi.org/10.26483/ijarcs.v8i5

Published: 2017-06-20

Initiative of MOOCs for Technical and Vocational Education

Rahul Chandra Kushwaha, Achintya Singhal

1-4

Pre-processing Steps on Bilingual Corpus for SMT

Abhijit Paul, Prof. Bipul Syam Purkayastha

101-105

Efficiency Evaluation of DSR and AODV On-demand protocols in Wireless MANETs

Dinesh Mahajan, Dr. Ajay Kumar, Dr. Rajiv Mahajan

116-119

A METRIC BASED APPROACH FOR MANAGING ARCHITECTURE-RELATED IMPEDIMENTS

HARSHAVARDHAN METLA, DHARMENDHRA MAKINENI, MANIKANTA ELLENKI, PRANAY RATAKONDA

120-124

DoS Attacks in Internet of Things

Vahid Shaker, Houman Zarrabi

125-128

A Study on the Current Trends in Software Testing Tools

Siddharth Bhargava, Sahil Guleria, Ajita Ajita, Gaurang Gaurang

129-131

Recovery of TSV Based 3D IC

Sudeep Ghosh, Mandira Banik, Tridib Chakraborty

149-153

upcoming 5-G Wireless technology and its security concept

Mohammad Sadique Ansari, Jawed Ahmed

154-158

Automated Detection of Leukemia

RupinderKaur Sandhu, Dr. Raman Maini

210-212

Network Management Using Software Defined Networking

Er.Jaspreet Singh, Er. Yadwinder Kaur

261-265

Monitoring Suspicious Discussions on Social Media Case Study

TRIDIB CHAKRABORTY, Jeevan Krishna Ghosh, Puja Datta, Aliva Ghosh

315-317

Survey on Security Mechanisms In NoSQL Databases

Dindoliwala Vaishali J, Dr. Morena Rustom D.

333-338

A Survey on Context-Based Seek For Keyword

Dipalee P.More, Prof. Ujwala M. Patil

339-342

REVIEW ON VARIOUS ROUTING PROTOCOLS IN VANETS

Er.Jayant Vats, Dr. Gaurav Tejpal, Dr. Sonal Sharma

348-353

Information Security using Adaptive Multidimensional Playfair Cipher

Krishnaraj Bhat, Dindayal Mahto, Dilip Kumar Yadav

372-380

IMPLEMENTATION OF EVENT EXTRACTION FROM TWITTER USING LDA

Monika Gupta, Parul Gupta, Shruti Sharma

381-385

Implementation of a TTS System for Devanagari Konkani Language using Festival

Nilesh B. Fal Dessai, Gaurav A. Naik, Jyoti D. Pawar

386-391

Preventive Measures and Incident Response for Locky Ransomware

Kulkarni Pooja Prakash, Tabrez Nafis, Dr. Siddhartha Sankar Biswas

392-395

A Review on QR Codes: Colored and Image Embedded

Seema Ahlawat, Dr. Chhavi Rana, Rashmi Sindhu

410-413

CLOUD COMPUTING IN HIGHER EDUCATION IN INDIA

Ruzaina Khan, Prof. M. Afshar Alam

414-422

Survey of Web Crawler Algorithms

Abhinav Garg, Kratika Gupta, Abhijeet Singh

426-428

Automotive refuge concept using embedded and computing approaches

Suraj U Rasal, Kratika Gupta, Varsha Rasal, Shraddha Shelar

458-464

Survey on Natural Language Database Interfaces

Dr.Shailender Kumar, Abhilasha Gautam, Satvic Mittal

469-473

Mobile Application for General Stores

Dr. D Asir Antony Gnana Singh, Dr. E. Jebamalar Leavline, R. Pravin Kumar

474-476

Vantages of Adaptive Multidimensional Playfair Cipher over AES-256 and RSA-2048

Krishnaraj Bhat, Dindayal Mahto, Dilip Kumar Yadav

498-500

Energy Efficient Vertical Handoff Algorithms – A Review

Priyanka Rani, Dr.Himanshu Monga, Silki Baghla, Dr.Himanshu Monga, Silki Baghla

512-516

A Trend Analysis of Information Retrieval Models

Dr.M Balamurugan, E. Iyswarya

531-534

Sentimental Classification of Social Media using Data Mining

Farhan Laeeq, Md. Tabrez Nafis and Mirza Rahil Beg

546-549

Segregation of waste using IOT

Harshita Joshi, Amit Mittal

565-567

Dynamic software metric estimation (DSME): Tool using ArgoUML

P.L. POWAR, Samar Upadhyay, M.P. Singh, Bharat Solanki

591-602

Low Cost Fire Alarm System with Sprinkler

Vikram Rajput, Aparna Bimal, Abishek K, Utkarsh Sinha, Aditya Babu K.C, S Raj kumar

607-609

Efficient Technique for Image morphing in natural images

Anupama Gautam, Mr. Ram Singar Verma

610-615

Efficient Image morphing algorithm using Laplacian Pyramids

Anupama Gautam, Mr. Ram Singar Verma

616-620

Students Academic Performance Using Partitioning Clustering Algorithms

Humamuddin , Md. Tabrez Nafis, Syed Taha Owais

640-644

Cyber Security Risks and Challenges in Supply Chain

Om Pal, Vandana Srivastava and Bashir Alam

662-666

Performance Analysis of Naïve Bayes Algorithm on Crime Data Using Rapid Miner

Waseem Ahmed, Dr. Siddhartha Sankar Biswas, Tabrez Nafis

683-687

AN IMAGE RETRIEVAL FRAMEWORK: A REVIEW

Mohd Aquib Ansari, Manish Dixit

692-699

Fuzzy Neural Networks

C.R kavitha

700-704

Raga Identification Using MFCC and Chroma features

Ms Kavita.M Deshmukh, Prof. Dr. Pramod. J. Deore

725-729

Basic Analysis of Docker Networking

Samyukta S Hegde, Jayarekha P

740-743

Text Recognition Using Image Processing

Tridib Chakraborty, Chowdhury Md Mizan, Suparna Karmakar

765-768

On Intuitionistic Fuzzy Rough Sets

Sheeja T K, Sunny Kuriakose A

787-792

PRESERVING PRIVACY DURING BIG DATA PUBLISHING USING K-ANONYMITY MODEL – A SURVEY

DIVYA SADHWANI, DR. SANJAY SILAKARI, MR. UDAY CHOURASIA

801-810

Dictionary based Sentiment Analysis of Hinglish Text

harpreet kaur, Veenu Mangat, Nidhi krail

816-822

Review On Parkinson Disease Detection Techniques

Baljinder Kaur, Dr. Himanshu Aggarwal

850-852

DATA MINING ON CUSTOMER SEGMENTATION: A REVIEW

Er.Rupampreet kaur, Er.Kiranbir kaur

857-861

Security in Cloud Based Applications

Nikhil Kumar Singh, Jitendra Kurmi

885-889

Security of Private Cloud with Log Analysis and Encryped Channel

Kuntal Shah, Prof. Chandresh Parekh, Asst.Prof. Bhadresh Gohil

922-927

Improved VoIP QoS over Wireless Networks

Neha Tiwari, Dr. O.P. Rishi

959-963

Toxic Comment Tools: A Case Study

Pooja Parekh, Hetal Patel

964-967

Performance Comparison of LEACH & PASCCC Clustering Protocols

GOPAL SHARMA, LOVE KUMAR, Varsha Sahni

976-980

A Combined Genetic Algorithm for Symmetric Travelling Salesman Problem

Avik Mitra, Baiduryya Sarkar, Somnath Bhattacharyya

995-998

Scrutinizing Near Duplicate Document Detection Techniques

Farheen Naaz, Dr. Farheen Siddique

1003-1005

Role of Data Mining: A Survey and its Implications

Amit Singh, Santosh Kumar Agray

1039-1042

An Effective Nearest Keyword Search In Multifaceted Datasets

L Lakshmi, P Bhaskara Reddy, C.Shoba Bindu, S.Bhavya Sri

1059-1063

A REVIEW OF EMPIRICAL MODELING IN SOFTWARE ENGINEERING

ManojKumar Chaudhary, Alka Alka

1064-1067

Cloud Computing Security issue with solution

Prabhjot Rihal, Dr.Parul Agarwal

1089-1091

Exploring the techniques of Classification Rule Mining

Rabiya Shamsheer, Dr. Parul Agarwal

1092-1094

Review of Programming Languages and Tools for Big Data Analytics

Tamanna Siddiqui, Mohammad AlKadri, Najeeb Ahmad Khan

1112-1118

An Overview of Some Data Mining Clustering Techniques

Anup D. Sonawane, Vijay Birchha, Preetesh Purohit

1119-1122

Implementation of Enhanced E-Learning in Cloud Environment using MVC Architecture

Sindhu Bharathi A, Senthilkumar T, Valarmathi A, Nalini S

1123-1126

Analysis of Robot Detection approaches for ethical and unethical robots on Web server log

Mitali Srivastava, Atul kumar Srivastava, Rakhi Garg, P. K. Mishra

1132-1134

Secure message encryption using Nth prime

Kumar shanu, Ehtiram Khan

1139-1142

Hand Gesture based Home Control Device using IoT

Mitangi Patel, Sharnil Pandya, Satvik Patel

1143-1146

Malware Detection And Analysis

Mohd Hamzah Khan, Ihtiram Raza Khan

1147-1149

Transient Thermoelastic Problem of Semi Infinite Rectangular Beam

N W Khobragade, Shalu Barai, M. S Warbhe

1160-1165

Thermoelastic Problems of a Hollow Cylinder and its Thermal Stresses

N W Khobragade, Sachin Chauthale, Sachin Chauthale

1173-1179

Spam Mail Detection Using Hybrid Secure Hash Based Naive Classifier

Sana Ajaz, Md. Tabrez Nafis, Vishal Sharma

1195-1199

Solution of Game Theory Problems by New Approach

N W Khobragade, Kalpana Lokhande, P. G. Khot

1214-1221

Smart City with Internet of Things

RevathiLavanya Baggam

1242-1245

INVESTIGATING FACE RECOGNITION Techniques for PCA AND BPNN

Rupinder Kaur, Dr. Pardeep Mittal, Ms. Shalini Aggarwal

1246-1249

Study of Text Content Mining for E-Commerce Web Sites

AK Shingarwade, Dr. P.N. Mulkalwar

1269-1274

Approach To Data Reduction In Data Warehouse

Md.Ishtiyaque Alam, Jawed Ahmed

1320-1323

Survey On Sentiment Analysis in Hindi Language

Komal Garg, Preetpal Kaur Buttar

1360-1363

A Review : An Optimized Technique For Image Segmentation

Arpit Kushwah, Manish Dixit, Kunal Gupta

1375-1380

Identification of Copper Content in Soil: A Review

S.T. Khajekar, R.R. Deshmukh

1381-1383

COMPREHENSIVE EVALUATION AND INTERPRETATION OF PCA ON MULTIPLE DATASETS

Rabia Nazir Mir, Abid Sarwar, Amit Sharma, Vinod Sharma

1384-1388

Quadratic Assignment Problem

Ankita Kalchuri, Prof. Raju Baraskar, Prof. Shikha Agarwal

1389-1394

Characterization of LF and LMA signal of Wire Rope Tester

Dalvir Kaur, Ritika Arora, Sarishti Chhabra, Sukesha Sharma

1395-1400

Node Scaling of Telecom services On Emerging Cloud

Huma Mehtab, Md Tabrez Nafis

1401-1405

PCA Based English Handwritten Digit Recognition

Yogish Naik G R, Amani Ali Ahmed Ali

1426-1429

Survey on various image encryption schemed Through Chaotic Maps

MissPooja Kathil, Mr. Sachin Goyal, Mr. Ratish Agrawal

1437-1441

A Review on Swarm Intelligence Techniques

Pooja Thakur, Chaavi Rana

1442-1446

Interval Type-2 Fuzzy Integral Based Iris Recognition

Thiyam Churjit Meetei, Shahin Ara Begum

1475-1481

Data at rest and it’s security solutions-A survey

Farheen siddiqui, Ghazala Matloob

1491-1493

The Design of Secure File Transfer with Speech Recognition

Anu Saini, Vinita Malik, Sukhdip sangwan

1519-1521

Artificial Intelligence based Ensemble Model for Diagnosis of Diabetes

Harsha Sethi, Anudeep Goraya, Vinod Sharma

1540-1548

An Application of Image Processing – License Plate Recognition

Manjit Sandhu, Sukhdeep Kaur, Jaipreet Kaur

1549-1553

A Research on data mining using machine learning

BABITA KUMARI, RAINU NANDAL, JYOTI KATARIA

1560-1566

A Mobile based Solution for School Management and Operation

Kaxa Chetanbhai Desai, Rahul Makwana, Jaiprakash Verma

1574-1577

Techniques used for determination of Biological Age

Ms.Nikita Sharma, Ms. Sakshi Sethi

1593-1596

IoT Based Shopping Store for Blind People

Anjana Jagde, Dr.Shubhangi D.C

1600-1605

FIXED POINT RESULTS IN RANDOM UNIFORM SPACE

Arjun kumar Mehra, Manoj Kumar Shukla

1606-1609

Design and Analysis of Efficient Collaborative Filtering Based Optimization Approach

Krishan Kant Yadav, Dr. Sanjiv Sharma, Dr. Manisha Singh

1610-1615

DIGITALIZATION OF STUDENT'S PROFORMA

meenakshi k, Dr. T. Senthilkumar T, Dr. A. Valarmathi A, Mrs. S. Nalini S

1656-1660

Conspectus Of Nebulizers

Guna Sahiti Kondari, Shivani Prasad, Sakshi Sethi

1697-1699

Classification in the Retrieval Phase of Case-based Reasoning

Nabanita Choudhury, Shahin Ara Begum

1728-1731

Comparative Analysis of K-Means using MapReduce

Humam Siddiqui, Safdar Tanweer

1791-1794

Improving the Performance of Single Core Processor using FPGA’s

SATYANARAYANA M S, ARUNA T M, DIVYARAJ G N

1806-1808

Analysis of Finger Vein Based in Recognition

Umesh Parjapati, Harkesh Sehrawat, Vikas Siwach

1818-1823

Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

Rajat Malik, Harkesh Sehrawat, Dr Yudhvir Singh

1835-1838

AN OVERVIEW OF B+ TREE PERFORMANCE

Amulya Singh, Bhavya Alankar

1856-1857

A Review on CLOUD Security and its Issues using various Symmetric Key Encryption Algorithm

MsDeepika Jalhotra, Dr. Pardeep Kumar, Ms. Shalini Aggarwal

1858-1861

Performance Analysis on Energy Efficient Protocols in Wireless Sensor Networks

Ms.Divya Garg, Dr. Pardeep Kumar, Ms. Shalini Aggarwal

1862-1869

Review of Image Fusion and its techniques

Harmanpreet Kaur, Navleen Kaur

1870-1876

DRIVERLESS METRO USING REGENERATIVE BRAKING SYSTEM KHUSHBOO RAHIM, MOHD. TANVEER

JAGANDEEP KAUR, KHUSHBOO RAHIM, MOHD. TANVEER and SANDEEP SONI

1877-1880

OntoExtractor : A Tool for Ontology Extraction From ER/EER diagrams

Kurman Sangeeta, Palakollu Srinivasa Rao

1885-1890

ANALYSIS BASED IDS FOR MOBILE AD-HOC NETWORK

PravinN Khobragade, Prof. Vimla Jethani

1922-1932

Sentiment Analysis of Movie Reviews

PravinN Khobragade, Prof. Vimla Jethani

1941-1949

Probabilistic Threshold Query on uncertain data using SVM

Ms.Kavita Shevale, Prof.Gajanan Bhole

1967-1969

Data Integrity Check in Cloud Computing using Hash Function

Shephali Singh, Puneet Sharma, Dr. Deepak Arora

1974-1978

FIREWALLS: A STUDY AND ITS CLASSIFICATION

Richa Sharma, Chandresh Parekh

1979-1983

Improved AES for Data Security in E-Health

Aashmeen Jammu, Dr. Harjinder Singh

2016-2020

Filter – PSO based approach for Feature Selection

Amit Saxena, Madan Madhaw Shrivas

2063-2073

Study of Vulnerabilities of ARP Spoofing and its detection using SNORT

RajneetKaur Bijral, Alka Gupta, Lalit Sen Sharma

2074-2077

Analysis of Image Stitching for Noisy Images using SIFT

Sarabjeet Kaur, Er. Sumandeep Kaur

2078-2082

A Comprehensive Survey of VANET Architectures and Design

Navpreet Panjrath, Ms Monika poriye

2099-2103

Recognizing Named Entities in Text based User Reviews

Richa Chaturvedi, Dr. Deepak Arora, Bramah Hazela, Pooja Khanna

2104-2107

An Hybrid Approach in Classification of Telugu Sentences

G. Pratibha, Dr.Nagaratna P Hegde

2108-2110

Investigation of Cloud Computing Security Issue

Prachi Garg, Dr. Sandeep Goel, Saurabh Garg

2117-2120

APP BASED DEVICE CONTROLLING SYSTEM

Tanvi.G Pareek, Raksha Padaki, Anuradha Iyer, Priya G

2121-2125

Database Connection Technology

Sonia Kumari, Manvendra Yadav, Kumari Seema Rani

2138-2143

SVM Based Classification of Sounds from Musical Instruments using MFCC Features

Sayantani Nandi, Madhura Banerjee, Parangama Sinha, Jayati Ghosh Dastidar

2144-2147

Customer Churn Prediction:A Survey

MsChinnuPJ ohny, Mr. Paul P. Mathai

2178-2181

Fog Based Cloud Computing: AReview

Rupinder Kaur, Er. Amanpreet Kaur

2207-2212

Penetration Testing in Wireless Networks

Harshdeep Singh, Dr. Jaswinder Singh

2213-2216

IMAGE ENHANCEMENT USING IMAGE FUSION TECHNIQUE

Mohini Yadav, Prof. Shamsher Malik

2222-2226

Outline and implementation of a biomedical sleep inducer

Aamir Manzoor Lone, Sakshi Sethi

2236-2240

Management of various risks over years in SDLC

Vinita Malik, Anu Saini, Sukhdip Sangwan, Mamta Ghalan

2277-2284

New Hybridization Technique for Enhancing Job Scheduling

Mini.Singh Ahuja, Mehmapreet Kaur

2289-2292

Review of Group Management Technique for Vehicular Ad-hoc Network (VANET)

Aditya Kumar Soni, Raju Baraskar, Rajeev Pandey

2293-2296

AgRo-Bot: An Autonomous Robot

SHUBHAM KHANDELWAL, NEHA KAUSHIK andSAGAR SHARMA kaushik and sharma, MANOJ KR. PANDEY, TEJENDER SINGH RAWAT

2318-2320

Confidentiality Estimation Model: Fault Perspective

Anshul Mishra, Dr. Devendra Agarwal, Dr. M. H. Khan

2328-2332

Systematic Review of Smart Grid Analytics

Ashu Bhardwaj, Williamjeet Singh

2333-2338

Location Based Services Data Compression with Privacy Preserving in WSNs

KVijaya Bhaskar, Dr. R. Seshadri, Dr. A. Rama mohan Reddy

2353-2356

Research paper on diabetic data analysis

JYOTI KATARIA, BABITA KUMARI

2362-2368

GSM Based Patient Monitoring System

Pragati Sunil Lokhande

2369-2374

ANDROID INTERNAL ANALYSIS OF APK BY DROID_SAFE & APK TOOL

Heena Rawal, Mr. Chandresh Parekh

2397-2402

IoT Security and Hardware Implementation using DTMF 8870

Hemangi Khimani, Mr.Chandresh Parekh

2403-2406

A Analysis of LSB Technique in Video Steganography using PSNR and MSE

Anamika Saini, Kamaldeep Joshi, Kirti Sharma, Rainu Nandal

2407-2411

Power Evulsion through Speed Breakers using Pitman’s Rod Mechanism

SAHIL RAJPUT, ESHAN MAHAJAN, AMAN SHARMA, DEEPANSHU SHARMA, SONAL DAHIYA, RAJBIR

2446-2448

Data Mining Framework for Web Search Personalization

Mrs Geetha S, Prof.Rachana Dhannawat

2449-2452

AN ANALYTIC AND COMPARATIVE STUDY OF MAPREDUCE- A SYSTEMATIC REVIEW

Kamalpreet Kaur, Er. Gurjit Singh Bhathal, Dr. Gaurav Gupta

2453-2459

A Review : Comparative Study of Edge Detection Techniques

Arpit Kushwah, Kunal Gupta, Abhishek Agrawal, Gaurav Jain, Garima Agrawal

2528-2531

A Comparative Analysis of Unimodal and Multimodal Biometric Systems

Manisha Sharma, Prof. Raju Baraskar, Dr. Shikha Agrawal

2532-2539

Classification Technique for Sentiment Analysis of Twitter Data

Kirti Huda, Md Tabrez Nafis, Neshat Karim Shaukat

2551-2555

Model Order Reduction and Stability Analysis of Interval System

Ateet Kumar Srivastava, Awadhesh Kumar

2567-2572

Study of Image Morphing

Anupama Gautam, Ajay sahay

2587-2589

Defending Against Phishing: Case Studies

Shweta Sankhwar, Dhirendra Pandey

2605-2607

Analyzing Impact of Wavelet Thresholding for Image Compression

Dr.Rakesh Kumar Bansal, Dr Savina Bansal, Amandeep Kaur

2608-2613

WEB ENABLED DIGITALIZATION ADMISSION PROCESS FOR ACADEMIC INSTITUTIONS

T Mohan, Dr.T.Senthil Kumar, Dr.A. Valarmathi, Mrs. S. Nalini

2632-2636

Input based Attacks on web applications

Daljit Kaur, Parminder Kaur

2658-2664

A Survey of Error Correction for Next Generation Sequencing

Ramgopal Ahirwal, Prof. Anjana Deen, Dr. Piyush Kumar Shukla

2680-2682

REVIEW ON VARIOUS HAZE REMOVAL TECHNIQUES

Er.Sukhdeep Kaur, Er.Navleen Kaur

2683-2687

Improved Key Management in MANETS using Neural Networks

Naresh Kumari, Yudhvir Singh, Barjesh Kochar

2688-2690

REVIEW ON DNA COMPUTING BASED AUTHENTICATION TECHNIQUES

Er.Simranpreet Kaur, Er.VarinderKaur Attri

2691-2694

Review of Cyber Threats in Social Networking Websites

Amrinder singh, Amardeep singh

2695-2699

Task Scheduling tn Cloud Computing using Various Techniques

Jaspinder Kaur, Brahmaleen Kaur Sidhu

2716-2719

A Review on Different types of Spam Filtering Techniques

Pooja Revar, Arpita Shah, Jitali Patel, Pimal Khanpara

2720-2723

Review of web usage of data mining in web mining

Arjun sidana, Dr. Himanshu aggarwal

2742-2746

MODIFIED SVD-PCA TECHNIQUE FOR TRAFFIC INCIDENT DETECTION

Shagufta Afreen, Suraiya Parween, Suraiya Parween

2772-2776

Improved Data Security Using Steganography

TwinkalJ Patel, Chandresh D. Parekh

2782-2785

Grid Solar Hybrid Speed Controller For Electric Vehicle

SubhashChandra Saini, Deepak Sharma

2792-2798

The Notorious Nine: Top Cloud Computing Security Challenges in 2017

AbdulMajid Farooqi, Tabrez Nafis, Kafiyah Usvub

2804-2808