DOI: https://doi.org/10.26483/ijarcs.v8i8

Published: 2017-10-20

A WAVELET APPROACH FOR MEDICAL IMAGE DENOISING

Gagandeep Kaur, Romika Choudhary, Ashish Vats

46-50

EXPLOITING NOISE AND TEXTURAL FEATURES FOR PASSIVE IMAGE FORENSICS

Surbhi Gupta, Neeraj Mohan, Parvinder Singh Sandhu

51-53

DYNAMIC QUERY FORMS FOR HANDLING RANK BASED DATABASE QUERIES

Dr. B. Rama, K.Sai Prasad, Vijaykumar D Pawar

74-77

THE ROAD TO DOCKER: A SURVEY

Gaurav Bhatia, Arjun Choudhary, Vipin Gupta

83-87

DRN HYBRID MODEL FOR PREDICTING AUTISM USING RAPID MINER TOOL

Ramya Rajagopal, B.S.E. Zoraida B.S.E. Zoraida

111-115

DEVELOPING SURVEILLANCE CHALLENGES IN THE INTERNET OF THINGS (IOT)

shankar lingam macharla, Raghavendra GS, Dr.A. M. Sudhakara

173-176

DEVICE ENABLED ARCHITECTURE FOR CONTEXT AWARE APPLICATIONS

G K Mohan Devarakonda, Sundara Krishna Y K

214-216

COMPARISON OF SANSKRIT MACHINE TRANSLATION SYSTEMS

Neha Sadana, Dr. Dhavleesh Rattan

223-225

A SURVEY ON CLASSIFICATION TECHNIQUES USED FOR RAINFALL FORECASTING

VenkataNagendra Kolluru, Dr. Maligela Ussenaiah

226-229

INVENTION OF GAMMA PROTOCOL FOR VANET USING MODULAR ARITHMETIC TECHNIQUES

Venkatamangarao Nampally, Dr. S. Ananthi, Dr. K. Padmanabhan, Dr. M. Raghavender Sharma, J Rama, Dr. K. R. balaji, Arun ananthanarayanan

233-238

LOW –ENERGY ADAPTIVE CLUSTERING HIERARCHY USING VIRTUAL GIRD METHOD

Meenakshi Yadav, Anoop Bhola, Chandra Kumar Jha

246-249

SENTIMENT ANALYSIS: AN APPROACH TO OPINION MINING FROM TWITTER DATA USING R

Sumita Mishra, Pooja Khanna, Sachin Kumar, Anant Sinha

252-256

ADVANCE LEARNING SYSTEM WITH THE USE OF INFORMATION TECHNOLOGY

Dr.Jigneshkumar.A Chauhan, Prof.Jigarkumar D.Patel, Dr.Satyen M.Parikh

257-259

NATURAL LANGUAGE PROCESSING ITS TYPES

shipra goyal goyal, Dhavleesh Rattan

260-263

PRIVACY ENHANCEMENT IN CLOUD ENVIRONMENT THROUGH TRUSTED THIRD PARTY APPROACH

Nibretu Yirdew, Sheik Khadar Ahmad Mnoj, Prof.D. Lalitha Bhaskari

273-277

A REVIEW ON DIFFERENT THREATS ON QUANTUM KEY DISTRIBUTION PROTOCOL

Chinmoy Ghosh, Amit Parag, Shrayasi Datta

307-311

IMPACT STUDY OF TEACHING MATHEMATICS USING ICT ENABLED LEARNING

Rahul Chandra Kushwaha, Achintya Singhal

333-336

A SECURE AND ROBUST CONGESTION CONTROL MODEL WITH FRAGMENTATION FOR CLUSTERED DISTRIBUTED DATABASE SYSTEM

Surya Pratap Singh, Arvind Kumar Maurya, Manish Mishra, Upendra Nath Tripathi

337-342

INTRUSION DETECTION SYSTEMS: A REVIEW

D. Ashok Kumar, SR Venugopalan

356-370

PERFORMANCE ANALYSIS OF ISM BAND ANTENNAS: A SURVEY

neha minhas, Ashok Kumar, Sarbjeet Singh

371-375

A SURVEY REPORT ON TECHNIQUES FOR DATA CONFIDENTIALITY IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION

Dhruva Gaidhani, Joshua Koyeerath, Neel Kudu, Prof. Mahendra Mehra

389-394

A NEW STAD MODEL TO PREDICT THE DIABETES MELLITUS

N.Aswin Vignesh, Dr.D.I.George Amalarethinam

395-398

METHOD FOR INCREASING BRAIN INTELLIGENCE (MIBI)

Rimmy Chuchra, Raj Seth2and Inderpal Singh

399-404

Fuzzy based Multi-Metric Path Ranking Scheme for Multipath Routing

Shalini Aggarwal, Pardeep Kumar, Shuchita Upadhyaya

407-411

CHALLENGES TO TASK AND WORKFLOW SCHEDULING IN CLOUD ENVIRONMENT

Amanpreet kaur, Dr. Bikrampal Kaur, Dr. Dheerendra Singh

412-415

COLLABORATIVE CLUSTERING PROTOCOL IN WIRELESS SENSOR NETWORKS

Tewodrose Tilahun Dejen, Professor Kuda Nageswara Rao

421-428

BLOCKCHAIN: AN ANALYSIS ON NEXT-GENERATION INTERNET

ATUL KUMAR VERMA, Mr. Arpit Garg

429-432

A NOVEL AUTOMATIC C TO NVIDIACUDA CODE OPTIMIZATION FRAMEWORK

Srinivas Ch., Dr. Niraj Upadhyay, Dr A. Govardhan

438-447

MACHINE TRANSLITERATION FOR INDIAN LANGUAGES: A REVIEW

Anupama Sharma, Dr. Dhavleesh Rattan

463-464

A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS

Gaurav Agrawal, Shivank Kumar Soni, Chetan Agrawal

499-504

SECURE AND INTELLIGENT POWER MANAGEMENT SCHEMA FOR HETEROGENOUS DISTRIBUTED WIRELESS MULTIMEDIA SENSOR NETWORKS

Surya Pratap Singh, Avinash Singh, Arvind Kumar Maurya, Upendra Nath Tripathi

520-524

FAULT-DETECTION ON MULTI-ROBOT PATH PLANNING

Ashutosh Kumar Singh, Naveen Kumar

539-543

DATA PRIVACY IN ENCRYPTED RELATIONAL DATA USING K-NN CLASIFICATION

M. Sheshikala, R. Vijaya Praash, M. Archana

544-548

A REVIEW ON PLC MODELING TECHNIQUES FOR RESIDENTIAL NETWORKS

Shashidhar Kasthala, G.K.D Prasanna Venkatesan

558-561

OVERLAPPED PHYSICAL CHANNELS LOAD MEASUREMENT IN 802.11 NETWORKS

Danielle Saliba, Rodrigue Imad, Sebastien Houcke

571-579

REVERSIBLE DATA-HIDING SCHEMES FOR ENCRYPTED IMAGE: A REVIEW

Anoop Chaturvedi, Piyush Kumar Shukla

658-660

A SURVEY ON NEW APPROACHES OF INTERNET OF THINGS DATA MINING

Sallauddin Mohmmad, G. Sunil, Ranganath Kanakam

666-673

IMAGE COMPRESSION USING DECISION TREE TECHNIQUE

AMANPREET KAUR, Balkrishan Jindal

682-688

CO-OPERATIVE SOCIETY APP - AN ANDROID E-BROCHURE

Shweta Borikar, Kanchan Yadav, Shradha Bhimte, Piyush Anjankar

689-691

BIG SENTIMENT ANALYSIS USING K-MEANS CLUSTERING: A SURVEY

Shalini Yadav, Sunita Yadwad, Prakshi Yadav

695-700