DOI: https://doi.org/10.26483/ijarcs.v9i2

Published: 2018-04-20

A NOVEL ALGORITHM FOR INFORMATION HIDING

Mahimn Bhupendrabhai Pandya, Ashish N Jani

7-10

SECURE KEY ISSUING SCHEME IN BIT-TORRENT NETWORK

Sudipta Majumder, Ratnadeep Nath, Aminullah Laskar, Bishal Saha

19-20

SOLAR POWER ANALYZER: A PHYSICAL AND CYBER SYSTEM FOR SOLAR ENERGY COMPUTATION

MANOJ CHANDAK, Anshika Choudhary, Nishant Khanorkar, Tanmayee Joglekar, Purvesh Baghele, Rushali Sindurkar

28-34

HANDS ON MEDICATION USING DATA VISUALISATION TOOL

Dr B V Subba Rao, K. Varsha, B. Teepthika, K. Vinay, B.Kiran Sai Varma

80-84

SENTIMENT ANALYSIS ON GST TWEETS

Ekta ., Dr. Kavita Pabreja

89-92

NLP TOOLS USED IN CIVIL AVIATION: A SURVEY

saptarshi paul, Bipul Syam purkaystha, Purnendu Das

109-114

AUTOMATED ASSISTANCE FOR FOUNDATION ENGINEERS(AAFE)

Dharma Reddy Tetali, Pushpa Rani K

115-118

LITERATURE REVIEW ON SECURITY ASPECTS OF IOT

Rohit Malik, Dr. Kamna Solanki, Dr. Sandeep Dalal

123-126

LITERATURE REVIEW ON SECURITY OF IOT

Sombir ., Kamna Solanki

131-134

A NOVELMETAHEURISTIC ALGORITHM BASED ON WAVE FUNCTION

Dr.E.A. Zanaty, Khalid Abdel wahab ali qora

161-163

IAODV: AN IMPROVED AODV ROUTING PROTOCOL FOR MANET

Madhup Shrivastava, Monika Sahu, M A Rizvi, Khaleel Ahmad

167-174

OPINION MINING FOR HOTEL RATING THROUGH REVIEWS USING DECISION TREE CLASSIFICATION METHOD

shelly gupta, Shubhangi Jain, Shivani Gupta, Shruti ., Aakriti Chauhan

180-184

VIDEO FOREGERY DEDUCTION OF INTERFRAME DUPLICATION

Nandhini R, Nasima Begum.M, Mrs.Blessy Selvam M.E.

185-187

LOAD BALANCING TECHNIQUES IN CLOUD COMPUTING

Bharti Tyagi, Dr. Suman Sangwan

228-230

SURVEY OF VARIOUS DATABASES AND ITS APPLICATIONS IN THE REAL WORLD

Rahamathulla Vempalli, GUTTI VISHNU VARDHAN

237-239

A QUALITATIVE ANALYSIS OFWIRELESS ROBOTIC ARMS

Akash Bajoria, Soham Bhatnagar, Jaideep Bhide, Sidhant Birla, Artika Singh

262-266

ENHANCED SECURITY FOR DATA TRANSFER IN CLOUD

S Gurupriya, H. Refana Parveen, R. Aishwarya, J. K. Periasamy

270-273

SECURING SMART HOMES USING FACE RECOGNITION TECHNIQUES

Ishita Tarun kumar, Harshil Kapoor, Yash Kothari, Anuraj Bhatnagar, Payal Mishra

280-283

QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL

KAUSIK SAHA, Sirshendu Sekhar Ghosh, Dilip Kumar Shaw

287-291

AN HIDDEN SECURITY FEATURES FOR THE RECOGNITION OF FAKE CURRENCY

Hari chandana, K. Lavanya, Prof.T.Bhaskara Reddy

292-299

FUZZY THEORY – A SURVEY ON ITS FOUNDATIONS AND ADVANCEMENTS

Saniya Tasleem Zafar, Nafisur Rahman, Safdar Tanweer

314-316

RANDOM SUBSET FEATURE SELECTION FOR CLASSIFICATION

Lakshmi Padmaja Dhyaram, Vishnuvardhan B

317-319

PREDICTION OF FUEL ANALYSIS USING URBAN BIG DATA

R Logeshwari, Divyansh Gautam, Aniruddha Joshi

333-336

NOVEL SECURITY OF HOME USING SMART HOME MANAGEMENT SYSTEM

Brahmendra Golvilkar, Anil Mohite, Akshay gosavi, Prashant Magar, Vedant Pawar, Prachi Shete

337-339

A SURVEY PAPER ON IMPROVING PERFORMANCE AND ENHANCING SECURITY BY USING DIVISION AND REPLICATION OF DATA IN CLOUD

Sumit Sanyal, Osama Razi, Mohsin Raza, Shashi Sourav, Prof. Rachna Somkunwar

340-342

A REVIEW ON SOCIAL MEDIA ANALYSIS: CHALLENGES AND APPLICATION

Shachi Shukla, Seema Narvare, Chetan Agrawal

343-353

COMPARATIVE STUDY OF DIFFERENT ACTION FPS AND PUZZLE GAMES

Priya Vasant Bharambe, Aditi Sharad Patil, Sumit Kumar Sharma, Ichhanshu Jaiswal

357-360

MULTIMODAL BIOMETRIC SYSTEMS: A REVIEW

Aarvi Thadeshwar, Sanyamee Patel, Dhruvi Patel, Ratnesh Chaturvedi

361-365

CLOUD COMPUTING-TECHNOLOGIES

Mohammad Ilyas Malik, Shahid Hussain Wani, Abreen Rashid

379-384

LIST SCHEDULING ALGORITHMS CLASSIFICATION: AN ANALYTICAL STUDY

Akanksha Sarangal, Dr. Nirmal Kaur, Ravreet Kaur

385-389

CLASSIFICATION TECHNIQUES USING SPAM FILTERING EMAIL

P. PRIYATHARSINI, Dr. C. Chandrasekar

402-410

LIGHT FIDELITY: A WAY OF DATA TRANSMISSION

Osheen Sharma, Shruti Dadral

428-430

LITERATURE REVIEW ON SOFTWARE COMPLEXITY, SOFTWARE USABILITY AND SOFTWARE DELIVERABILITY

Mohd Kamran Khan, Mr. Faiyaz Ahmad, Dr. Mohammadi Akheela Khanum

438-441

KEY OPTIMIZATION TECHNIQUE IN MOBILE AD HOC NETWORKS

Shanthi Govindan, M. Ganaga Durga

446-451

GRAPHICAL PASSWORD USING 2D COORDINATES

Purshottam J Assudani, Ashish V. Chandak, Vinisha P. Assudani

467-469

AN ALGORITHM FOR SPEED ESTIMATION AND SPEED VIOLATION DETECTION OF A VEHICLE USING COMPUTER VISION

Nikeshaben Sanjaybhai Patel, Khushali R Raval, Shardul J Agravat

504-507

DUSTBUSTER: AN AUTONOMOUS VACUUM CLEANING ROBOT

Aditya Raaj Badde, Viral Shah, Siddharth Sharma, Abhishek Vichare

533-536

COMPARATIVE STUDY BETWEEN EXISTING CLOUD SERVICE PROVIDERS

Mukesh Dewangan, Dr. Rajesh Keshavrao Deshmukh, Ashutosh Mishra

537-539

DFT BASED DIGITAL IMAGE WATERMARKING: A SURVEY

Ningombam Jimson, K Hemachandran

540-544

ANALYTICAL REVIEW OF LOAD BALANCING TECHNIQUES IN CLOUD COMPUTING

ABHIKRITI NARWAL, Sunita Dhingra, Sunita Dhingra

550-553

MULTIDIMENSIONAL ANALYSIS OF GENETIC ALGORITHM USING MATLAB

Prof Neeraj Bhargava, Dr. Ritu Bhargava, Kapil Chauhan

554-558

THE NEW WAY OF ELECTRICITY IN INDIA (SMART GRID)

Bhoomika Sharma, Satya Narayan Joshi, Prashant Singh

559-563

DIVYANG – A SIGN LANGUAGE RECOGNITION AND CONVERSION SYSTEM

Priyanka Gulia, Krusha Sheth, Jammy Tandel, Avneet Saluja

573-576

MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING – A REVIEW

Tejenderkaur Harlalsingh Sandhu, Abhijit Itkikar

582-584

DETECTION AND CLASSIFICATION OF BRAIN TUMOR USING ML

Avirup Chowdhury, Indrajit Das, Avipsa Roy Chowdhury, Arnab Halder

585-591

FACE DETECTION AND RECOGNITION USING HAAR CLASSIFIER AND LBP HISTOGRAM

Indrajit Das, Indrasom Gangopadhyay, Anulekha Chatterjee

592-598

IMPLEMENTATION OF LEARNING EVALUATING ANALYZING RANKING AND NURTURING TOOL

Dr. santhi P, G. Devaraj Devaraj, B. Guhan, V. Gunaseelan

635-637

CONTENT BASED IMAGE RETRIEVAL USING HYBRID-SVM

Rajneesh Pachauri, Meenakshi Pandey

638-645

The Power of Cloud Computing: Integration and Intelligence

D Venkatesh, Suresh Pabboju, Vijay Kumar Damera

656-662

Efficient Compression of Binarized Tainted Documents

RATNAKUMARI CHALLA, kanusu SRINIVIVASA RAO

663-667

Effect of Texture Feature Combination on Satellite Image Classification

Dr. Mohammed Sahib Mahdi Altaei, Saif Mohammed Ahmed, Dr. Hayder Ayad

675-683

Automated Student Performance Analyser And Recommender

Nisha Maria Arunkumar, Angela Miriam A, Christina J

688-698

THEORETICAL ANSWER EVALUATION USING LSA, BLEU, WMD AND FUZZY LOGIC

Anmol Mishra, Aniket Bharti, Praful Mishra, Sarita Ambadekar

714-717

Evaluation of Drug Addiction Causes in Punjab using Machine Learning

Jaspreet Singh, Mandeep Kaur, Gurvinder Singh

730-733

IoT Based Smart Vehicle Monitoring System

S KUMAR REDDY MALLIDI, V Vineela Vangipurapu

738-741

LOAD BALANCING IN CLOUD COMPUTING: A REVIEW

sangeeta soni, sangeeta soni, suman sangwan

760-763

A Prediction System for Farmers to Enhance the Agriculture Yield using Cognitive Data Science

Muthurasu N, M. Narayanan @ Ramanathan, Sahithyan S, Aravind M, Ramanagiri Bharathan A

780-784

A SURVEY ON RANSOMEWARE: EVOLUTION, GROWTH, AND IMPACT

Hirra Sultan, Aqeel Khalique, Safdar Tanweer, Shah Imran Alam

802-810

INTEGRATED AND EFFECTIVE WASTE MONITORING AND MANAGEMENT

Kanubhai K Patel, Savan Kachia, Romil Shah, Dharmendra T. Patel

821-826

PAKE PROTOCOL WITH OTSP AND IMAGE BASED PASSWORD AUTHENTICATION

Anuradha Soni, Rajneesh Pachouri, Anurag Jain

858-865

ARDUINO BASED DAILY MONITORING –LPG-ON-TIP

Athira sudersanan, Alina Shaji, joyal laj, Akhila A Unnithan

866-870

DUAL LAYER SECURITY FOR RELIABLE SERVICE DISCOVERY IN MANETS

Jyoti tiwari, Ashish Singh baghel, Bhanu Pratap Singh

876-880