Call for Papers

Vol. 7, Issue 3, March 2018

Paper Submission :  31st March 2018
Author Notification : 
 within 2 days 
 in Progress 

[?]   Submit paper to This email address is being protected from spambots. You need JavaScript enabled to view it.

↓ Paper Format                    ↓ Copyright Form

Citation indices     All    Since 2012
  Citations               3124                 3055

  h-index                    25                     25

  i10-index                 76                     72


February 2016



 Database Administrator Roles and Equivalent of a SQL Server Identity in Oracle

Saeed M Alshahrani

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5201

Application of XML Compressor [EXI] in Medical Image Database (DICOM)

Gaurav Jaiswal, Adesh Chandra, Niharika Srivastava

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5202

Detection of Distributed Denial of Service and Counter Measure Selection Mechanism in Cloud System

Mrs. Sweta Kamat, Mrs. Poonam Sinai Kenkre, Mr. Shreedhar Niradi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5203

A Study on Security Approaches for Authentication Processes for Email Transactions

Shananda Dey, Ms. Jharna

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5204

Single Image Dehazing for Robust Image Matching

Waman Kumar Gangber, Mrs. Urmila S. Soni

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5205

Advent for Detection of Movement using Raspberry Pi by an Internet of Things: A Survey

Usha K, Dr.S.Ambareesh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5206

A Review of Wireless sensor networks System for monitoring of Asthma Trigger Factors

Miss.Anumeha Lal, Mr. Girish A. Kulkarni

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5207

Intrusion Detection on Highly Imbalanced Big Data using Tree Based Real Time Intrusion Detection System: Effects and Solutions

Dr.R.Balasubramanian, S.J.Sathish Aaron Joseph

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5208

Image Intensification using Various Edge Detection Mechanisms

Reena Jangra, Abhishek Bhatnagar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5209

Embedded Visual Cryptography for Secret Color Images Sharing using Stamping Algorithm, Encryption and Decryption technique

Prof. N. N. Thorat, Snehal M. Kaware, Dhanashri D. Patil, Neha R. More

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5210

A Review on Redundancy Management of Multipath Routing for Intrusion Tolerance in Hetrogeneous WSN

Manisha Dangi, Prof. R. K. Krishna

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5211

Spectral Clustering based Approach on Large Water Distribution Network

S.V.S. Santhi, Poosapati Padmaja

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5212

Energy Efficient Scheduling of Map Reduce for Evolving Big Data Applications

Mrs.P.Sheela Rani, S.Shalini, J.Rukmani@keerthika, A.Shanthini

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5213

SHA-ZHLS: Security Enhancement in MANETs using SHA Algorithm

M V Narayana, Dr G Narsimha, Dr SSVN Sarma

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5214

Big Data – Concepts, Applications, Challenges and Future Scope

Samiddha Mukherjee, Ravi Shaw

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5215

A Review on Data Anonymization in Privacy Preserving Data Mining

Kinjal Parmar, Vinita Shah

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5216

Prediction Accuracy of Academic Performance of Students using Different Datasets with High Influencing Factors

Jai Ruby, Dr. K. David

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5217

A Survey Study For Deduplication In Large Scale Data

Supriya Allampallewar, Mr. J. Ratnaraja Kumar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5218

A Novel Approach to Detect Intruder for Hierarchical WSN Network

Manoj Kumar Gupta, Lokesh Singh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5219

A Review: Customer Relationship Management Classification using Data Mining Technique

Easha Mangal, Mr. Anurag Jain

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5220

Recommender System for Hotels based on user’s personalized ratings using Hadoop and Cloud

J. S. Pawar, Nisha R.Patil, Harshala R.Khinde, Snehal S.Dandge, Sampada S. Bhavsar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5221

Using Certificate less Encryption for Providing Data Sharing Efficiency in Public Clouds

Ch. Dinesh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5222

Survey on Wireless Body Area Network

Stefina Macwan, Nikhil Gondaliya, Nirav Raja

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5223

Precision and Recall of Google and Baidu for Retrieval of Scholarly Information in the field of Computer Applications

Aasim Bashir, Peerzada Mohd Iqbal

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5224

Topic Quarrying Over Same Time Period Text Documents

Sujata B. Sanap, Prof. Vivek P. Kshirsagar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5225

Reversible Image Watermarking Based on Histogram Shifting Technique: Review

Salunkhe Pallavi P, Dr. Kanse Y.K

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5226

Critique of Wordcount Blueprint By Virtue of MapReduce Postulate

Priyaneet Bhatia, Bhawna Mallick

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5227

Optimized Image Classification based on Universal Image Distance and Support Vector Machines

Nandita Chasta, Manish Tiwari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5228

High Speed UART Design Using Verilog

Ambika, Prof. Anuradha S

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5229

Energy Aware Ant Colony Optimization based Dynamic Random Routing Strategy for MANET

S. Beski Prabaharan, Dr. R. Ponnusamy

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5230

Raspberry Pi based Interactive Smart Home Automation System through E-mail using Sensors

Shruti G. Suryawanshi, Suresh A. Annadate

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5231

HR Application Using IBM’s Bluemix

Akash Narhe, Avinash Dhobale, Shweta Tikhe, Prajakta Suryawanshi, Prof. U.A.Joglekar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5232

A Study of Analyzing Greedy Approach for Fractional Knapsack Problem

Sri Lakshmi Kanagala

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5233

A Review-Recognition of License Number Plate using Character Segmentation and OCR with Template Matching

Mr A. N. Shah, Ms A. S. Gaikwad

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5234

A Review On: Protocols and Standards in Different Application Areas of IOT

Chetal. S. Patil, Kanaksing. N. Pawar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5235

Graphical Password based Authentication System

Anitha H.B, Adithi Reddy, Irudaya Mary S, Vidya V

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5236

A Defended and Adequate Mutual Verification with Key Concession Architecture in Wireless Network

N. Praveen Kumar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5237

A Novel Creative Photo grid Android mobile Application for Photo Editing

Prof. Keerthan Kumar T G, Harika E, N Vani, Aishwarya Patted

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5238

Enhanced Energy and Secured Using Position Based Routing Protocol Design for Wireless Mesh Networks

Dr. K. Kumaravel, Ms. V. Renugadevi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5239

A Pragmatic Approach to Optimize Energy Efficient Resource Allocation Technique in Cloud Computing Data Center

Neha Pangotra, Meenakshi Sharma

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5240

A Survey on Genetic Algorithm for Vehicle Routing Problem

Ms. S. Geetha Msc., Mrs. N. Vijayalakshmi MCA., M. Phil.,

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5241

Performance Analysis on Clustering Approaches for Gene Expression Data

D. Asir Antony Gnana Singh, A. Escalin Fernando, E. Jebamalar Leavline

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5242

Security Vulnerabilities and Solution for Electronic Commerce in Iraq

Huda Hamdan Ali, Hasan Abdulrazzaq Jawad

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5243

Comparative Analysis between Iterative Threshold Technique and Otsu’s Method

Chinmoy Kar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5244

Performance Analysis of AODV, AOMDV and ZRP using NS-2: A Survey

K. Gowri Raghavendra Narayan, N.V. Ramana Gupta, Dr. M.V. Rama Krishna

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5245

Software Development Life Cycle Models - A Comparative analysis

Shubham Dwivedi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5246

Automated unified system for LPG using Microcontroller and GSM module

B. B. Didpaye, Prof. S. K. Nanda

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5247

Performance Evaluation of Trigger Driven Zero Remnance Proof Based Data handling for Digital Forensic

Pooja Bhavsar, Rakesh kumar Lodhi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5248

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Mr. K.S. Saravanan, S. Karthika

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5249

Implementation of Smart Home Control by Using Low Cost Arduino & Android Design

Zaid Abdulzahra Jabbar, R.S. Kawitkar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5250

Hop-By-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

Mrs. C. Theebendra, S. Prema

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5251

A Review: Handwritten Character Recognition System

Mahesh R. Barkul, S. S. Lokhande

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5252

A Review: Comparison of Different Algorithms to Improve the Quality of Image

Mayur M. Sonavane, Dr. S. S. Agrawal

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5253

A study of Image classification using BoF model

Charulata Rathi, S.V. Jain

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5254

Survey on Preventing Vampire Attacks in Wireless Sensor Networks

Ms. S. Jayashree, Ms. S. Hebziba Jeba Rani

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5255

Meliorated Cooperative Message Authentication Scheme in VANET

Anushree K, Divya K, Pavithra A, Asmitha Shree R

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5256

Solution for Farmer Consumer Interaction

Mahesh M. Jadhav, Akash V. Ingale, Sandhya N. Hiranwale, Umesh M. Bhavsar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5257

Review of Bank Locker System Using Embedded System

Abhilasha A Sayar, Dr. Sunil N Pawar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5258

A Review: Contrast Enhancement Methods

Namrata Khaparde, Dr. S.S. Agrawal

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5259

A Survey on Identification of Dipoles in Climate Data

Ramireddy Thushara Bharathi, J. Velmurugan, Dr. M. Venkatesan

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5260

A Survey Paper on Climate Changes Prediction Using Data mining

E. Sreehari, J. Velmurugan, Dr. M. Venkatesan

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5261

A survey on Weather forecasting by Data Mining

Audireddy Gayathri, M. Revathi, J. Velmurugan

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5262

Brief Survey of data mining Techniques Applied to applications of Agriculture

Ami Mistry, Vinita Shah

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5263

Verifying Human Identities Using Major and Minor Finger Knuckle Pattern

Shubhada Sonawane, Prof. Ganesh Dhanokar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5264

Lost Update Problem, Pessimistic and Optimistic Concurrency

Ala Yusef

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5265

System for Enhancing Agriculture

Dibin Thomas, Kaiwalya Limaye, Rachana K P

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5266

Night Vision Motion Estimation: A Survey

Patel Ami M., Assi. Prof. Swapna J Jadhav

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5267

Security & Concurrency control in Real-Time Database Systems: A Survey

Ebrahim Abduljalil, Dr. S.B. Thorat

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5268

An Intelligent Compression: A Reliable Space Optimization in Cloud Storage

Shyma Manzoor, Amrutha Chandran, Raji Jayan, Nayana P, Archana R S, Sowmya K S, Jooby.E

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5269

Evaluation of EKF Based Receiver for Bluetooth in Presence of IEEE 802.11 Interference

Mr. Alhaj-Saleh Abdallah, Prof. Mohamed Zohdy

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5270

Review on: Hand Gesture Based Interactive Photo Slider

Sampada Muley, Prof .A. M. Rawate

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5271

Conservation of Power Quality in Micro Grid Using Photovoltaic Interfaced Shunt Active Power Filter

Aruna.V, Jagan.R, Selva Kumar.S

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5272

Importance of TPA and Homomorphic Token for Data Storage Security in Cloud

Sneha S. Bhandarkar, Buri Chanukya, Sandhya Rani, Y. V. N. Phani Kishore

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5273

An Analytical Approach to Wireless Communication using Vodka Vapours

Rohit Kashyap, Shivam Thabe, Sahil Sawant, Rahul Kashyap

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5274

A Survey Paper on Personalized Web Search

Durgesh Sawkhedkar, Sonal Patil

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5275

A Novel Scheme for Congestion Control in Mobile Ad Hoc Networks

S.TamilSelvi, O.P.UmaMaheshwari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5276

An Overview of Various Improvements of DBSCAN Algorithm in Clustering Spatial Databases

K. Nafees Ahmed, T. Abdul Razak

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5277

Detection and Prevention of Black Hole Attacks in Manets Using NTP Method

Arshdeep Singh, Er. Harshdeep Trehan, Er. Varinderjit kaur, Dr. Naveen Dhillon

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5278

ATM Security Using Virtual Password

Renjith R, Arya S, Jasmine Yesudasan, Keerthy S Kumar, Krishnaveni S, Ajeesh S, Jooby E

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5279

Monitoring and Controlling of Environmental Parameters Using Embedded Web Server

Ashwini .S. Malewar, Prof. Shaila Kharde, Prof. Sonali Chincholikar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5280

Gesture Recognition System for Indian Sign Language on Smart Phone

Ankit P. Parmar, Dr. Nehal G. Chitaliya

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5281

Security Analysis of Handover Key Management in 4G LTE/SAE Networks

Dr.P.Sumitra, P.Ponkavitha

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5282

An Optimized Parallel Computation of Advanced Encryption Algorithm using Open MP -A Review

Vishal Sathawane, Tausif Diwan

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5283

A Study on Gender Prediction using Online Social Images

Minal Gadiya, S. V. Jain

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5284

Forestalling the Risk of Cognitive Distraction Accidents by using Cellular System

M. Vignesh, S.R. Sannasi Chakravarthy

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5285

A Survey: Text Extraction from Images and Video

Vivek Dhanapal Sapate

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5286

Intercell Interference and Cross Tier Interference Mitigation in LTE based Femtocell Network using 'CASFR' Scheme

Prof. Dimple Chaudhari, Reshma Khandare

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5287

Study of Various Security Attacks in Network Layer and the Mitigation Techniques for MANET

R. Divya Paramesvaran, Dr. D. Maheswari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5288

Survey on Dynamic Query Forms for Database Queries

Subhash Pingale, Swapnaja A. Ubale, Anandrao G. Deshmukh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5289

CyanogenMod as an Aftermarket Firmware Replacement for Android

Ashok Patel

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5290

Preserving Text search privacy through blind storage towards secure Storage and retrieval of data

D.Kavitha, S.Hemavathy

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5291

A Comparative Study on Prediction of Heart Disease using Cluster and Rank based Approach

K. Aravinthan, Dr. M. Vanitha

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5292

A Novel Approach for Transaction Management in Heterogeneous Distributed Database Systems

Mr. Dheeraj Bhimrao Lokhande, Prof. Jyoti I. Nandalwar, Prof. Dr. R.C. Thool

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5293

Confidentiality Technique for Enhancing Data Security using Encryption and Obfuscation in Public Cloud Storage

S. Arul Oli, Dr. L. Arockiam

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5294

Data Fusion Using Conflict Identification Methods for Knowledge Mining Based Repository Creation

I. Carol, Dr. S. Britto Ramesh Kumar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5295

A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model

P. Anitha, Dr.G.Satyavathy

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5296

Amigos.com: An Attitude based Friend Recommendation System on Social Network

Alsaliha S, Anjali Unnikrishnan, Kripa Mariam John, Pavithra P, Vineetha B T, Ms. Deepa K Daniel, Ms. Jooby E

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5297

A Novel Method of Digital Image Watermarking in Spatial Domain Based on Interpolation

Kullayamma and Sathyanarayana

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5298

Enhanced Security Framework for Cloud Storage Using Decentralized, Dynamic and Policy-Based Security

Khushbu Malviya, Priya Saxena

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.5299

Google Analytics Tracking for Flex

Ms. Shradha Dhakate, Ms. Rutumbhara Kolhe, Prof. Swati Ramteke

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52100

Advancement in Antivirus

Priya Upadhyay, Ayushi Saxena, Ankuj Singh, Pradeep Sharma

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52101

Performance Enhancement of AODV in MANET over Black-Hole Attack

Mr. Ankush Jain, Mr. Sandeep Gupta

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52102

Vulnerabilities of Routing Protocols in Wireless Sensor Networks

Celia John, Charu Wahi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52103

Design and Implementation of a GSM based Electronic Appliances Monitoring and Controlling System

Oyediran Mayowa Oyedepo, Akande Noah Oluwatobi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52104

Document Clustering for College Student Database

Amol Patil, Shahezad Arif, Ajit Patil, Prof. Deveshree Wankhede

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52105

Real Estate Management System

Jitendra Mahajan, Ganesh Mahajan, Vivek bhuvad, Prof Reena Chaudhari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52106

Design and Development of a Portable ECG Acquisition System

K.Anuradha, M.Saravanan

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52107

A Survey Exploring Student’s Experiences through Analyzing Social Media Data

Ajinkya A Londhe, Jamgekar R.S, Solunke B.R

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52108

A Survey on Parallel Mining of frequent itemsets in MapReduce

Indumathi S, Kavya D S, Madhusudhan V

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52109

Web Usage Mining - A Review

Mr. Ankit Rathi, Prof. Abhijeet Raipurkar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52110

Curvilinear Structure of HFET for Low Frequency Noise Measurements

Naresh Chandra Agrawal, Dr. Anil Kumar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52111

Identification of glaucoma disease using optic disk and cup segmentation from retinal images

Renuka Deshpande, Anita Kurmi, Jyoti Yadav, Prajakta Borole

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52112

Automatic Wi-Fi based Student Push Notification in College Campus by using Cloud Computing

Prof. Renuka Deshpande, Shubham Jaiswal, Harshal Joshi, Mayur Gondhale

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52113

Data Mining Technique to Predict Missing Items and Find Optimal Customer for Beneficial Customer Relationship and Management

Saroja T.V., Greeshma Nair, Kajal Nalawade, Yojana Prajapati

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52114

M-Learning: Effective Framework for Dyslexic Students Based on Mobile Cloud Computing Technology

Weam Gaoud Alghabban, Reda Mohamed Salama, Abdulrahman Altalhi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52115

Speech and Speaker Recognition System Using Artificial Neural Network and Hidden Markov Model

Pallavi Chandratre, Shweta Chile, Sarvesh Gawali, Asmita Jadhav

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52116

Keylogging-resistant Visual Authentication Protocol

Prof.Diksha Bhave, Pratiksha Bhavsar, Surekha Chavan, Krutika Gore

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52117

A Review: Integration of Open vSwitch on the OpenDataPlane Framework

N. D. Kakade, S. G. Tamhankar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52118

Security Trends in Delay Tolerant Networks

Audumbar T. Mohite, S.P. Sonavane

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52119

Enhancement Techniques of Medical Images- A Review

Radhika M. Kokate, Vijaya K. Shandilya

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52120

Image to Text Viewer (iTV)

Atul Thorat, Deepak Singh, Rohit Kadam, Prof. Uttara Gogate

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52121

A Survey on Image Modification for Deuteranopic Viewers

Ms. Jyoti D. Badlani, Mr. C.N. Deshmukh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52122

Optimizing the Health Needs of Users by Moulding up an E-Hospital

Aleena.Wahid, Anice.John, Athira.S, Prabha.M.R, Sivendu.B.S , Jooby.E, Deepa.K.Daniel

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52123

A Desirable Strategy for Enhancing Cost Containment in Cloud Cache

Suganthi.J, Abinaya.B, R.G. Suresh Kumar, T. Nalini

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52124

Secure Online Payment System using Visual Cryptography

Nikita Chaudhari, Priya Parate

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52125

Protecting Outsourced Data in Cloud Using Deduplication and Enhancing Key Management

Anuja Kunjumon, Devu S Nair, Saranya P, Shahanas Abdul Sammad, Smitha C S

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52126

SCADA Implementation for Power Generator Performance and Condition Monitoring System

Miss. Sargar Anita, Miss. Ghadage Shital, Miss. Shweta S. Joshi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52127

Security Issues and Social Impacts of Mobile Applications

Ms. Y Sowjanya, Ms. M Nishantha

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52128

Review Paper on QR Code Watermarking Algorithm Based on Wavelet Transform

Prof. Mrs Sarita Verma, Prof. Mrs. Jaya S. Wakode, Ms. Priyanka S. Kannurkar

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52129

Equality in Soft Erosion and Soft Dilation in Multi Scale Environment

Kompella Venkata Ramana

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52130

Smart Home Automation using IOT

Dhakad Kunal, Dhake Tushar, Undegaonkar Pooja, Zope Vaibhav, Vinay Lodha

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52131

Computerized Automated Detection of Skin Cancer

Darshana Kokitkar, Apurva Amberkar, Vaishali Giri

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52132

Comparison of Complex Event Processing Techniques in Sensor Networks

Dr. M. Senthil Kumar, M.Sumithra

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52133

Prevention against Attacks in MANET Using Secure IDS

Darshana Salvi, Ruchira Samant, Ashwini Patil, Manali Repale, Prof. Manisha Sonawane

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52134

M-Commerce: Risks, Security and Mobile Banking Payment Methods

Akanksha Srivastav, Ajeet Bhartee

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52135

Resource Sharing via Social Networks

Amrutha J Raj, Archana Ravi, Keerthy Raj, Sree lekha A, Bichu Ben, Devi Dath, Deepa K Daniel

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52136

A Recommender System for Online Advertising

M. Sree Vani

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52137

Comparative Analysis of Prevention and Detection Policies for Selfish Behaviour in MANET

Ms. Lilu Odedra, Prof. Ashish Revar, Prof. Munindra H. Lunagaria

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52138

Improved Content Adaptive Image Detail Enhancement by Using Guided Image Filter

Seema, Er. Harshdeep Trehan, Er. Varinderjit Kaur, Dr. Naveen Dhillon

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52139

A Survey on Image Steganography Techniques using Compression

Pranjal Shrivastava, Sandeep Pratap Singh

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52140

Steganography using Genetic Algorithm along with Visual Cryptography for Wireless Network Application

Himani Mehra, Mr. Tarun kumar Sahu, Miss Garima Tiwari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52141

An Android-Based Emergency Alarm Message and Healthcare Management System

Karan Jadhav, Akshay Satam, Abhijeet Salvi

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52142

Local Activity and Social Similarity based Data Forwarding Scheme

Vaibhav Dandale, Himanshu Chaudhary, Sameer Lakhe, Sumeet bhosikar, Prof. V.S.Phad

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52143

A Survey on Face Annotation for Content Filtering based on Different Techniques

Ms. Mahvash Iram Khan, Mr. K.N.Hande

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52144

Survey on Digital Image Forensics Using Different Contrast Enhancement Techniques

Ms. Nishat Fatema, Mr. M.S. Chaudhari

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52145

A Novel Approach to Compute Reputation Value for Trust based Hybrid Security Architecture for Mobile Agents

Dr. Heman Pathak

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52146

A Survey on Cerebrum Tumour Detection in MRI using Medical Imaging Techniques

Priyanka Pareek

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52147

Multicloud Collaboration: The Cloud Mush up and Security Issues

Ghodake P.R, Nagode M.S, Fatale P.R, Menkudale K.S

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52148

Study on Framework for Password-less Authentication

Sabin K Ravi, Sivadasan E T

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52149

A Survey on Sharing of PHR using ABE in Semi-trusted Servers

Ambadas Vairagar, Rahul Kanthale, Sandeep Pawar, Prof. S.K. Markad

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52150

A powerful Wi-Fi XML Buffer Supporting Twig Structure Requests Using Lineage Coding

J.Jakkulin Joshi, D.Kalaimani, R.Priya

Abstract PDF with Text DOI: 10.17148/IJARCCE.2016.52151

An Adaptive Approach for Mobile Robot Path Planning Using Optimized Artificial Potential Field Method

Urvashi Jaiswal, Anwiti Jain, C.S. Satsangi

Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.52152