DOI: https://doi.org/10.26483/ijarcs.v4i2

Published: 2017-01-13

A New Boosting Multi-class SVM Algorithm

Fereshteh Falah Chamasemani, Yashwant Prasad Singh

1-6

Usability Assessment of Open source application

Syed mehr Ali Shah, Muhammad Faheem Qureshi, Gharib Ismail Gharib Al-Matroushi

13-19

User-Level Process Migration Mechanism

Dr. Narayan A. Joshi, Dr. D. B. Choksi

20-23

Text Document Featured Clustering and Classification using Fuzzy Logic

Ms. S. Nalini, Mrs. S. Selvakanmani, Mrs. A. V. Kalpana

31-34

Multi Criteria Trust Model in Grid Computing Systems

Neda Azari Khosroshahi, Ahmad Habibizad Navin, Ali Asgar Pourhaji Kazem

55-59

Developing Digital Library: A Model for Kwara State Polytechnic Digital Library

Raji, Ayodele Kamaldeen, Agboola, Oladiran Matins,Abiodun, Emmanu Abdulrahman, Tosho Abdullahi

65-69

Medical Image Compression using Modified Curvelet Transform

Saravanan. S, D.Sujitha Juliet, K. Shiby Angel

70-74

Proxy Server Experiment and the Behavior of the Web

Mr.S.V. Gumaste, Dr. V. M. Thakare,Dr. M. U. Kharat, Aditya Patki

84-87

Population Projection Using Geometric Growth Model

Adeoye. Akeem. O, Babalola J. B.

99-100

Fuzzy Approach for Intrusion Detection System: A Survey

Partha Sarathi Bhattacharjee, Dr. (Mrs.) Shahin Ara Begum

101-107

Protected Multi-tiered Sensor Network Uses Spatiotemporal Feature

M. Adimoolam, K. Hemachandran, R. Prasanth, N. Prabavathi, Melbin T. Mathew

124-127

A Countermeasure Technique for Email Spoofing

Manish Kumar, Dr. M. Hanumanthappa, Dr. T.V. Suresh Kumar

128-133

A Review: Image Segmentation using Active Contours

Sheenam Adhlakha, Arvind Selwal

134-138

Indirect Anaphora Resolution using Parallel Queues

Lokesh Kumar Sharma, Dr. Ela Kumar

162-165

Android and Web Application for Attendance and Notification Management of Academic Institution

Sharwari Chandrashekhar, Vidya Ramesh Patil,U. M. Kalshetti, Varsha Vasant Sasane

213-215

Bayes Classification for the Fingerprint Retrieval

Leelambika. K.V, A.Rohini, M.Queen Mary Vidya

216-220

Privacy in Bluetooth using Cryptographic Technique

Rajapraveen. K.N, Dr.N.K.Prasanna Kumari

287-289

An Efficient RSA Based Key Authenticated Prime Fibonacci Cryptosystem

Archana Raghuvamshi, Prof.P.Premchand, Radhika Sivalenka

300-304

An Image Encryption Algorithm based on 3D Lorenz map

Mrs. A.Anto Steffi, Mr. Dipesh Sharma

312-316

An Android Application for Bluetooth Multicasting in a Piconet

Neha Billimoria, Supriya Pethkar, Vedashree Takalkar, Prof. S. A. Mahajan

317-319

Application of Datamining Technique in Social Networking Sites: Facebook as a Case

Karuna C. Gull, Dr. Santosh kumar Gandhi, Santoshkumar B. Shali

320-326