DOI: https://doi.org/10.26483/ijarcs.v4i4

Published: 2017-01-13

Self-Organizing-Healing Paradigm for Mobile Networks

Okon S. C., Asagba P. O., Aloysius Akpanobong

1-7

Soil Testing Reports Extracted Using Combined Mining Patterns

Mathavi parvathi, pandimurugan, Dr.Paul rodrigues

18-21

Improved techniques for Image Retrieval

Priyanka Gupta, Mr. Umesh Kumar

28-33

E-commerce In Enterprise Marketing Management Environment

Mangesh S. Dabhade, Dr. P. N. ChatuR, Prof. R. V. Mante

40-44

Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme

Sarita Motghare, P.S.Mohod,S.P.Khandait, Anil Jaiswal

55-59

Private Cloud Implementation at Enterprise with IBM Workload Deployer

Prashant A. Gadling, Prof. A.V. Deorankar, Dr.P. N. Chatur

77-80

Privacy Issues and Measurement in Cloud Computing: A Review

Ishan Rastogi, Adesh Chandra,Vivek Kumar Gupta, Dr. Abhishek Vaish

81-86

Online Video Streaming System

Ms. Supriya Thombre, Samruddha Barai, Pranay Tiwari, Gaurav Diyewar

106-108

Various Edge Detection Techniques: Survey, Implementation and Comparison

Krupa Shah, Khushbu Patel, Ghanshyam I Prajapati

109-113

Optical Watermark Based On Digital Printing

Pise Anil Audumbar, Gupta Hitesh, Chabukswar Hrishikesh

119-124

SOA Appliances: An Embedded System Perspective

Deepali Tripathi, Yogita Punjabi

125-128

Governance Through Cloud in India (GCI)

Anurag Singh, Kumar Anurupam, Rajnish Sagar, Shashikant Rai

129-136

Encryption and Decryption Technique in Wireless Sensor Networks

S. Kannadhasan, P.Suresh, M.Rajesh Baba

145-147

Fingerprint Geometry matching by Divide and Conquer Strategy

Sanjukta Pal, Sucharita pal, Prof. (Dr) Pranam Paul

179-183

J1 Accumulator-Based Processor for Educational Purposes

Askari Yadollahpour Mansour, Ahmad Habibizad Navin, Amir Masoud Rahmani

191-194

A Review On A Mechanism Of Ensuring Data Storage Security In Cloud Computing

Gayatri V. Shastri, Charul D.Akhade,Dnyaneshwar P.Shirame, Prof.Sandip T.Dhagdi

218-223

Security Concerns In the World of Cloud Computing

Kashish Goyal, Supriya Supriya

230-234

Join Queries Translation from SQL to XML

Bhargavi K, Chaithra H. S.

241-247

Real Time Static Hand Gesture Recognition System Using Hci For Recognition Of Numbers

Prof J.R. Pansare, Jay Shrotriya, Rahul Durrani, Sonam Jaisinghani

258-262

High Capacity Image Steganography Using Curvelet Transform and Bit Plane Slicing

Sheshang D. Degadwala, Amit R. Thakkar, Rikin J. Nayak

307-312

Visual role mining to avoid text complexity using fuzzy logic decision system

G. Narmada, M.K.Shanmathi, Ms.N.D.Thamarai selvi

313-136

PG-RM: Prognostic Approach for optimizing Grid computation using Risk Management Methodology.

Rahul Bose, Prabhat Kumar Singh,Sunil Kumar Singh, S Venkatesan

317-323

Mining of Different Types of Hidden Knowledge from Log Files

Wajih Abdul Ghani Abdul Hussain, Dr. Hussain k. Al _khafaji

329-336

Matching of Fingerprint Geometry by Advanced Divide and Conquer Technique

Sanjukta Pal, Sucharita pal, Prof.(Dr) Pranam Paul

337-343

E-Commerce on Cloud: Issues, Attacks & Security

P. S. Lokhande, B. B. Meshram

344-350

A Model for Inferring Trust for an Unknown User on Social Networking Sites

Amrita Srivastava, Ruchi Verma, Ram Chandra Yadav, S. Venkatesan

357-361

A Novel Architecture for Personalized Image Retrieval from Social Websites

M. Kameswara Rao, Priyanka Mondal, M. Sarath Chandra, Pujari NagaLakshmi,

369-373