DOI: https://doi.org/10.26483/ijarcs.v3i1

Published: 2017-01-13

New Density-Based Clustering Technique: GMDBSCAN-UR

Mohammed A. Alhanjouri, Rwand D. Ahmed Ahmed

1-9

DOI: https://doi.org/10.26483/ijarcs.v3i1.940
DOI: https://doi.org/10.26483/ijarcs.v3i1.6040

Improvement of Gateway Replacement in Wireless Mesh Networks Using Genetic Algorithm and Fuzzy Logic

Meysam Rashno, Seyed Javad Mirabedini, Ali Harounabadi, Farhad Nematy

17-21

DOI: https://doi.org/10.26483/ijarcs.v3i1.944
DOI: https://doi.org/10.26483/ijarcs.v3i1.1025

Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks

Muhammad Sufyian Mohd Azmi, Abdulrahman H. Altalhi, Labeeb Mohsin Abdullah, Zailani Mohamed Sidek

26-30

DOI: https://doi.org/10.26483/ijarcs.v3i1.980
DOI: https://doi.org/10.26483/ijarcs.v3i1.956

Genetic Algorithm: Tool to Encrypt Image

Dr. Mohammed Abbas Fadhil Al-Husainy

36-42

DOI: https://doi.org/10.26483/ijarcs.v3i1.961
DOI: https://doi.org/10.26483/ijarcs.v3i1.6041
DOI: https://doi.org/10.26483/ijarcs.v3i1.983

A Review On Routing Protocols In Mobile Adhoc Networks

G.Jose Moses, Dr.P.Suresh Varma, N.Supriya

59-64

DOI: https://doi.org/10.26483/ijarcs.v3i1.984
DOI: https://doi.org/10.26483/ijarcs.v3i1.946
DOI: https://doi.org/10.26483/ijarcs.v3i1.937
DOI: https://doi.org/10.26483/ijarcs.v3i1.985

A Special Acknowledgement based Routing for Mesh Network

Bhandari Phaniraja, B. Raj Kumar, G. Aruna Kranthi

85-89

DOI: https://doi.org/10.26483/ijarcs.v3i1.939
DOI: https://doi.org/10.26483/ijarcs.v3i1.1021
DOI: https://doi.org/10.26483/ijarcs.v3i1.986

PAPR Reduction Methods in OFDM Systems

Subhashita Shrivastava, Rekha Gupta

100-104

DOI: https://doi.org/10.26483/ijarcs.v3i1.987
DOI: https://doi.org/10.26483/ijarcs.v3i1.975
DOI: https://doi.org/10.26483/ijarcs.v3i1.988
DOI: https://doi.org/10.26483/ijarcs.v3i1.989

Active Scrutiny Techniques for the Reconstruction of Architectural Views

J.M.S.V.Ravi Kumar, I. Rajendra kumar, Dr. M. Babu Reddy, K. Phaneendra,G. Rajendra

123-126

DOI: https://doi.org/10.26483/ijarcs.v3i1.981
DOI: https://doi.org/10.26483/ijarcs.v3i1.1022

A survey of feature selection models for classification

B. Kalpana, Dr V. Saravanan, Dr. K. Vivekanandan

131-136

DOI: https://doi.org/10.26483/ijarcs.v3i1.990
DOI: https://doi.org/10.26483/ijarcs.v3i1.945
DOI: https://doi.org/10.26483/ijarcs.v3i1.991
DOI: https://doi.org/10.26483/ijarcs.v3i1.992
DOI: https://doi.org/10.26483/ijarcs.v3i1.993

Study of Noise and Filtering Techinques in Medical Images

Bhausaheb Shinde, Dnyandeo Mhaske,Machindra Patare, A.R. Dani

158-161

DOI: https://doi.org/10.26483/ijarcs.v3i1.994
DOI: https://doi.org/10.26483/ijarcs.v3i1.966

Web Mining Technique for Collaborative Web Surfing

Akhtar Ali Jalbani, Gordhan Das Menghwar,Mukhtiar Memon Aneela Yasmin

167-170

DOI: https://doi.org/10.26483/ijarcs.v3i1.995
DOI: https://doi.org/10.26483/ijarcs.v3i1.996

Optimization of Non Structured Query in Semantic Web by use of the Monitor Structure

Ahmad Kazemi, Dr. Mehdi Sadeghzadeh,Houshang Kazemi, Dr. Amir Masoud Rahmani

175-181

DOI: https://doi.org/10.26483/ijarcs.v3i1.947

An Advanced Encryption Method for VANET

Arun Malik, Sanjeev Rana

182-185

DOI: https://doi.org/10.26483/ijarcs.v3i1.948
DOI: https://doi.org/10.26483/ijarcs.v3i1.1012
DOI: https://doi.org/10.26483/ijarcs.v3i1.949
DOI: https://doi.org/10.26483/ijarcs.v3i1.950
DOI: https://doi.org/10.26483/ijarcs.v3i1.977
DOI: https://doi.org/10.26483/ijarcs.v3i1.1023
DOI: https://doi.org/10.26483/ijarcs.v3i1.963
DOI: https://doi.org/10.26483/ijarcs.v3i1.951

Satellite Imagery Enhancement Using K-Mean Clustering

M.Renuka Devi, Lt.Dr.S.Santhosh Baboo

220-225

DOI: https://doi.org/10.26483/ijarcs.v3i1.952

A Survey- Review on Load balancing Algorithms

Nitin R. Chopde, Prof. Pritish A. Tijare

226-230

DOI: https://doi.org/10.26483/ijarcs.v3i1.959
DOI: https://doi.org/10.26483/ijarcs.v3i1.976
DOI: https://doi.org/10.26483/ijarcs.v3i1.1024
DOI: https://doi.org/10.26483/ijarcs.v3i1.997
DOI: https://doi.org/10.26483/ijarcs.v3i1.998

VANET and its Security Issues: An Overview

Dipti M. Jawalkar, Suraj N. Chute, Avinash P. Jadhao

251-255

DOI: https://doi.org/10.26483/ijarcs.v3i1.999
DOI: https://doi.org/10.26483/ijarcs.v3i1.962
DOI: https://doi.org/10.26483/ijarcs.v3i1.1000
DOI: https://doi.org/10.26483/ijarcs.v3i1.964
DOI: https://doi.org/10.26483/ijarcs.v3i1.1001
DOI: https://doi.org/10.26483/ijarcs.v3i1.1002

A novel explicit context based approach for Computing Semantic Relatedness

Rezvan Mohamad Rezaei, Mehran Mohsenzadeh, Mashallah Abbasi Dezfouli

287-292

DOI: https://doi.org/10.26483/ijarcs.v3i1.1003
DOI: https://doi.org/10.26483/ijarcs.v3i1.1004

A New Method for Coreference Resolution in the Web of Linked Data Based On Machine Learning

LearningLeila Namnik, Mehran Mohsenzadeh, Mashallah Abbasi Dezfouli

299-304

DOI: https://doi.org/10.26483/ijarcs.v3i1.968
DOI: https://doi.org/10.26483/ijarcs.v3i1.969

Robust Ant Based Routing Protocol for MANET

Srinivas Sethi, Siba K. Udgata

312-316

DOI: https://doi.org/10.26483/ijarcs.v3i1.1005

An Exact Algorithm for Travelling Salesman Problem

Dr. K.Sobhan Babu, Dr. Keshava Reddi.E, Prof.Sundara Murthy.M

317-321

DOI: https://doi.org/10.26483/ijarcs.v3i1.1013

Removing the Redundancies in XML Document Design using GN-DTD

Ms.Jagruti S.W ankhade, Prof. Vijay S. Gulhane

322-327

DOI: https://doi.org/10.26483/ijarcs.v3i1.958
DOI: https://doi.org/10.26483/ijarcs.v3i1.971
DOI: https://doi.org/10.26483/ijarcs.v3i1.973
DOI: https://doi.org/10.26483/ijarcs.v3i1.970

Survey on Preprocessing in Web Server Log Files

Priyanka V. Patil, Mrs. Ujawala M. Patil

344-346

DOI: https://doi.org/10.26483/ijarcs.v3i1.1006
DOI: https://doi.org/10.26483/ijarcs.v3i1.1007
DOI: https://doi.org/10.26483/ijarcs.v3i1.954
DOI: https://doi.org/10.26483/ijarcs.v3i1.1008

Survey on Intrusion Detection Approaches

B.Ben Sujitha, Dr. V. Kavitha

363-371

DOI: https://doi.org/10.26483/ijarcs.v3i1.941
DOI: https://doi.org/10.26483/ijarcs.v3i1.943
DOI: https://doi.org/10.26483/ijarcs.v3i1.1009

RDF Based Framework for Multi Image Retrieval using Semantic Web

A. Gauthami Latha, E.Sirisha,Y. Srinivas, Ch. Satyanarayan

380-386

DOI: https://doi.org/10.26483/ijarcs.v3i1.957
DOI: https://doi.org/10.26483/ijarcs.v3i1.979
DOI: https://doi.org/10.26483/ijarcs.v3i1.978
DOI: https://doi.org/10.26483/ijarcs.v3i1.942

Implementation of Space Time Trellis Code Using Rayleigh Fading Scenario

Sujeet Singh Bhadouria, Dr.Manish Shrivastava, Vineet Richcharia

398-402

DOI: https://doi.org/10.26483/ijarcs.v3i1.1010
DOI: https://doi.org/10.26483/ijarcs.v3i1.955
DOI: https://doi.org/10.26483/ijarcs.v3i1.1014
DOI: https://doi.org/10.26483/ijarcs.v3i1.967
DOI: https://doi.org/10.26483/ijarcs.v3i1.938
DOI: https://doi.org/10.26483/ijarcs.v3i1.953
DOI: https://doi.org/10.26483/ijarcs.v3i1.960
DOI: https://doi.org/10.26483/ijarcs.v3i1.1011
DOI: https://doi.org/10.26483/ijarcs.v3i1.974

A study of DS with the help AQUA method.

Roshni S. l Ata, Ritesh R. Makhija, Avinash P. Jadhao

438-441

DOI: https://doi.org/10.26483/ijarcs.v3i1.972
DOI: https://doi.org/10.26483/ijarcs.v3i1.965

Use of Design Patterns in E-commerce Application:Survey

Pallavi S. Kulkarni, Pradnya B. Rane,Suchita P.Patil, Dr.B.B.Meshram

447-453

DOI: https://doi.org/10.26483/ijarcs.v3i1.1015

Variant Minimum Spanning Network Connectivity Problem

Dr.K.Sobhan Babu, C.Suresh Babu, Dr.M.Sundara Murthy

454-458

DOI: https://doi.org/10.26483/ijarcs.v3i1.1016

Spirometry Modelling: A New Concept of Post Processing of Traditional Data

Ms. Prachi D. Junwale, Prof. A. W. Bhade, Dr. P. N. Chatur

459-462

DOI: https://doi.org/10.26483/ijarcs.v3i1.1017

Travelling Salesman Problem with a grouping Constraint – A Lexi-Search Approach

Dr. K.Sobhan Babu, Dr. Keshava Reddi.E, Prof.Sundara Murthy.M

463-467

DOI: https://doi.org/10.26483/ijarcs.v3i1.1019
DOI: https://doi.org/10.26483/ijarcs.v3i1.1018