DOI: https://doi.org/10.26483/ijarcs.v3i2

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v3i2.1026
DOI: https://doi.org/10.26483/ijarcs.v3i2.1027
DOI: https://doi.org/10.26483/ijarcs.v3i2.1028
DOI: https://doi.org/10.26483/ijarcs.v3i2.1029
DOI: https://doi.org/10.26483/ijarcs.v3i2.1030
DOI: https://doi.org/10.26483/ijarcs.v3i2.1031
DOI: https://doi.org/10.26483/ijarcs.v3i2.1032
DOI: https://doi.org/10.26483/ijarcs.v3i2.1033
DOI: https://doi.org/10.26483/ijarcs.v3i2.1034

Bandwidth Secure VPN Using PRA with QOS

S.M.Krishna Ganesh, Dr.S.Venkatesan Jeya Kumar, A.Siles Balasingh

55-57

DOI: https://doi.org/10.26483/ijarcs.v3i2.1049

Fundamental Concepts of MCMC Methods Proved on Metropolis-Hastings Alghorithm

E. Fayyazi, GH. Gholami,A. Fayyaz Movaghar, A. Etemadi, H. Rasi, S. Panahi

58-66

DOI: https://doi.org/10.26483/ijarcs.v3i2.1058
DOI: https://doi.org/10.26483/ijarcs.v3i2.1057
DOI: https://doi.org/10.26483/ijarcs.v3i2.1056
DOI: https://doi.org/10.26483/ijarcs.v3i2.1059

Genetic Programming in Data mining Tasks

Venkatadri. M, Hanumat G. Sastry, Lokanatha C. Reddy

83-86

DOI: https://doi.org/10.26483/ijarcs.v3i2.1047
DOI: https://doi.org/10.26483/ijarcs.v3i2.1060
DOI: https://doi.org/10.26483/ijarcs.v3i2.1061

Take Care: A Study on Usability Evaluation Methods for Children

Mohammadi Akheela Khanum, Munesh Chandra Trivedi

101-105

DOI: https://doi.org/10.26483/ijarcs.v3i2.1062
DOI: https://doi.org/10.26483/ijarcs.v3i2.1039
DOI: https://doi.org/10.26483/ijarcs.v3i2.1063
DOI: https://doi.org/10.26483/ijarcs.v3i2.1064

Optimized Clustering Algorithm for Content-Based Image Retrieval

Dr. A.V. Senthil Kumar, Dr. Ibrahiem El Emary,J.Sivakami, Dr.Adnan Alrabea

121-124

DOI: https://doi.org/10.26483/ijarcs.v3i2.1065
DOI: https://doi.org/10.26483/ijarcs.v3i2.1066
DOI: https://doi.org/10.26483/ijarcs.v3i2.1067
DOI: https://doi.org/10.26483/ijarcs.v3i2.1035
DOI: https://doi.org/10.26483/ijarcs.v3i2.1038
DOI: https://doi.org/10.26483/ijarcs.v3i2.1068
DOI: https://doi.org/10.26483/ijarcs.v3i2.1040
DOI: https://doi.org/10.26483/ijarcs.v3i2.1053
DOI: https://doi.org/10.26483/ijarcs.v3i2.1055

Edge Detection using Mathematical Morphology for Gridding of Microarray Image

J. Harikiran, Raghu Andey, K.Nanditha Krishna, Dr. ReddiKiranKumar

172-175

DOI: https://doi.org/10.26483/ijarcs.v3i2.1069
DOI: https://doi.org/10.26483/ijarcs.v3i2.1070
DOI: https://doi.org/10.26483/ijarcs.v3i2.1071
DOI: https://doi.org/10.26483/ijarcs.v3i2.1072
DOI: https://doi.org/10.26483/ijarcs.v3i2.1073
DOI: https://doi.org/10.26483/ijarcs.v3i2.1054
DOI: https://doi.org/10.26483/ijarcs.v3i2.1074

Maintainability Measurement in Object Oriented Paradigm

Yajnaseni Dash, Sanjay Kumar Dubey, Ajay Rana

207-213

DOI: https://doi.org/10.26483/ijarcs.v3i2.1048
DOI: https://doi.org/10.26483/ijarcs.v3i2.1045
DOI: https://doi.org/10.26483/ijarcs.v3i2.1075
DOI: https://doi.org/10.26483/ijarcs.v3i2.1089
DOI: https://doi.org/10.26483/ijarcs.v3i2.1076
DOI: https://doi.org/10.26483/ijarcs.v3i2.1051
DOI: https://doi.org/10.26483/ijarcs.v3i2.1077
DOI: https://doi.org/10.26483/ijarcs.v3i2.1050
DOI: https://doi.org/10.26483/ijarcs.v3i2.1084

Energy consumption in cloud computing and power management

Prasanta Kumar Panda, Shrabanee swagatika

249-252

DOI: https://doi.org/10.26483/ijarcs.v3i2.1044
DOI: https://doi.org/10.26483/ijarcs.v3i2.1043
DOI: https://doi.org/10.26483/ijarcs.v3i2.1078
DOI: https://doi.org/10.26483/ijarcs.v3i2.1079

Imperfect Information Game – A Review

M Dharmalingam, Dr E Chandra

266-271

DOI: https://doi.org/10.26483/ijarcs.v3i2.1080
DOI: https://doi.org/10.26483/ijarcs.v3i2.1042
DOI: https://doi.org/10.26483/ijarcs.v3i2.1081

Emerging Trends in Data Mining for Intrusion Detection

Alok Ranjan, Dr. Ravindra S. Hegadi, Prasanna Kumara

279-281

DOI: https://doi.org/10.26483/ijarcs.v3i2.1082
DOI: https://doi.org/10.26483/ijarcs.v3i2.1041
DOI: https://doi.org/10.26483/ijarcs.v3i2.1083

A Modified MD5 Algorithm for Wireless Networks

Nagarajan S, Dr. A.K. Santra

292-297

DOI: https://doi.org/10.26483/ijarcs.v3i2.1090
DOI: https://doi.org/10.26483/ijarcs.v3i2.1085

Stable And Energy Efficient Routing For Mobile Ad-Hoc Networks Using Backbone Nodes

MahendraKumar S, Senthil Prakash K,Chandrasekaran V, Dr.R.Sasikala

303-308

DOI: https://doi.org/10.26483/ijarcs.v3i2.1036

Fault Diagnosis In Vlsi Chips Using Different Strategies

Divya Sharma, Dr B. K. Kaushik, Dr R. P. Agarwal

309-312

DOI: https://doi.org/10.26483/ijarcs.v3i2.1086

Hyper spectral Image Segmentation Using the Concept of Data Stuctures

Aditya P .Bakshi, Prof. Vijaya K. Shandilya

313-316

DOI: https://doi.org/10.26483/ijarcs.v3i2.1052

Snort, BRO, NetSTAT, Emerald and SAX2 : A Comparison

Suchita Patil, Pallavi S.Kulkarni,Pradnya B. Rane, Dr.B.B.Meshram

317-323

DOI: https://doi.org/10.26483/ijarcs.v3i2.1037

Multiple Ontology Reasoning over Location Services by Enabling Semantics

Ms. Akansha A. Totewar, Dr. Prashant N. Chatur, Mr. Amit Meena

324-329

DOI: https://doi.org/10.26483/ijarcs.v3i2.1092
DOI: https://doi.org/10.26483/ijarcs.v3i2.1087

Security in All-Optical Network using Artificial Neural Network

Inadyuti Dutt, Soumya Paul, Dipayan Bandyopadyay

333-338

DOI: https://doi.org/10.26483/ijarcs.v3i2.1093

Modeling a Distributed Database System for Voters Registration in Nigeria

Olabode Olatubosun, Iwasokun Gabriel Babatunde, Akingbesote Alaba

339-346

DOI: https://doi.org/10.26483/ijarcs.v3i2.1094

Enhancing Image Fusion – Pseudo Colour Multi-Scale Approach

Ranganatha K, Sathisha M S,Suresha D, Alok Ranjan

347-354

DOI: https://doi.org/10.26483/ijarcs.v3i2.1088
DOI: https://doi.org/10.26483/ijarcs.v3i2.1095

Enhanced Switching Median Filter For Denoising Ultrasound

J. Alavandan, Lt.Dr.S.Santhosh Baboo

363-367

DOI: https://doi.org/10.26483/ijarcs.v3i2.1096
DOI: https://doi.org/10.26483/ijarcs.v3i2.1097

Crawling the website deeply: Deep Page crawling

Pooja Tevatia, Vinit Kumar Gunjan, Dr Allam Appa Rao

372-377

DOI: https://doi.org/10.26483/ijarcs.v3i2.1046