DOI: https://doi.org/10.26483/ijarcs.v3i3

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v3i3.1182

MASP A Model for Business Processes Analysis and Specification

Ghenima Sini, Catherine Comparot, Malik SI-Mohammed

7-12

DOI: https://doi.org/10.26483/ijarcs.v3i3.1183
DOI: https://doi.org/10.26483/ijarcs.v3i3.1111
DOI: https://doi.org/10.26483/ijarcs.v3i3.1105

Benchmarking of High Performance Cluster Reynolds

Sandip Sarkar, Raghavendra Krishnamurthy, Satish Kumar Ajmani

21-32

DOI: https://doi.org/10.26483/ijarcs.v3i3.1180
DOI: https://doi.org/10.26483/ijarcs.v3i3.1184
DOI: https://doi.org/10.26483/ijarcs.v3i3.1119
DOI: https://doi.org/10.26483/ijarcs.v3i3.1130
DOI: https://doi.org/10.26483/ijarcs.v3i3.1185
DOI: https://doi.org/10.26483/ijarcs.v3i3.1098

A Hybrid Technique for Quality of Service Evaluation of Cellular Wireless Networks

Apkar Salatian, Gregory Onoh, Eke James, NetworksLawrence Oborkhale

62-67

DOI: https://doi.org/10.26483/ijarcs.v3i3.1186
DOI: https://doi.org/10.26483/ijarcs.v3i3.1187
DOI: https://doi.org/10.26483/ijarcs.v3i3.1181
DOI: https://doi.org/10.26483/ijarcs.v3i3.1100
DOI: https://doi.org/10.26483/ijarcs.v3i3.1101

Impact of Mobile Internet among Nau Students

Uduiguomen U. C, V.E. Ejiofor,Njoku C.A, Alika G.V.

93-95

DOI: https://doi.org/10.26483/ijarcs.v3i3.1143
DOI: https://doi.org/10.26483/ijarcs.v3i3.1145
DOI: https://doi.org/10.26483/ijarcs.v3i3.1136

Optimal Search Mechanism using Backtracking in Cloud Environment

K. Govinda, Gurunathaprasad V, SathishKumar H

107-110

DOI: https://doi.org/10.26483/ijarcs.v3i3.1188

Rethinking of Computing Curricula in Higher Education in Pakistan

Dr. Muhammad Anwar- ur-Rehman Pasha, Dr. Shaheen Pasha,

111-115

DOI: https://doi.org/10.26483/ijarcs.v3i3.1189
DOI: https://doi.org/10.26483/ijarcs.v3i3.1191
DOI: https://doi.org/10.26483/ijarcs.v3i3.1192
DOI: https://doi.org/10.26483/ijarcs.v3i3.1103

Operational Risk Evaluating and Modeling for E-Banking

M. Pirouz, M. Salahi,M. Mahdavi, R. Ebrahimi Atani

136-139

DOI: https://doi.org/10.26483/ijarcs.v3i3.1215
DOI: https://doi.org/10.26483/ijarcs.v3i3.1193
DOI: https://doi.org/10.26483/ijarcs.v3i3.1209

Development of SIP UDP Transport Process under Linux Environment

K. Venkateswarlu, Swarnalatha.P, L. Ramanathan, D. Ganesh Gopal

153-162

DOI: https://doi.org/10.26483/ijarcs.v3i3.1194

Wireless Information Access System for Registered Vehicles Using SMS

Okeke, Moses I, Inyiama, H. C.,Okoye Christian. o, Ejiofor V. E

163-167

DOI: https://doi.org/10.26483/ijarcs.v3i3.1207

TR-069 Protocol Stack Development

Swarnalatha. P, Galla Sobha, M.Anbarasi

168-171

DOI: https://doi.org/10.26483/ijarcs.v3i3.1104
DOI: https://doi.org/10.26483/ijarcs.v3i3.1115
DOI: https://doi.org/10.26483/ijarcs.v3i3.1208
DOI: https://doi.org/10.26483/ijarcs.v3i3.1112
DOI: https://doi.org/10.26483/ijarcs.v3i3.1108

Development of Virtual Experiment on Rectifier Circuits

Pradeep B. Dahikar, Bhaskar Y. Kathane

197-200

DOI: https://doi.org/10.26483/ijarcs.v3i3.1110
DOI: https://doi.org/10.26483/ijarcs.v3i3.1134
DOI: https://doi.org/10.26483/ijarcs.v3i3.1118
DOI: https://doi.org/10.26483/ijarcs.v3i3.6049

Analysis of Clinical Databases Using Data Mining Techniques

L. Jagjeevan Rao, N. V. S. Pavan Kumar, M.Srinivas

214-216

DOI: https://doi.org/10.26483/ijarcs.v3i3.1135
DOI: https://doi.org/10.26483/ijarcs.v3i3.1114

A New approach for fingerprint recognition using Earth Mover’s Distance

B.K. Tripathy, P.V.S.S.R.Chandramouli, Bimalendu Ranajit

223-227

DOI: https://doi.org/10.26483/ijarcs.v3i3.1121
DOI: https://doi.org/10.26483/ijarcs.v3i3.1122
DOI: https://doi.org/10.26483/ijarcs.v3i3.1124
DOI: https://doi.org/10.26483/ijarcs.v3i3.1126

Non Contact Human Computer Interaction Using Eye Blinks

Ms. S. Vijiyalakshmi, R.K.Jananee, N.Karthiga Dr. S. Sivasathya

249-252

DOI: https://doi.org/10.26483/ijarcs.v3i3.1102
DOI: https://doi.org/10.26483/ijarcs.v3i3.1125
DOI: https://doi.org/10.26483/ijarcs.v3i3.1127

Architecture of X-Band Data Product Generator

Saurabh Kumar, Rajendran S., Abhishek Kumar

262-265

DOI: https://doi.org/10.26483/ijarcs.v3i3.1128
DOI: https://doi.org/10.26483/ijarcs.v3i3.1123
DOI: https://doi.org/10.26483/ijarcs.v3i3.1117

Ranking Spatial Data using Quality Preferences

Murali Krishna M, Ramesh Naidu G

276-279

DOI: https://doi.org/10.26483/ijarcs.v3i3.1116
DOI: https://doi.org/10.26483/ijarcs.v3i3.1106

An Approach to Analysis Software Reusability

Ashish Agrawal, Sachin Patel

286-290

DOI: https://doi.org/10.26483/ijarcs.v3i3.1107
DOI: https://doi.org/10.26483/ijarcs.v3i3.1142
DOI: https://doi.org/10.26483/ijarcs.v3i3.1113
DOI: https://doi.org/10.26483/ijarcs.v3i3.1129
DOI: https://doi.org/10.26483/ijarcs.v3i3.1133

Security in Location Based Services: A Survey

Gaurav Gupta, Deepika Goel Gupta

311-315

DOI: https://doi.org/10.26483/ijarcs.v3i3.1137
DOI: https://doi.org/10.26483/ijarcs.v3i3.6050

Trajectory Clustering Approaches for Location Aware Services

Lokesh Kumar Sharma, Sanjiv Kumar Shukla, Sourabh Rungta

323-327

DOI: https://doi.org/10.26483/ijarcs.v3i3.1139

An Overview of Fuzzy Query Processing

Garima Singh, Awadhesh Kumar Sharma

328-330

DOI: https://doi.org/10.26483/ijarcs.v3i3.1179
DOI: https://doi.org/10.26483/ijarcs.v3i3.1167
DOI: https://doi.org/10.26483/ijarcs.v3i3.1195
DOI: https://doi.org/10.26483/ijarcs.v3i3.6051

An Efficient Design Framework for Building Alerting Systems to Make Regular tags Intelligent

Dr JKR Sastry, N. Venkataram,Dr. LSS Reddy, T Sri Lakshmi,K. Sreenivasa Ravi

345-348

DOI: https://doi.org/10.26483/ijarcs.v3i3.1138
DOI: https://doi.org/10.26483/ijarcs.v3i3.1141
DOI: https://doi.org/10.26483/ijarcs.v3i3.1155
DOI: https://doi.org/10.26483/ijarcs.v3i3.1165
DOI: https://doi.org/10.26483/ijarcs.v3i3.1176
DOI: https://doi.org/10.26483/ijarcs.v3i3.1196
DOI: https://doi.org/10.26483/ijarcs.v3i3.6055
DOI: https://doi.org/10.26483/ijarcs.v3i3.6056
DOI: https://doi.org/10.26483/ijarcs.v3i3.1197
DOI: https://doi.org/10.26483/ijarcs.v3i3.1168
DOI: https://doi.org/10.26483/ijarcs.v3i3.1198
DOI: https://doi.org/10.26483/ijarcs.v3i3.1199
DOI: https://doi.org/10.26483/ijarcs.v3i3.1200
DOI: https://doi.org/10.26483/ijarcs.v3i3.1148
DOI: https://doi.org/10.26483/ijarcs.v3i3.1149

Comparative Study of Spell Checking Algorithms and Tools

Khyati Shah, Mayuri Patel,Jikitsha Sheth, Dr. kalpesh Lad

421-426

DOI: https://doi.org/10.26483/ijarcs.v3i3.1201
DOI: https://doi.org/10.26483/ijarcs.v3i3.1164

Analysis of Conflict DoS Attacks Process and Counter Measure on SIP Based VoIP Network

Md. Ruhul Islam, Dr.Smarajit Ghosh, Nausrat Jahan Ahmed

433-437

DOI: https://doi.org/10.26483/ijarcs.v3i3.1213

Frequency Based Structural Analysis for Document Plagiarism

Santosh Kumar Gupta, Anurag Rai, Pranav Singh

438-444

DOI: https://doi.org/10.26483/ijarcs.v3i3.1170

An adaptive QOS-aware Routing in MANETs

R. Madhanmohan, Dr.K. Selvakumar

445-449

DOI: https://doi.org/10.26483/ijarcs.v3i3.1202

Heart Rate Determination with RR Interval and PP Interval Time Series

Sahil Verma, Ramesh Kumar Sunkaria, Barjinder Singh Saini

450-455

DOI: https://doi.org/10.26483/ijarcs.v3i3.1146

Evolution of Object Oriented Analysis & Design in Software Engineering

Amit Kumar Shrivastava, Sanjiv Kumar Shriwastava, Rohit Sharma

456-463

DOI: https://doi.org/10.26483/ijarcs.v3i3.1147

Image Reconstruction Algorithm Using R-Tree Approach and Delaunay Triangulation

Rohit Sharma, Sanjiv Kumar Shriwastava, Amit Kumar Shrivastava

464-468

DOI: https://doi.org/10.26483/ijarcs.v3i3.1150
DOI: https://doi.org/10.26483/ijarcs.v3i3.1151
DOI: https://doi.org/10.26483/ijarcs.v3i3.1153
DOI: https://doi.org/10.26483/ijarcs.v3i3.1178
DOI: https://doi.org/10.26483/ijarcs.v3i3.1203

Certificate Revocation in Mobile Ad Hoc Networks with a Threshold value

CH.Rathan Kumar, K. Sunil kumar, S. Sateesh Reddy

488-492

DOI: https://doi.org/10.26483/ijarcs.v3i3.1154
DOI: https://doi.org/10.26483/ijarcs.v3i3.1156
DOI: https://doi.org/10.26483/ijarcs.v3i3.1157
DOI: https://doi.org/10.26483/ijarcs.v3i3.1161

BUID: A Virtual Agent to Become Robust Integrated Core Financial System

Vaibhav R. Bhedi, Ujwal A. Lanjewar, Shrinivas P. Deshpande

512-515

DOI: https://doi.org/10.26483/ijarcs.v3i3.1175

XML Data Mining using XQuery and Improved Apriori Algorithm

Tabassum N. Mujawar, Subhash K.Shinde, Varunakshi Bhojane

516-521

DOI: https://doi.org/10.26483/ijarcs.v3i3.1162

Frequent Pattern Mining Based On Clustering and Association Rule Algorithm

Kavita M. Gawande, Mr. Subhash K.Shinde, Mrs .Dipti Patil

522-527

DOI: https://doi.org/10.26483/ijarcs.v3i3.1174
DOI: https://doi.org/10.26483/ijarcs.v3i3.1163
DOI: https://doi.org/10.26483/ijarcs.v3i3.1173
DOI: https://doi.org/10.26483/ijarcs.v3i3.1204
DOI: https://doi.org/10.26483/ijarcs.v3i3.1131
DOI: https://doi.org/10.26483/ijarcs.v3i3.1205
DOI: https://doi.org/10.26483/ijarcs.v3i3.1166

Shape Based Features Extracted Using Wavelet Decomposition and Morphological Operators

Padmashree D. Desai, Jagadeesh Pujari, Nagaratna Yaligar

556-561

DOI: https://doi.org/10.26483/ijarcs.v3i3.1206

A Study and Comparison of Methods for Fuzzy Data Equivalence

Ankita Srivastava, Awadhesh Kumar Sharma

562-565

DOI: https://doi.org/10.26483/ijarcs.v3i3.1172
DOI: https://doi.org/10.26483/ijarcs.v3i3.1169
DOI: https://doi.org/10.26483/ijarcs.v3i3.1210
DOI: https://doi.org/10.26483/ijarcs.v3i3.1099
DOI: https://doi.org/10.26483/ijarcs.v3i3.1211

Syslog a Promising Solution to Log Management

P. K. Sahoo, Dr. R. K. Chottray,Dr. Gunamani Jena, Dr. S. Pattnaiak

584-588

DOI: https://doi.org/10.26483/ijarcs.v3i3.1212
DOI: https://doi.org/10.26483/ijarcs.v3i3.1109
DOI: https://doi.org/10.26483/ijarcs.v3i3.6065
DOI: https://doi.org/10.26483/ijarcs.v3i3.1120
DOI: https://doi.org/10.26483/ijarcs.v3i3.1132

Group of Continuous Time Recurrent Neural Networks

Neeraj Sahu, Poonam Sinha, A.K. Verma

622-625

DOI: https://doi.org/10.26483/ijarcs.v3i3.1140
DOI: https://doi.org/10.26483/ijarcs.v3i3.6066
DOI: https://doi.org/10.26483/ijarcs.v3i3.1144

An Alternative approach to Temporary Memory Management in Databases using Object Oriented Systems

Sunil Kr Pandey, Dr. Sanjiv Kumar Shriwastava, Amit Kumar Shrivastava

647-654

DOI: https://doi.org/10.26483/ijarcs.v3i3.1152
DOI: https://doi.org/10.26483/ijarcs.v3i3.1158
DOI: https://doi.org/10.26483/ijarcs.v3i3.6064
DOI: https://doi.org/10.26483/ijarcs.v3i3.1177

A Comprehensive Study on Cross Layer Design and its Future

Prabhat Singh, Vinay Kumar,Akhilesh Kumar, Awadhesh Kumar

669-674

DOI: https://doi.org/10.26483/ijarcs.v3i3.1159
DOI: https://doi.org/10.26483/ijarcs.v3i3.1171
DOI: https://doi.org/10.26483/ijarcs.v3i3.1160
DOI: https://doi.org/10.26483/ijarcs.v3i3.1214