DOI: https://doi.org/10.26483/ijarcs.v3i4

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v3i4.1290
DOI: https://doi.org/10.26483/ijarcs.v3i4.1263
DOI: https://doi.org/10.26483/ijarcs.v3i4.1286
DOI: https://doi.org/10.26483/ijarcs.v3i4.1256
DOI: https://doi.org/10.26483/ijarcs.v3i4.1280
DOI: https://doi.org/10.26483/ijarcs.v3i4.1291
DOI: https://doi.org/10.26483/ijarcs.v3i4.1292
DOI: https://doi.org/10.26483/ijarcs.v3i4.1293

QoE Based Modeling and Analysis of 3D Audio Teleconferencing Service

Mansoor Hyder, Akhtar Ali Jalbani,Gordhan Das Menghwar, Khalil ur Rehman Laghari

45-50

DOI: https://doi.org/10.26483/ijarcs.v3i4.1294
DOI: https://doi.org/10.26483/ijarcs.v3i4.1295

Performance of OFDM with I/Q Imbalance and Phase Noise

Md. Kislu Noman, Md. Ibrahim Abdullah, Md. Aktaruzzaman

58-62

DOI: https://doi.org/10.26483/ijarcs.v3i4.1296
DOI: https://doi.org/10.26483/ijarcs.v3i4.1257
DOI: https://doi.org/10.26483/ijarcs.v3i4.1272
DOI: https://doi.org/10.26483/ijarcs.v3i4.1270

Semantic Stability: A Missing Link between Cognition and Behavior

Mahmudul Hasan, Md. Rokunuzzaman, Barun Kumar Das, Asma-Ul-Husna, Md. Abdul Kader

78-83

DOI: https://doi.org/10.26483/ijarcs.v3i4.1297
DOI: https://doi.org/10.26483/ijarcs.v3i4.1298
DOI: https://doi.org/10.26483/ijarcs.v3i4.1299

Analyzing the Modern Tool-Supported UML-Based Static Reverse Engineering

J.M.S.V.Ravi Kumar, I. Rajendra Kumar , Dr.M.Babu Reddy, L.Narendra

94-102

DOI: https://doi.org/10.26483/ijarcs.v3i4.1288
DOI: https://doi.org/10.26483/ijarcs.v3i4.1300

Implementation of Protected Routing to Defend Byzantine Attacks for MANET’s

Sathisha M S, Suresha D,Alok Ranjan, Prasanna Kumara

109-114

DOI: https://doi.org/10.26483/ijarcs.v3i4.1259
DOI: https://doi.org/10.26483/ijarcs.v3i4.1284
DOI: https://doi.org/10.26483/ijarcs.v3i4.1301
DOI: https://doi.org/10.26483/ijarcs.v3i4.1283
DOI: https://doi.org/10.26483/ijarcs.v3i4.1261
DOI: https://doi.org/10.26483/ijarcs.v3i4.1281

An Efficient Two Way Authentication Technique for the Protection of Personal Computer System

Mr. Ronak Jain, Mr. Simarjeet Singh Bhatia, Prof. Dinesh Chandra Jain

149-151

DOI: https://doi.org/10.26483/ijarcs.v3i4.1302
DOI: https://doi.org/10.26483/ijarcs.v3i4.1285
DOI: https://doi.org/10.26483/ijarcs.v3i4.1262
DOI: https://doi.org/10.26483/ijarcs.v3i4.1303

Towards Building a Secure Cloud Computing Environment

Kuyoro Shade O, Omotunde Ayokunle A.,Ajaegbu Chigozirim, Ibikunle Frank A

166-171

DOI: https://doi.org/10.26483/ijarcs.v3i4.1304
DOI: https://doi.org/10.26483/ijarcs.v3i4.1305
DOI: https://doi.org/10.26483/ijarcs.v3i4.1265

Algorithms for Preparing Queries in Fuzzy Object-Oriented Database

DatabaseMaryam kavoosi Balootaki, Mashaala Abasi Dezfuli,Ali Haroonabadi, Hassan Kavoosi Balootaki

184-190

DOI: https://doi.org/10.26483/ijarcs.v3i4.1306
DOI: https://doi.org/10.26483/ijarcs.v3i4.1266

A Survey on Clustering Algorithms in MANET using Spanning Tree

Ravikumar H. Roogi, Dr. H. B. Walikar, Shreedevi V.Shindhe

198-203

DOI: https://doi.org/10.26483/ijarcs.v3i4.1268

Quantitative Bio-Medical Data Analysis and Visualization Using Data Mining and Text Mining Approaches

V.V.Jaya Rama Krishnaiah, Dr. K.Ramchand H Rao, Prof. K. Mrithyunjaya Rao

204-208

DOI: https://doi.org/10.26483/ijarcs.v3i4.1269
DOI: https://doi.org/10.26483/ijarcs.v3i4.1307
DOI: https://doi.org/10.26483/ijarcs.v3i4.1308

An Approach to Measure the Quality of Software using Lightweight Processes

N. Veeranjaneyulu, B. Jyostna Devi, Dr. O. Nagaraju

222-227

DOI: https://doi.org/10.26483/ijarcs.v3i4.1309

Reduction of Noise from Speech Signal using Wavelet Thresholding

Deepak Sethi, MohiT Bansal,Ashok Saini, Navneet Verma

228-235

DOI: https://doi.org/10.26483/ijarcs.v3i4.1310
DOI: https://doi.org/10.26483/ijarcs.v3i4.1327

QuicX: A light weight protocol for effective communication in Linux Clusters

Pushpendra Gupta, Ankit Agarwal, Vivekanand Adam

243-246

DOI: https://doi.org/10.26483/ijarcs.v3i4.1282
DOI: https://doi.org/10.26483/ijarcs.v3i4.1274

An Optimized Multiplier Using Reversible Logic Gates

H.R. Bhagyalakshmi, M.K. Venkatesha

251-257

DOI: https://doi.org/10.26483/ijarcs.v3i4.1328
DOI: https://doi.org/10.26483/ijarcs.v3i4.1258
DOI: https://doi.org/10.26483/ijarcs.v3i4.1329
DOI: https://doi.org/10.26483/ijarcs.v3i4.1289
DOI: https://doi.org/10.26483/ijarcs.v3i4.1264
DOI: https://doi.org/10.26483/ijarcs.v3i4.1267
DOI: https://doi.org/10.26483/ijarcs.v3i4.1276

Wireless Internet Access Use by Staff and Students at the Kwara State Polytechnic, Ilorin-Nigeria

Raji, Ayodele Kamaldeen, Oyedepo, Femi Samson, Abdulrahman, Tosho Abdullahi.

279-283

DOI: https://doi.org/10.26483/ijarcs.v3i4.1278
DOI: https://doi.org/10.26483/ijarcs.v3i4.1330
DOI: https://doi.org/10.26483/ijarcs.v3i4.1331
DOI: https://doi.org/10.26483/ijarcs.v3i4.1271
DOI: https://doi.org/10.26483/ijarcs.v3i4.1277
DOI: https://doi.org/10.26483/ijarcs.v3i4.1332

Modified Linear Vector Quantization Technique for Classification of Heart Disease Data

Deepak Kumar Acharya, H.S.Behera, Subhransu Shekhar Panda

315-319

DOI: https://doi.org/10.26483/ijarcs.v3i4.1273
DOI: https://doi.org/10.26483/ijarcs.v3i4.1333
DOI: https://doi.org/10.26483/ijarcs.v3i4.1275
DOI: https://doi.org/10.26483/ijarcs.v3i4.1337

Matrix based Efficient Apriori Algorithm

Miss. Nutan Dhange, Prof. Sheetal Dhande

341-343

DOI: https://doi.org/10.26483/ijarcs.v3i4.1336

“Square Graphs†an Algorithmic Approach

Shreedevi V. Shindhe, H. B. Walikar,Ishwar Baidari, Ravikumar H. Roogi

344-347

DOI: https://doi.org/10.26483/ijarcs.v3i4.1279

Ontology based Data Mining Approach – A Survey

S.Antoinette Aroul Jeyanthi, Dr.Latha Parthiban

348-351

DOI: https://doi.org/10.26483/ijarcs.v3i4.1287
DOI: https://doi.org/10.26483/ijarcs.v3i4.1260
DOI: https://doi.org/10.26483/ijarcs.v3i4.1334
DOI: https://doi.org/10.26483/ijarcs.v3i4.1335