DOI: https://doi.org/10.26483/ijarcs.v4i2

Published: 2017-01-13

A New Boosting Multi-class SVM Algorithm

Fereshteh Falah Chamasemani, Yashwant Prasad Singh

1-6

DOI: https://doi.org/10.26483/ijarcs.v4i2.1486
DOI: https://doi.org/10.26483/ijarcs.v4i2.1500

Usability Assessment of Open source application

Syed mehr Ali Shah, Muhammad Faheem Qureshi, Gharib Ismail Gharib Al-Matroushi

13-19

DOI: https://doi.org/10.26483/ijarcs.v4i2.1501

User-Level Process Migration Mechanism

Dr. Narayan A. Joshi, Dr. D. B. Choksi

20-23

DOI: https://doi.org/10.26483/ijarcs.v4i2.1502
DOI: https://doi.org/10.26483/ijarcs.v4i2.1483

Text Document Featured Clustering and Classification using Fuzzy Logic

Ms. S. Nalini, Mrs. S. Selvakanmani, Mrs. A. V. Kalpana

31-34

DOI: https://doi.org/10.26483/ijarcs.v4i2.1503
DOI: https://doi.org/10.26483/ijarcs.v4i2.1504
DOI: https://doi.org/10.26483/ijarcs.v4i2.1505
DOI: https://doi.org/10.26483/ijarcs.v4i2.1506
DOI: https://doi.org/10.26483/ijarcs.v4i2.1507

Multi Criteria Trust Model in Grid Computing Systems

Neda Azari Khosroshahi, Ahmad Habibizad Navin, Ali Asgar Pourhaji Kazem

55-59

DOI: https://doi.org/10.26483/ijarcs.v4i2.1508
DOI: https://doi.org/10.26483/ijarcs.v4i2.1509

Developing Digital Library: A Model for Kwara State Polytechnic Digital Library

Raji, Ayodele Kamaldeen, Agboola, Oladiran Matins,Abiodun, Emmanu Abdulrahman, Tosho Abdullahi

65-69

DOI: https://doi.org/10.26483/ijarcs.v4i2.1469

Medical Image Compression using Modified Curvelet Transform

Saravanan. S, D.Sujitha Juliet, K. Shiby Angel

70-74

DOI: https://doi.org/10.26483/ijarcs.v4i2.1510
DOI: https://doi.org/10.26483/ijarcs.v4i2.1477

Proxy Server Experiment and the Behavior of the Web

Mr.S.V. Gumaste, Dr. V. M. Thakare,Dr. M. U. Kharat, Aditya Patki

84-87

DOI: https://doi.org/10.26483/ijarcs.v4i2.1471
DOI: https://doi.org/10.26483/ijarcs.v4i2.1511
DOI: https://doi.org/10.26483/ijarcs.v4i2.1475

Population Projection Using Geometric Growth Model

Adeoye. Akeem. O, Babalola J. B.

99-100

DOI: https://doi.org/10.26483/ijarcs.v4i2.1512

Fuzzy Approach for Intrusion Detection System: A Survey

Partha Sarathi Bhattacharjee, Dr. (Mrs.) Shahin Ara Begum

101-107

DOI: https://doi.org/10.26483/ijarcs.v4i2.1513
DOI: https://doi.org/10.26483/ijarcs.v4i2.1472
DOI: https://doi.org/10.26483/ijarcs.v4i2.1473
DOI: https://doi.org/10.26483/ijarcs.v4i2.1474

Protected Multi-tiered Sensor Network Uses Spatiotemporal Feature

M. Adimoolam, K. Hemachandran, R. Prasanth, N. Prabavathi, Melbin T. Mathew

124-127

DOI: https://doi.org/10.26483/ijarcs.v4i2.1514

A Countermeasure Technique for Email Spoofing

Manish Kumar, Dr. M. Hanumanthappa, Dr. T.V. Suresh Kumar

128-133

DOI: https://doi.org/10.26483/ijarcs.v4i2.1515

A Review: Image Segmentation using Active Contours

Sheenam Adhlakha, Arvind Selwal

134-138

DOI: https://doi.org/10.26483/ijarcs.v4i2.1484
DOI: https://doi.org/10.26483/ijarcs.v4i2.1499
DOI: https://doi.org/10.26483/ijarcs.v4i2.1516
DOI: https://doi.org/10.26483/ijarcs.v4i2.1517
DOI: https://doi.org/10.26483/ijarcs.v4i2.1468
DOI: https://doi.org/10.26483/ijarcs.v4i2.1485
DOI: https://doi.org/10.26483/ijarcs.v4i2.1489

Indirect Anaphora Resolution using Parallel Queues

Lokesh Kumar Sharma, Dr. Ela Kumar

162-165

DOI: https://doi.org/10.26483/ijarcs.v4i2.1498
DOI: https://doi.org/10.26483/ijarcs.v4i2.1495
DOI: https://doi.org/10.26483/ijarcs.v4i2.1518
DOI: https://doi.org/10.26483/ijarcs.v4i2.1487
DOI: https://doi.org/10.26483/ijarcs.v4i2.1519
DOI: https://doi.org/10.26483/ijarcs.v4i2.1520
DOI: https://doi.org/10.26483/ijarcs.v4i2.1521
DOI: https://doi.org/10.26483/ijarcs.v4i2.1478
DOI: https://doi.org/10.26483/ijarcs.v4i2.1497
DOI: https://doi.org/10.26483/ijarcs.v4i2.1490

Android and Web Application for Attendance and Notification Management of Academic Institution

Sharwari Chandrashekhar, Vidya Ramesh Patil,U. M. Kalshetti, Varsha Vasant Sasane

213-215

DOI: https://doi.org/10.26483/ijarcs.v4i2.1522

Bayes Classification for the Fingerprint Retrieval

Leelambika. K.V, A.Rohini, M.Queen Mary Vidya

216-220

DOI: https://doi.org/10.26483/ijarcs.v4i2.1523
DOI: https://doi.org/10.26483/ijarcs.v4i2.1480
DOI: https://doi.org/10.26483/ijarcs.v4i2.1482
DOI: https://doi.org/10.26483/ijarcs.v4i2.1524
DOI: https://doi.org/10.26483/ijarcs.v4i2.1492
DOI: https://doi.org/10.26483/ijarcs.v4i2.1493
DOI: https://doi.org/10.26483/ijarcs.v4i2.6016

Privacy in Bluetooth using Cryptographic Technique

Rajapraveen. K.N, Dr.N.K.Prasanna Kumari

287-289

DOI: https://doi.org/10.26483/ijarcs.v4i2.1470
DOI: https://doi.org/10.26483/ijarcs.v4i2.1525
DOI: https://doi.org/10.26483/ijarcs.v4i2.1526

An Efficient RSA Based Key Authenticated Prime Fibonacci Cryptosystem

Archana Raghuvamshi, Prof.P.Premchand, Radhika Sivalenka

300-304

DOI: https://doi.org/10.26483/ijarcs.v4i2.1476
DOI: https://doi.org/10.26483/ijarcs.v4i2.1496

An Image Encryption Algorithm based on 3D Lorenz map

Mrs. A.Anto Steffi, Mr. Dipesh Sharma

312-316

DOI: https://doi.org/10.26483/ijarcs.v4i2.1494

An Android Application for Bluetooth Multicasting in a Piconet

Neha Billimoria, Supriya Pethkar, Vedashree Takalkar, Prof. S. A. Mahajan

317-319

DOI: https://doi.org/10.26483/ijarcs.v4i2.1491

Application of Datamining Technique in Social Networking Sites: Facebook as a Case

Karuna C. Gull, Dr. Santosh kumar Gandhi, Santoshkumar B. Shali

320-326

DOI: https://doi.org/10.26483/ijarcs.v4i2.1479
DOI: https://doi.org/10.26483/ijarcs.v4i2.1527
DOI: https://doi.org/10.26483/ijarcs.v4i2.6017
DOI: https://doi.org/10.26483/ijarcs.v4i2.1488