Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
International Journal of Advanced Research in Computer Science
Current
Archives
Author Guideline
Editorial board
Announcements
About
About the Journal
Submissions
Contact
Search
Home
Archives
Vol. 4 No. 3 (2013): SPECIAL ISSUE, MARCH 2013
DOI:
https://doi.org/10.26483/ijarcs.v4i3
Published:
2017-01-13
Articles
Cloud-Based Storage for Education
Sushma Satpute, Dr. Bharat Singh Deora
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1528
Collaborative Model of SCM in Scrum
Ritu Sharma, Shilpi Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1529
Scenario dependent analysis of wireless networks for QOS metrics
Parul Khurana, Inderdeep Aulakh
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1530
Value of Cloud Based Computing
Shiksha Kanwar, Shailendra Singh Tanwar, Jhalak Modi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1531
Comparison of different Radio Propagation Models with and without Black Hole Attack on AODV routing protocol in MANET
Abhinav Mehta, Rohit Jain, Vinay Somani
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1532
Data Mining Based Predictions for Employees Skill Enhancement Using Pro- Skill-Improvement Program and Performance Using Classifier Scheme Algorithm
Akhilesh k. Sharma, Dr. Kamaljit Lakhtaria, Santosh Vishwakarma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1533
Hardware Based Prevention of Phishing Attack
Amit Solanki, S.R.Dogiwal, Jitendra Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1534
To Enhance Video Communication over Wireless Adhoc Network
Amit Kumar Sanghi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1535
Generate classifier for Genetic Programming of Multicategory Pattern Classification Using Multiclass Microarray Datasets
Anwar Mohd Mansuri, Deepali Kelkar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1536
Software Change Validation before Change Implementation
Aprna Tripathi, Dharmendra Singh Kushwaha, Arun Kumar Misra
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1537
Analysis of Impacted Classes and Regression Test Suite Generation
Aprna Tripathi, Dharmendra Singh Kushwaha, Arun Kumar Misra
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1538
Extended Realization of Associative Property for Data Mining using Apriori Optimization Technique for Frequency Pattern Generation
Arpita Lodha, Charu Kavadia
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1539
Business Intelligence Solutions at Selected Branches of Banks in Rajasthan
Dr. Azimuddin Khan
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1540
A Review on Spatial & Transform Domain Digital Watermarking Techniques
Charu Kavadia, Arpita Lodha
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1541
Geolocation Events Based Auto Theme Changer for Browsers
Vinay Gentyala, Pranav Nerurkar, Nazneen Ansari
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1542
Mathematical Analysis of Problem Statements: Artificial Intelligence
Devanshu Paliwal, Dipesh Vaya, Sarika Khandelwal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1543
Random Frequency Transmission (RFT): A Confidential Data Transmission Approach
Dipesh Vaya, Devanshu Paliwal, Sarika Khandelwal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1544
Reduction of Negative Rules in Association Rule Mining Using Distance Security and Genetic Algorithm
Girish Kumar Ameta
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1545
Impact of Traffic Pattern on Performance of Adhoc Routing Protocols in VANET for Varying Mobility
Vijay Shankar Sharma, Nemi Chand Barwar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1546
Seamless Inter-System handover between WiMax-3G using MIH
Haidarali K Ansari, Dr. Nilesh K Modi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1547
Shoulder Shuffling Free Graphical Locker for Android Graphical Pattern Lock with Text Support for Android Devices
Prof. V.J. Kadam, Taj Mohammad A. Raheman,SushantB. Patil, Ajinkya Ajagekar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1548
Performance Evaluation of AODV and AOMDV Routing Protocols in MANET
Ms. V. A. Parekh, Dr. K. H. Wandra
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1549
Wireless Sensors Network Based Safe Home to Care Elderly People: A Realistic Approach
Harish Dadhich, Aarti Choudhary
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1550
Enhancement of Fake Website Detection Techniques Using Feature Selection and Filtering Algorithms
Hetal Rahul Rajpura, Hiteishi Diwanji
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1551
Learner Motivation and E-Learning: Fabricating and Analysing Graphs through JGraphEd Tool
Jitendra Sharma, Shubhra Saxena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1552
A Case Study: Code Befuddlement Proficiencies for Assisting Software Enigmas
Jitendra Sharma, Amit Solanki, Karishma Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1553
Modified ElGamal over RSA Digital Signature Algorithm (MERDSA)
Kapil Madhur, Ruchi Patira
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1554
DICOM Image Compression using Huffman Coding Technique with Vector Quantization
Kavinder Kavinder, Vinay Chopra, Harsimranjeet Kaur
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1555
A Trust Based Job Scheduling Algorithm in Grid Network
Kiran Rayapu, Shakti Mishra
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1556
Designing of low power high speed 32-bit barrel shifter for ARM7 Processor
Latif khan
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1557
Fuzzy Neural Networks in Vertical Handover Technology for Next Generation In Wireless Networks
Lekhraj Mehra, Mukesh Kumar Gupta, Ridhima Khamesra
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1558
Case Study of Virtualization in Existing System
Lovely Soni, Suneet Chaudhary, Shailendra Singh Tanwar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1559
A Study on Key Management Issues in Wireless Sensor Network
Madhumathi Rajesh
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1560
Genetic Algorithm for optimization using MATLAB
Mr. Manish Saraswat, Mr. Ajay Kumar Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1561
Cloud Computing: A Journey towards its Security Issues
Manisha Raj, Prof. Shiv Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1562
A Survey of Wireless Sensor Network Hardware Platforms and Simulation Tools
Manoj Kuri, Virendra Choudhary, Prof. K.R Chowdhary
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1563
Simulation and Comparison of Ad-Hoc Routing Protocols in Multiple Source- Destination Pairs Using NS2
Meena Kushwaha, Siddlingappagouda C Biradar, Tejpal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1564
Resource Discovery and Resourse Management in Grid Computing : A Survey
Naazish Rahim, Nikita Sharma,Sudha Tiwari, Ashik Hussain, Nirmala Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1565
Case study: Wireless Sensor Networks Technology
Naveen Jain, Pawan Shakdwipee, Sunil Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1567
Efficient Ways to Make Biometrics System More Effective
Er.Neeraj Jindal, Er.Sona Aggarwal, Er.Shweta Lakhara
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1568
Evaluation of Conventional Network and Neural Network Techniques For Image Enhancement Parameters
Nikita Jain, Mahesh Kumar Joshi, Yash Nahar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1569
Reconfigurable Antenna (Circular Micro strip Patch Antenna) Using Varactor Diodes
Pawan Pujari, Kirti Vyas, Bhoopendra Kumar Sharma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1570
Dynamic Spectrum Access in Cognitive Radio Using Markovian Queuing Model
Pinki Yadav, Partha Pratim Bhattacharya
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1571
Privacy Preserving Keyword Search for Encrypted Cloud Storage Data
Ms. Pooja D. Shah, Mr. Gopal Pandey
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1572
Review of Data storage by Fusion Drive in MAC
Pranav Nerurkar, Vinay Gentyala
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1573
4G Wireless Networks: Opportunities and Challenges
Dr. N.K. Joshi, Dr. Bharat Sing Deora
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1574
Privacy Preserving Data Mining through New Proposed “Two Phase SVD Matrix Factorization Modelâ€
Priyank Jain, Bhupesh Gour, Asif Ullah Khan
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1575
Multiple Packet System: A Security Approach for Wireless Networks
Richa Jani, Shuchi Jani, Madhuri agrawal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1576
Performance Evaluation of Proactive Multipath Routing Protocols in MANET under varying Nodes & Maximum Speed
Rohit Jain, Abhinav Mehta,Vinay Somani, Ashish Parikh
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1577
Performance Evaluation of Proactive Multipath Routing Protocols in MANET by varying Maximum connection, Traffic load & Maximum Speed
Rohit Jain, Abhinav Mehta, Vinay Somani
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1578
Geo Location Big Data Based Collaborative Crowd Sourced Data Mining Architecture for Environmental Monitoring and Vegetation Management Systems
Samrat P. Patel, Sumeet S. Deshmukh, Anil R Rajbhar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1579
Minutia based Verification Technique for Fingerprint – A Evaluation Text
Shaleen Bhatnagar, Neha Jain, Ruchi Vyas
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1580
A Reconsideration of schemes for Fingerprint Identification
Shaleen Bhatnagar, Sarika Khandelwal, Neha Jain
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1581
Performance Analysis of Wireless Sensor Networks Using Compass and Nearest with Forward Progress Algorithms
Shivanka Shivanka, Karan Naveen,Ashwani Kumar, Gourav Chadha, Esha Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1582
Security Systems: A concept through Encrypting File System
Shruti Jain, Chintal Kumar Patel
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1583
Jobshop Scheduling Domain Through Cuckoo Search
Sneha A. Gaywala, Dr. Dharm Singh, Chirag Suryakant Thaker
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1584
Comparative Study of Various Approaches for Human Identification and Gait Recognition
Ms.Snehal Kathale, Mrs.Veena Gulhane
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1585
Optimal Value of Superscalar Factor in Superscalar Pipelined Processor Architecture
Suresh Kumar Jha, Deepak Jangid, Rajesh Purohit
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1586
Adaptive Resonance Theory - Counter Propagation Neural Network for Iris Matching under Artifacts
Swati Pandey, Rajeev Gupta
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1587
Comparative study of Cryptography Algorithms
Manisha Vishwakarma
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1588
A Brief Review on Routing in Wireless Sensor Networks
Manish Tiwari, Partha Pratim Bhattacharya, Alok Kole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1589
Enhanced RSA Digital Signature Algorithm
Ashish Vijay, Priyanka Trikha, Ashik Hussain
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1590
WiMAX for e-Janraj
Ridhima Jain, Manish Tiwari,Tarun Shrimali, Partha Pratim Bhattacharya
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i3.1591