DOI: https://doi.org/10.26483/ijarcs.v4i8

Published: 2017-01-13

Security Enhancement For Reliable Computing In Cloud

K. Subala, Akshaya.V,Vignesh.R.C, Jhansi Lakshmi.D.V, M.Infanto hearty Shamirna

6-9

Agent Vs Object with an in-depth insight to Multi-Agent Systems

Mohamed Osama Khozium, Adnan Ghazi Abuarafah, Hussam Aleem Mohammed

10-17

A Formalism for Checking Consistency of Component-Based Real-Time Systems

Sina Zangbari Kouhi, Dr. Jaber Karimpour, Faranak Nejati

31-38

Virtual-IP Routing Architecture Using OpenFlow

Abhinandan Goti, Annapurna Patil

39-45

Benchmarking Parallel Natural Algorithms for Telecommunications Devices Design

Carlos Henrique da Silva-Santos, Hugo Enrique Hernández-Figueroa

69-74

A New Type Of Node Split Rule For Decision Tree Learning

C. Sudarsana Reddy, Dr. V. Vasu, B. Kumara Swamy Achari

75-80

Mapping of BASEL III and COBIT 5 framework in Banking Sector of India: A Futuristic Approach

Deepti Kushwaha, Ashwini Vasant Gadankush, Dr. Shanktanu Das

81-85

Optimization of Collection Tree Protocol

Harleen Kaur, Prof. Gaurang Raval

92-95

Towards Virtualization in Cloud Computing

Mohammad Masdari, Behnam Zebardast, Yaghoub Lotfi

96-101

A Design of Information Extraction System

J. Pavithra, R.Monisa, G.Ramya,

109-111

Whistleblower’s Protection Act 2011, India: A Critical Analysis

Trishna Chaturvedi, Dr. V.K. Chaurasiya,Nandita Singh, Priyanka Dwivedi

136-141

Web Application Vulnerabilities Monitoring & Avoiding Techniques

Neeraj Sharma, Mohammad Arshad, Anurag Jain

142-145

Emulation of Snort on Deter Testbed

Luvpreet Kaur, Monika Saluj, Krishan Saluja

186-191

Smile detection : A simple Approach

Praveen N, Pavithra K,Manjula, Archana Yashodhar

211-214

A survey of Image Processing and Analysis in Distributed Environment

Pavithra K, Praveen N, Manjula K, Archana Yashodhar

220-222

Sustainable E-Education Through Mobile Enabled Technology

Mrs. Swarnangini Sinha, Ms. Megha Jain, Ms.Surbhi Birani

257-260

Implementation of K-Means Clustering and Fuzzy C-Means Algorithm for Brain Tumor Segmentation

Ms Mrinalini Shringirishi, Mrs. Pritee Gupta,Jitendra Gupta, Mr. Deepak Bhattnagar

261-264

Secure Agent Base Data Transmission in MANET

J. K. Mandal, Khondekar Lutful Hassan

238-241

Image Based Authentication Using Steganography Technique

Satish Kumar Sonker, Sanjeev Kumar,Amit Kumar, Dr. Pragya Singh

277-282

Opinion Mining Task and Techniques: A Survey

Harpreet Kaur, Priya Priya

283-287

Security Analysis Challenges for Future Generation Networks

Sumanth C M, A.Rohini, Avidaasa H C, Sukshma

295-302

An improved Bayesian filtering technique for spam recognition

Ainam Jean- Paul, Adekunle Y.A, Adio A.K

306-310

Semantic Approach for Query Explication

Shruti Gupta, Mahesh Verma

311-314

Blind and Non- blind Image Restoration Techniques

Arshwinder Kaur, Deepankar Verma

315-317

Memory Reclamation by Garbage Collectors: SPECjvm 2008

Nitan S. Kotwal, Shubhnandan S. Jamwal

333-337

Improving Efficiency of MANET by Reducing Queuing Delay Using Hybrid Algorithm

Madhup Shrivastava, Monika Sahu, Sonika Matele, Dr. M. A. Rizvi

338-344