DOI: https://doi.org/10.26483/ijarcs.v4i9

Published: 2017-01-13

Energy Consumption in Peer-Assisted CDN

Mohamad Dikshie Fauzie, Achmad Husni Thamrin, Jun Murai

1-9

DOI: https://doi.org/10.26483/ijarcs.v4i9.1851
DOI: https://doi.org/10.26483/ijarcs.v4i9.1837
DOI: https://doi.org/10.26483/ijarcs.v4i9.1843
DOI: https://doi.org/10.26483/ijarcs.v4i9.6027
DOI: https://doi.org/10.26483/ijarcs.v4i9.1842
DOI: https://doi.org/10.26483/ijarcs.v4i9.1856

Detecting Botnets in View of an Efficient Method

Narges Arastouie, Naeemeh Arastooie

40-46

DOI: https://doi.org/10.26483/ijarcs.v4i9.1857
DOI: https://doi.org/10.26483/ijarcs.v4i9.1858
DOI: https://doi.org/10.26483/ijarcs.v4i9.1859
DOI: https://doi.org/10.26483/ijarcs.v4i9.1860
DOI: https://doi.org/10.26483/ijarcs.v4i9.1861
DOI: https://doi.org/10.26483/ijarcs.v4i9.1862
DOI: https://doi.org/10.26483/ijarcs.v4i9.1855

A Survey on Preprocessing in Text Mining

Dr. Anadakumar. K, Ms. Padmavathy. V

79-91

DOI: https://doi.org/10.26483/ijarcs.v4i9.1832
DOI: https://doi.org/10.26483/ijarcs.v4i9.1905

A Survey of Routing Protocols for Opportunistic Mobile Adhoc Networks

Er.Maggi Goyal, Er.Manoj Chaudhary, Er.Abhishek Bharti

96-99

DOI: https://doi.org/10.26483/ijarcs.v4i9.1906
DOI: https://doi.org/10.26483/ijarcs.v4i9.1825

A Review on Detection of Session Hijacking and Ip Spoofing

Abhishek Kumar Bharti, Maggi Goyal, Manoj Chaudhary

104-107

DOI: https://doi.org/10.26483/ijarcs.v4i9.1828
DOI: https://doi.org/10.26483/ijarcs.v4i9.1826

Image Retrieval Comparisons Using Color Models

E. Sirisha, B.Uma Shravani, J.Kanaka Priya

115-118

DOI: https://doi.org/10.26483/ijarcs.v4i9.1833
DOI: https://doi.org/10.26483/ijarcs.v4i9.1831
DOI: https://doi.org/10.26483/ijarcs.v4i9.1829
DOI: https://doi.org/10.26483/ijarcs.v4i9.1838

Deployment models of Cloud Computing: Challenges

M. Srilakshmi, CH. Lakshmi Veenadhari, I.Kali Pradeep

135-138

DOI: https://doi.org/10.26483/ijarcs.v4i9.1834

Support Vector Machines for Odiya Handwritten Numeral Recognition

Rasmi Ranjan Das, Swati Sucharita Das, Shom Prasad Das

139-143

DOI: https://doi.org/10.26483/ijarcs.v4i9.1835
DOI: https://doi.org/10.26483/ijarcs.v4i9.1853
DOI: https://doi.org/10.26483/ijarcs.v4i9.1844
DOI: https://doi.org/10.26483/ijarcs.v4i9.1845
DOI: https://doi.org/10.26483/ijarcs.v4i9.1848

Classification of Epileptic EEG Using Wavelet Transform & Artificial Neural Network

Ashish Raj, Manoj Kumar Bandil,D B V Singh, Dr. A.K Wadhwani

165-170

DOI: https://doi.org/10.26483/ijarcs.v4i9.1830
DOI: https://doi.org/10.26483/ijarcs.v4i9.1836
DOI: https://doi.org/10.26483/ijarcs.v4i9.1839

Approximate Nearest Neighbour Using Data Mining

Deepika Verma, Namita Kakkar

178-180

DOI: https://doi.org/10.26483/ijarcs.v4i9.1840
DOI: https://doi.org/10.26483/ijarcs.v4i9.1907
DOI: https://doi.org/10.26483/ijarcs.v4i9.1847
DOI: https://doi.org/10.26483/ijarcs.v4i9.1849

An Efficient and Secure Searching Model for Outsourced Cloud Data

Shynu P.G, Meena Jose, Merris Mary Chacko

198-204

DOI: https://doi.org/10.26483/ijarcs.v4i9.1908
DOI: https://doi.org/10.26483/ijarcs.v4i9.1909
DOI: https://doi.org/10.26483/ijarcs.v4i9.1910

An Affix Based Word Classification Method of Assamese Text

Bhairab Sarma, Bipul Shyam Purkayastha

213-216

DOI: https://doi.org/10.26483/ijarcs.v4i9.1824

Assessment of Data Warehouse Model Quality

Hunny Gaur, Rakhee, Rakhee

217-221

DOI: https://doi.org/10.26483/ijarcs.v4i9.1854
DOI: https://doi.org/10.26483/ijarcs.v4i9.1841
DOI: https://doi.org/10.26483/ijarcs.v4i9.1846
DOI: https://doi.org/10.26483/ijarcs.v4i9.1850
DOI: https://doi.org/10.26483/ijarcs.v4i9.1852
DOI: https://doi.org/10.26483/ijarcs.v4i9.1911