DOI: https://doi.org/10.26483/ijarcs.v1i4

Published: 2017-01-13

Attacks on Computer Network and Corresponding Security Measures

Gajanan D. Kurundkar, Quadri M.N., Dr.Santosh D. Khamitkar

32-34

Handoff Implementation through WAP

Prof. Jayant N. Patil, Dr. Sagar Jambhorkar

35-37

A Comparative Study using Wavelet and SVM for Devanagri Characters Recognition

Anil Kumar N. Holambe, Dr.Ravinder C. Thool,Sushil Kumar N.Hola Ganesh K. Pakle

69-73

Image Encryption using the Standard Hill Cipher

Gaurav Agarwal, Saurabh Singh, Meeta Chaudhary

74-76

Protocal Usage Model & An Architecture Design for Bluetooth – A Short Range Transaction System

Virparia Paresh V, Kamani Krunalkumar C,Kathiriya Dhaval, Ghodasara Yogesh

87-92

Haptic Technology: An Evolution towards Naturality in Communication

Mudit Ratana Bhalla, Harsh Vardhan Bhalla, Anand Vardhan Bhalla

97-103

The Next Generation Computing Brainwave-Quantum Computing

T. Venkat Narayana Rao, Shirish Pathania

113-119

Advanced Hill Cipher Involving Permutation and Iteration

V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar

141-145

A Survey on DoS Attacks and Countermeasures in Mobile Ad Hoc Networks

M. Gunasekaran, K. Premalatha, B. Gopalakrishnan

156-164

Advanced Hill Cipher Handling the Entire Plaintext as a Single Block

V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar

180-184

Fuzzy Clustering in Web Content Mining

Mr.Ranjit R. Keole, Dr. G.R. Bamnote

189-193

Distributed Learning Predictors through Web Log Mining using Bayesian Networks

Dr (Mrs) Sujni Paul, Mr. Suresh, Mrs.Beulah Christalin Latha

194-198

Semantic Web–A Conceptual Model for Heterogeneous Ontology Environment

Vasavi Bande, Keerthi Manchikanti, M.V.N Bhargava

199-206

Some Advantages on Monte Carlo Integration using Variance Reduction Procedures

Behrouz Fathi Vajargah, Farshid Mehrdoust,Ahmad Pourdarvish, Forough Norouzi Saziroud

220-224

Clustering Techniques in Web Content Mining

Mr.Ranjit R. Keole, Dr.G.R. Bamnote

225-228

Remote Desktop Access using Mobile Phones and an Enhancement for Intra-Mobile Search

Dr.N.Ch.S.N. Iyengar, R.Padma Priya,Vijayasherly, H.Mohamed Ameer Irshad

229-232

A Modus to Secure Data with Authentication & Integrity using EHDES

Ramveer Singh, Sanjive Tyagi,Ajay Agarwal, Deo Brat Ojha,

233-236

Experimenting Oriya Text Chunking with Divide-Conquer Strategy

Rakesh Chandra Balabantaray, Manoj kumar Jena

256-260

Secured Authentication for Online Banking using Mobile Phones

Prof. S Sumathy, R Hemalatha, V Jayashree

264-268

Robust Application with RoR

Prof. P. Karthikeyan, Rama Pandian M

283-286

Nailing Network Partition in Ad Hoc Network

S. Vijayalakshmi, S. Albert Rabara

287-291

Working of Web Services using SOA

Mrs. Aarti M. Karande, Prof. Vaibhav N. Chunekar, Dr. B.B. Meshram

292-296

Web Effort and Defect Prediction using Bayseian Model

Nandakumar .P, Magesh, Anitha Kumari.A

308-314

E-Learning for Simulating the Web Server Functionality

S. Arulselvarani, Dr. E. Kirubakaran

360-364

Automation of Attendance Posting System Using Messaging Services

Prof.P. Kalyanaraman, Kappagantula Aditya

365-369

IP MASQUERADING: A Network Address Translation Technique

Chiranji Lal Chowdhary, Prashant P.J.

396-407

Dynamic Routing of Data with Secure Cryptographic Techniques

V. Soumya, S. Durgaprasad,Ma.Jabbar, T. Nagalakshmi

414-419

Enhancement of Aodv Protocol Performance by reducing the delay

R. Thandeeswaran, Vinithra J, N Hima Bindu

425-430

Secure E-Alliance Model for E-Communication

Deo Brat Ojha, Meenu Sahni, Abhishek Shukla

440-443

The Extended Security in Mobile Ad-hoc Network with Modified PKI

Er.Harjivan Singh Brar, Er. Mandeep Singh Sandhu

489-492

Undesired Sidetracking in Virtual Classroom Systems

Mrs.Rachana S. Jaiswal, Prof. A. S. Alvi

514-517

Adaptive SLA enforcement for SOA Applications Using a Middleware

Prof. P. Karthikeyan, Moorthy, S.Senthil Ganesh

526-529

An Anti-Spoofing Method:Reducing Router Memory

Er.Divyendu Kumar Mishra, Kulvinder Singh Handa

555-563

TCP-LP: Low-Priority Service via End-Point Congestion Control

P. Swarnalatha, H. Parveen Sultana, M. Pounambal

47-52