DOI: https://doi.org/10.26483/ijarcs.v2i1

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v2i1.248
DOI: https://doi.org/10.26483/ijarcs.v2i1.260
DOI: https://doi.org/10.26483/ijarcs.v2i1.242
DOI: https://doi.org/10.26483/ijarcs.v2i1.252
DOI: https://doi.org/10.26483/ijarcs.v2i1.247
DOI: https://doi.org/10.26483/ijarcs.v2i1.249
DOI: https://doi.org/10.26483/ijarcs.v2i1.245

New Dynamic Routing Protocol for Wireless Adhoc Network

Pankaj Sharma, Nikhil Patearia, Anil Rai

40-45

DOI: https://doi.org/10.26483/ijarcs.v2i1.258
DOI: https://doi.org/10.26483/ijarcs.v2i1.237

NTRU Digital Signature Scheme - A Matrix Approach

Rakesh Nayak, Dr. Jayaram Pradhan, C.V.Sastry

49-52

DOI: https://doi.org/10.26483/ijarcs.v2i1.255

Development of Distributed Monitoring Framework

Harikesh Singh, Dr. Shishir Kumar

53-61

DOI: https://doi.org/10.26483/ijarcs.v2i1.243

Formal Specification of Control Software Systems using Behavioral Views

Ayaz Isazadeh, Jaber Karimpour, Habib Izadkhah

62-67

DOI: https://doi.org/10.26483/ijarcs.v2i1.246
DOI: https://doi.org/10.26483/ijarcs.v2i1.244
DOI: https://doi.org/10.26483/ijarcs.v2i1.279
DOI: https://doi.org/10.26483/ijarcs.v2i1.253
DOI: https://doi.org/10.26483/ijarcs.v2i1.264
DOI: https://doi.org/10.26483/ijarcs.v2i1.266

A Comparative Overview of Software Reliability Growth Models

Razeef Mohd, S. M. K Quadri, Nesar Ahmad

99-105

DOI: https://doi.org/10.26483/ijarcs.v2i1.256

A Load Balancing Technique for Wireless LANs

K. Vaitheki, S.Bala Baskar

106-110

DOI: https://doi.org/10.26483/ijarcs.v2i1.261

A Survey on Text Mining in Clustering

S. Logeswari, K.Premalatha D.Sasikala

111-116

DOI: https://doi.org/10.26483/ijarcs.v2i1.274
DOI: https://doi.org/10.26483/ijarcs.v2i1.262
DOI: https://doi.org/10.26483/ijarcs.v2i1.357
DOI: https://doi.org/10.26483/ijarcs.v2i1.284
DOI: https://doi.org/10.26483/ijarcs.v2i1.268
DOI: https://doi.org/10.26483/ijarcs.v2i1.269
DOI: https://doi.org/10.26483/ijarcs.v2i1.319
DOI: https://doi.org/10.26483/ijarcs.v2i1.320

A Modern Hill Cipher Involving XOR Operation and a Permuted Key

V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar

153-155

DOI: https://doi.org/10.26483/ijarcs.v2i1.271
DOI: https://doi.org/10.26483/ijarcs.v2i1.240
DOI: https://doi.org/10.26483/ijarcs.v2i1.250
DOI: https://doi.org/10.26483/ijarcs.v2i1.270

New Fingerprint Based Authentication Scheme

Vedpal Singh, Anu Kundu,Maheep Singh, Joginder Singh Chauhan

166-167

DOI: https://doi.org/10.26483/ijarcs.v2i1.257

IP Mobile Multicast: Challenges, Solutions and Open Issues

Prof. Jayant N. Patil, Dr. Sagar Jambhorkar

168-176

DOI: https://doi.org/10.26483/ijarcs.v2i1.238
DOI: https://doi.org/10.26483/ijarcs.v2i1.330

Computational Study of Thermal Wave Propagation in Human Skin During Plasmolysis of Water

Muhammad Shahid, Norah Bidin,Yacoob Mat Daud, M.Inayat Ullah,Muhammad Talha

181-185

DOI: https://doi.org/10.26483/ijarcs.v2i1.254
DOI: https://doi.org/10.26483/ijarcs.v2i1.259
DOI: https://doi.org/10.26483/ijarcs.v2i1.263

RF mixer design for 10.5 GHz, using 0.18μm CMOS technology

Ms. Archana O. Vyas, Ms. Ujwala A. Belorkar

198-202

DOI: https://doi.org/10.26483/ijarcs.v2i1.273
DOI: https://doi.org/10.26483/ijarcs.v2i1.267

A Small Vocabulary Speech Recognition for Gujarati

Mr. Himanshu N Patel, Dr. P.V. Virparia

208-210

DOI: https://doi.org/10.26483/ijarcs.v2i1.272

An Improved Playfair Cipher Cryptographic Substitution Algorithm

Ravindra Babu Kallam, Dr.A. Vinaya Babu,Sikharam Swetha, Dr. S. Udaya Kumar

211-214

DOI: https://doi.org/10.26483/ijarcs.v2i1.314

Customer Satisfaction within an Organization driven Aspect Oriented Business Component Model

Atouba Christian Lopez, Atsa Etoundi Roger, Fouda Ndjodo Marcel

215-225

DOI: https://doi.org/10.26483/ijarcs.v2i1.280
DOI: https://doi.org/10.26483/ijarcs.v2i1.285
DOI: https://doi.org/10.26483/ijarcs.v2i1.287
DOI: https://doi.org/10.26483/ijarcs.v2i1.290

Digital Technique in Predicting Femoral Stem Size for Total Hip Replacement

Azrulhizam Shapi’i, Riza Sulaiman,Mohammad Khatim Hasan, Abdul Yazid Mohd Kassim,

246-251

DOI: https://doi.org/10.26483/ijarcs.v2i1.313
DOI: https://doi.org/10.26483/ijarcs.v2i1.293
DOI: https://doi.org/10.26483/ijarcs.v2i1.294

Spectrum Management for Cognitive Radio based on Genetics Algorithm

Santosh Kumar Singh, Gajendra Singh,Vibhakar Pathak, Dr. Krishna Chandra Roy

262-266

DOI: https://doi.org/10.26483/ijarcs.v2i1.295

Autonomic Intrusion Response System

G. Yamini, S.Siva Sathya,T.Chithralekha, R.Geetharamani

267-273

DOI: https://doi.org/10.26483/ijarcs.v2i1.298
DOI: https://doi.org/10.26483/ijarcs.v2i1.299
DOI: https://doi.org/10.26483/ijarcs.v2i1.300
DOI: https://doi.org/10.26483/ijarcs.v2i1.301

K-Means Clustering and Wavelet Based Image Compression

T. Kathirvalavakumar, E. Ponmalar

288-293

DOI: https://doi.org/10.26483/ijarcs.v2i1.304

Interoperable Bioinformatics Web services a Review

P.M.Durai Raj Vincent, E. Sathiyamoorthy

294-297

DOI: https://doi.org/10.26483/ijarcs.v2i1.317

Text-To-Speech Synthesis System for Kannada Language

D.J. Ravi, Sudarshan Patil Kulkarni

298-304

DOI: https://doi.org/10.26483/ijarcs.v2i1.321
DOI: https://doi.org/10.26483/ijarcs.v2i1.326

A Novel Approach for Branch Prediction using SVM

Asis Kumar Tripathy, Pradipta Mishra

310-313

DOI: https://doi.org/10.26483/ijarcs.v2i1.327
DOI: https://doi.org/10.26483/ijarcs.v2i1.328

Efficient Secure Authentication Policies using Biometrics

Vedpal Singh, Ajay Jangra,Priyanka, Anu Kundu

319-325

DOI: https://doi.org/10.26483/ijarcs.v2i1.329

An Efficient Detection Technique for Optimization of Network Traffic

Rajesh Kumar Ahirwar, Rakesh Kumar Vishwakarma, Sachin Sohra

326-330

DOI: https://doi.org/10.26483/ijarcs.v2i1.331
DOI: https://doi.org/10.26483/ijarcs.v2i1.332
DOI: https://doi.org/10.26483/ijarcs.v2i1.276

Development of Performance MIS

Dhawal Seth, Mr. L. Ramanathan, Abhishek Pandey

342-344

DOI: https://doi.org/10.26483/ijarcs.v2i1.312
DOI: https://doi.org/10.26483/ijarcs.v2i1.281
DOI: https://doi.org/10.26483/ijarcs.v2i1.241

The Service Plan for Qos Mangment with The Help of Mobile Middleware and Video Sterming.

Gaurav Agarwal, Supriya Agarwal,Mayank Kumar, Saurabh Singh

356-359

DOI: https://doi.org/10.26483/ijarcs.v2i1.251
DOI: https://doi.org/10.26483/ijarcs.v2i1.265

A Method for Separating Region of InterestIn Digital Mammograms

Sara Dehghani, Mashallah Abbasi Dezfooli, Amir Masoud Rahmani

366-369

DOI: https://doi.org/10.26483/ijarcs.v2i1.275

Amelioration of the HAD Metamodel for the Modelling of Complex Hybrid Systems

Marcellin Nkenlifack, Emmanuel Tanyi, Fabrice Fokou

370-380

DOI: https://doi.org/10.26483/ijarcs.v2i1.282
DOI: https://doi.org/10.26483/ijarcs.v2i1.288
DOI: https://doi.org/10.26483/ijarcs.v2i1.289
DOI: https://doi.org/10.26483/ijarcs.v2i1.291

A New Protocol for Power Saving in Mobile Ad Hoc Networks

V. Ramesh, N.Koteswar Rao,B.Mohan, Dr.P.Subbaiah

397-404

DOI: https://doi.org/10.26483/ijarcs.v2i1.292
DOI: https://doi.org/10.26483/ijarcs.v2i1.296

A Novel Classification Method Aided SAW

Mansour Ahmadi, Emad Roghanian,Azadeh Bazleh, Peyman Gholami

410-413

DOI: https://doi.org/10.26483/ijarcs.v2i1.297
DOI: https://doi.org/10.26483/ijarcs.v2i1.302
DOI: https://doi.org/10.26483/ijarcs.v2i1.303
DOI: https://doi.org/10.26483/ijarcs.v2i1.305
DOI: https://doi.org/10.26483/ijarcs.v2i1.307
DOI: https://doi.org/10.26483/ijarcs.v2i1.308

A Computerized Behavioral Study of Series Energy Controller for Energy Flow Control

Neetu Mittal, Abhijit Kulshrestha,Rachana Gupta, Vijay Kumar Tayal,

437-441

DOI: https://doi.org/10.26483/ijarcs.v2i1.324
DOI: https://doi.org/10.26483/ijarcs.v2i1.309

Performance Comparison of ordinary AODV and Energy Efficient AODV

V. Ramesh, N. Koteswar Rao,P.Praveen Kumar, S.Penchal Rao,B.Mohan

447-452

DOI: https://doi.org/10.26483/ijarcs.v2i1.311
DOI: https://doi.org/10.26483/ijarcs.v2i1.315
DOI: https://doi.org/10.26483/ijarcs.v2i1.316

Comparative Analysis of Different Data Clustering Algorithms Based On Swarm Intelligence

Miss. Shweta K. Yewale, Mr. Pankaj K. Bharne, V. S. Gulhane

465-469

DOI: https://doi.org/10.26483/ijarcs.v2i1.322
DOI: https://doi.org/10.26483/ijarcs.v2i1.323
DOI: https://doi.org/10.26483/ijarcs.v2i1.325
DOI: https://doi.org/10.26483/ijarcs.v2i1.278
DOI: https://doi.org/10.26483/ijarcs.v2i1.333
DOI: https://doi.org/10.26483/ijarcs.v2i1.335

On the Oscillation of a Class of Second Order Nonlinear Neutral Delay Difference Equations

A.George Maria Selvam, S. Lourdu Marian, M. Reni Sagaya Raj

500-504

DOI: https://doi.org/10.26483/ijarcs.v2i1.336

User Interface Design Framework for Digital Libraries

Hanumat G. Sastry, Manjunath. G,Venkatadri. M, Dr. Lokanatha C. Reddy

505-508

DOI: https://doi.org/10.26483/ijarcs.v2i1.337
DOI: https://doi.org/10.26483/ijarcs.v2i1.338

Performance Analysis of MFCC & DTW for Isolated Arabic Digit

Santosh Gaikwad, Bhart Gawali, Pravin Yannawar

513-518

DOI: https://doi.org/10.26483/ijarcs.v2i1.339
DOI: https://doi.org/10.26483/ijarcs.v2i1.340
DOI: https://doi.org/10.26483/ijarcs.v2i1.334
DOI: https://doi.org/10.26483/ijarcs.v2i1.341

Detached Rule Scheduling In Active Database System

Prof H.R. Vyawahare, Prof S.R. Gupta

537-541

DOI: https://doi.org/10.26483/ijarcs.v2i1.342
DOI: https://doi.org/10.26483/ijarcs.v2i1.354
DOI: https://doi.org/10.26483/ijarcs.v2i1.343
DOI: https://doi.org/10.26483/ijarcs.v2i1.344
DOI: https://doi.org/10.26483/ijarcs.v2i1.345
DOI: https://doi.org/10.26483/ijarcs.v2i1.346
DOI: https://doi.org/10.26483/ijarcs.v2i1.347

Comparative study on the Mining Iceberg Cubes Algorithms

Sheelesh Kumar Sharma, Dr. Pankaj Nagar, Dr. V.P. Gupta

578-581

DOI: https://doi.org/10.26483/ijarcs.v2i1.348
DOI: https://doi.org/10.26483/ijarcs.v2i1.349
DOI: https://doi.org/10.26483/ijarcs.v2i1.355
DOI: https://doi.org/10.26483/ijarcs.v2i1.350
DOI: https://doi.org/10.26483/ijarcs.v2i1.351
DOI: https://doi.org/10.26483/ijarcs.v2i1.353
DOI: https://doi.org/10.26483/ijarcs.v2i1.283

A High Security Approach For Image Steganography By Rapid Information Retrieval

Khosravi, Sara, Abbasi Dezfouli, Mashallah, Yektaie, Mohammad Hossein

621-627

DOI: https://doi.org/10.26483/ijarcs.v2i1.310
DOI: https://doi.org/10.26483/ijarcs.v2i1.277

Improved -Modulo Multiplier in Residue Number System

Seyyed Mohammad Safi, Hadi Toofani,Mahdi Mahmoodi, Misagh Mohammadizadeh

631-633

DOI: https://doi.org/10.26483/ijarcs.v2i1.239
DOI: https://doi.org/10.26483/ijarcs.v2i1.286

Secure and Authenticated Visual Content Transmission with Codebase Cryptosystem

Deo Brat Ojha, Ajay Sharma,Bhupendra Kumar, Abhishek Dwivedi,Amit Kumar

643-645

DOI: https://doi.org/10.26483/ijarcs.v2i1.352
DOI: https://doi.org/10.26483/ijarcs.v2i1.318