DOI: https://doi.org/10.26483/ijarcs.v2i1

Published: 2017-01-13

New Dynamic Routing Protocol for Wireless Adhoc Network

Pankaj Sharma, Nikhil Patearia, Anil Rai

40-45

NTRU Digital Signature Scheme - A Matrix Approach

Rakesh Nayak, Dr. Jayaram Pradhan, C.V.Sastry

49-52

Development of Distributed Monitoring Framework

Harikesh Singh, Dr. Shishir Kumar

53-61

Formal Specification of Control Software Systems using Behavioral Views

Ayaz Isazadeh, Jaber Karimpour, Habib Izadkhah

62-67

A Comparative Overview of Software Reliability Growth Models

Razeef Mohd, S. M. K Quadri, Nesar Ahmad

99-105

A Load Balancing Technique for Wireless LANs

K. Vaitheki, S.Bala Baskar

106-110

A Survey on Text Mining in Clustering

S. Logeswari, K.Premalatha D.Sasikala

111-116

A Modern Hill Cipher Involving XOR Operation and a Permuted Key

V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar

153-155

New Fingerprint Based Authentication Scheme

Vedpal Singh, Anu Kundu,Maheep Singh, Joginder Singh Chauhan

166-167

IP Mobile Multicast: Challenges, Solutions and Open Issues

Prof. Jayant N. Patil, Dr. Sagar Jambhorkar

168-176

Computational Study of Thermal Wave Propagation in Human Skin During Plasmolysis of Water

Muhammad Shahid, Norah Bidin,Yacoob Mat Daud, M.Inayat Ullah,Muhammad Talha

181-185

RF mixer design for 10.5 GHz, using 0.18μm CMOS technology

Ms. Archana O. Vyas, Ms. Ujwala A. Belorkar

198-202

A Small Vocabulary Speech Recognition for Gujarati

Mr. Himanshu N Patel, Dr. P.V. Virparia

208-210

An Improved Playfair Cipher Cryptographic Substitution Algorithm

Ravindra Babu Kallam, Dr.A. Vinaya Babu,Sikharam Swetha, Dr. S. Udaya Kumar

211-214

Customer Satisfaction within an Organization driven Aspect Oriented Business Component Model

Atouba Christian Lopez, Atsa Etoundi Roger, Fouda Ndjodo Marcel

215-225

Digital Technique in Predicting Femoral Stem Size for Total Hip Replacement

Azrulhizam Shapi’i, Riza Sulaiman,Mohammad Khatim Hasan, Abdul Yazid Mohd Kassim,

246-251

Spectrum Management for Cognitive Radio based on Genetics Algorithm

Santosh Kumar Singh, Gajendra Singh,Vibhakar Pathak, Dr. Krishna Chandra Roy

262-266

Autonomic Intrusion Response System

G. Yamini, S.Siva Sathya,T.Chithralekha, R.Geetharamani

267-273

K-Means Clustering and Wavelet Based Image Compression

T. Kathirvalavakumar, E. Ponmalar

288-293

Interoperable Bioinformatics Web services a Review

P.M.Durai Raj Vincent, E. Sathiyamoorthy

294-297

Text-To-Speech Synthesis System for Kannada Language

D.J. Ravi, Sudarshan Patil Kulkarni

298-304

A Novel Approach for Branch Prediction using SVM

Asis Kumar Tripathy, Pradipta Mishra

310-313

Efficient Secure Authentication Policies using Biometrics

Vedpal Singh, Ajay Jangra,Priyanka, Anu Kundu

319-325

An Efficient Detection Technique for Optimization of Network Traffic

Rajesh Kumar Ahirwar, Rakesh Kumar Vishwakarma, Sachin Sohra

326-330

Development of Performance MIS

Dhawal Seth, Mr. L. Ramanathan, Abhishek Pandey

342-344

The Service Plan for Qos Mangment with The Help of Mobile Middleware and Video Sterming.

Gaurav Agarwal, Supriya Agarwal,Mayank Kumar, Saurabh Singh

356-359

A Method for Separating Region of InterestIn Digital Mammograms

Sara Dehghani, Mashallah Abbasi Dezfooli, Amir Masoud Rahmani

366-369

Amelioration of the HAD Metamodel for the Modelling of Complex Hybrid Systems

Marcellin Nkenlifack, Emmanuel Tanyi, Fabrice Fokou

370-380

A New Protocol for Power Saving in Mobile Ad Hoc Networks

V. Ramesh, N.Koteswar Rao,B.Mohan, Dr.P.Subbaiah

397-404

A Novel Classification Method Aided SAW

Mansour Ahmadi, Emad Roghanian,Azadeh Bazleh, Peyman Gholami

410-413

A Computerized Behavioral Study of Series Energy Controller for Energy Flow Control

Neetu Mittal, Abhijit Kulshrestha,Rachana Gupta, Vijay Kumar Tayal,

437-441

Performance Comparison of ordinary AODV and Energy Efficient AODV

V. Ramesh, N. Koteswar Rao,P.Praveen Kumar, S.Penchal Rao,B.Mohan

447-452

Comparative Analysis of Different Data Clustering Algorithms Based On Swarm Intelligence

Miss. Shweta K. Yewale, Mr. Pankaj K. Bharne, V. S. Gulhane

465-469

On the Oscillation of a Class of Second Order Nonlinear Neutral Delay Difference Equations

A.George Maria Selvam, S. Lourdu Marian, M. Reni Sagaya Raj

500-504

User Interface Design Framework for Digital Libraries

Hanumat G. Sastry, Manjunath. G,Venkatadri. M, Dr. Lokanatha C. Reddy

505-508

Performance Analysis of MFCC & DTW for Isolated Arabic Digit

Santosh Gaikwad, Bhart Gawali, Pravin Yannawar

513-518

Detached Rule Scheduling In Active Database System

Prof H.R. Vyawahare, Prof S.R. Gupta

537-541

Comparative study on the Mining Iceberg Cubes Algorithms

Sheelesh Kumar Sharma, Dr. Pankaj Nagar, Dr. V.P. Gupta

578-581

A High Security Approach For Image Steganography By Rapid Information Retrieval

Khosravi, Sara, Abbasi Dezfouli, Mashallah, Yektaie, Mohammad Hossein

621-627

Improved -Modulo Multiplier in Residue Number System

Seyyed Mohammad Safi, Hadi Toofani,Mahdi Mahmoodi, Misagh Mohammadizadeh

631-633

Secure and Authenticated Visual Content Transmission with Codebase Cryptosystem

Deo Brat Ojha, Ajay Sharma,Bhupendra Kumar, Abhishek Dwivedi,Amit Kumar

643-645