DOI: https://doi.org/10.26483/ijarcs.v2i2

Published: 2017-01-13

Blind Multi-Agent System for Department Teaching Schedule

Abdur Rashid Khan, Sheikh Muhammad Saqib

1-5

DOI: https://doi.org/10.26483/ijarcs.v2i2.359
DOI: https://doi.org/10.26483/ijarcs.v2i2.360

Performance Analysis of Energy Efficient and QOS Routing Protocol for WSN

Ravi Teja B, Prof. Manikandan K, Prof. T.Purusotham

12-16

DOI: https://doi.org/10.26483/ijarcs.v2i2.361
DOI: https://doi.org/10.26483/ijarcs.v2i2.362
DOI: https://doi.org/10.26483/ijarcs.v2i2.385
DOI: https://doi.org/10.26483/ijarcs.v2i2.363
DOI: https://doi.org/10.26483/ijarcs.v2i2.365
DOI: https://doi.org/10.26483/ijarcs.v2i2.366
DOI: https://doi.org/10.26483/ijarcs.v2i2.367

Modern Simulation and Modeling Techniques Used For Virtual Object Animations

Nooria Nazir, M. Aqeel Iqbal,Amber Sarwar, M. Naeem Altaf

66-76

DOI: https://doi.org/10.26483/ijarcs.v2i2.364
DOI: https://doi.org/10.26483/ijarcs.v2i2.376

Internet Voting (e-voting) in Indian Environment

Sanjay N. Kandekar, Dr. Ashwinikumar P. Dhande

81-85

DOI: https://doi.org/10.26483/ijarcs.v2i2.370

An Image AuthenticationTechnique Using Watermarking and Hash Function

M.Kameswara Rao, Y. Rama Krishna, K.Kiran Kumar

86-89

DOI: https://doi.org/10.26483/ijarcs.v2i2.371

Virtual Machine - Solution to run Multiple Operating System

Dr. Anwar Pasha Abdul Gafoor Deshmukh, Dr. Riyazuddin Qureshi

90-95

DOI: https://doi.org/10.26483/ijarcs.v2i2.433
DOI: https://doi.org/10.26483/ijarcs.v2i2.372
DOI: https://doi.org/10.26483/ijarcs.v2i2.374
DOI: https://doi.org/10.26483/ijarcs.v2i2.375
DOI: https://doi.org/10.26483/ijarcs.v2i2.373
DOI: https://doi.org/10.26483/ijarcs.v2i2.435
DOI: https://doi.org/10.26483/ijarcs.v2i2.380

Investigation on Dermoscopic Image Segmentation using Fuzzy Clustering Techniques

R.Sowmya Devi, Dr. L.Padma Suresh, De K.L.Shunmuganathan

126-132

DOI: https://doi.org/10.26483/ijarcs.v2i2.436
DOI: https://doi.org/10.26483/ijarcs.v2i2.377

Evolution of High Performance Computing Systems to Support Massively Intensive Applications

Muhammad Waqas-ur-Rehman, M. Aqeel Iqbal,Zohaib Hassan, Muhammad Asad-ur-Rehman, Nisar Ahmad Khan, Zeeshan Javed

139-142

DOI: https://doi.org/10.26483/ijarcs.v2i2.381

Implementation of Web usage Mining tool using Efficient Algorithm

Kapil Sharma, Prof. Vineet Richhariya, Yogendra S. Rathore

143-148

DOI: https://doi.org/10.26483/ijarcs.v2i2.437

The Classification of Cancer Gene using Hybrid Method of Machine Learning

Deepak Kumar Gour, Y. K. Jain, Geetika S Pandey

149-153

DOI: https://doi.org/10.26483/ijarcs.v2i2.398

Performance Analysis of K-NN and Naïve Bayes Classifiers for Spam Filtering Applications

M. Aqeel Iqbal, Arslan Shoukat,Shoaib A. Khan, Saleem Iqbal

154-158

DOI: https://doi.org/10.26483/ijarcs.v2i2.378
DOI: https://doi.org/10.26483/ijarcs.v2i2.379

Brain Tumor Segmentation through Watershed Transformation

Mr. N.S Zulpe, Dr. V. P. Pawar, Prof. Dinesh Chandra Jain

162-164

DOI: https://doi.org/10.26483/ijarcs.v2i2.451

Analysis of Mining Techniques for Version Histories to guide software changes

Er Gagandeep Singh, Dr Gurdev Singh, Er Babaldeep Kaur

165-167

DOI: https://doi.org/10.26483/ijarcs.v2i2.383

Human-Computer Interface Through Biometric Recognition System

Mr. Gajanan P. Khetri, Dr. V. P. Pawar, Prof. Dinesh Chandra Jain

168-173

DOI: https://doi.org/10.26483/ijarcs.v2i2.452

Survey on Improvisation of Medium Access Protocol for Wireless Sensors Networks

B Naga Naveen, Prof. K Manikandan, Prof. T Purusothaman

174-178

DOI: https://doi.org/10.26483/ijarcs.v2i2.386

Incorporating 3G Networks in Wireless Environments

B.V.S.S.R.S. Sastry, S.Santhi Priya, K. Akshitha

179-185

DOI: https://doi.org/10.26483/ijarcs.v2i2.387
DOI: https://doi.org/10.26483/ijarcs.v2i2.388

Ideological Network Security System through Firewall

Mr. Vijay K. Kale, Dr. V. P. Pawar Prof. Dinesh Chandra Jain

192-196

DOI: https://doi.org/10.26483/ijarcs.v2i2.453
DOI: https://doi.org/10.26483/ijarcs.v2i2.5990
DOI: https://doi.org/10.26483/ijarcs.v2i2.5991
DOI: https://doi.org/10.26483/ijarcs.v2i2.5992

Assessing Quality Issues in Component Based Software Development

Fernando L. F. Almeida, Catalin M. Calistru

212-218

DOI: https://doi.org/10.26483/ijarcs.v2i2.393
DOI: https://doi.org/10.26483/ijarcs.v2i2.438
DOI: https://doi.org/10.26483/ijarcs.v2i2.384

Implementation of Library Management System with RFID Technology

Mr. Chaithanya Kadari, Dr. Ch GVN Prasad

228-235

DOI: https://doi.org/10.26483/ijarcs.v2i2.443

Analysis of Clustering Algorithms on UCI Repository data set

Deepa Bhargava, Vandana Mohindru, Manish Maan

236-239

DOI: https://doi.org/10.26483/ijarcs.v2i2.396

Efficient Blog Mining using Summarizing and Clustering Techniques

Emmanuel Dinakar Babu R, Saravavanakumar K

240-244

DOI: https://doi.org/10.26483/ijarcs.v2i2.5993
DOI: https://doi.org/10.26483/ijarcs.v2i2.397

A Case Study of Security in Vanets

Siva Rama Krishnan S, Pavithra Balaji,Gracia S, Sakthi Ganesh M

251-253

DOI: https://doi.org/10.26483/ijarcs.v2i2.439
DOI: https://doi.org/10.26483/ijarcs.v2i2.399
DOI: https://doi.org/10.26483/ijarcs.v2i2.400
DOI: https://doi.org/10.26483/ijarcs.v2i2.401
DOI: https://doi.org/10.26483/ijarcs.v2i2.402

Analyzing Soft Computing based Intrusion Detection Systems

Mr. Dharmendra G. Bhatti, Dr. Paresh V. Virparia

275-278

DOI: https://doi.org/10.26483/ijarcs.v2i2.403
DOI: https://doi.org/10.26483/ijarcs.v2i2.404
DOI: https://doi.org/10.26483/ijarcs.v2i2.406
DOI: https://doi.org/10.26483/ijarcs.v2i2.407

Financial Inclusion through Mobile Banking in India

Kazi Imran Moin, Dr. Qazi Baseer Ahmed

299-303

DOI: https://doi.org/10.26483/ijarcs.v2i2.408
DOI: https://doi.org/10.26483/ijarcs.v2i2.389
DOI: https://doi.org/10.26483/ijarcs.v2i2.411
DOI: https://doi.org/10.26483/ijarcs.v2i2.412

Intraday Messenger Implementation for Trading using the Secured XML Technologies

Padmini Priya Chandra. S, Balamurugan. B., Venkatakrishna. P

319-323

DOI: https://doi.org/10.26483/ijarcs.v2i2.414
DOI: https://doi.org/10.26483/ijarcs.v2i2.415
DOI: https://doi.org/10.26483/ijarcs.v2i2.416
DOI: https://doi.org/10.26483/ijarcs.v2i2.419
DOI: https://doi.org/10.26483/ijarcs.v2i2.421

A Secure Communication Protocol for Mobile Ad-hoc Networks

Sandeep Kanagala, Prof. Usha Devi. G

345-347

DOI: https://doi.org/10.26483/ijarcs.v2i2.423

Medical Brain Image registration- A Survey

Prof. Samir Kumar Bandyopadhyay

348-351

DOI: https://doi.org/10.26483/ijarcs.v2i2.425
DOI: https://doi.org/10.26483/ijarcs.v2i2.426
DOI: https://doi.org/10.26483/ijarcs.v2i2.428
DOI: https://doi.org/10.26483/ijarcs.v2i2.431

Embedding Neural Network in Knowledge Acquisition System

Miss.Varsha Govindrao Bharad, Prof.Mukesh.A. Pund

368-373

DOI: https://doi.org/10.26483/ijarcs.v2i2.432
DOI: https://doi.org/10.26483/ijarcs.v2i2.405
DOI: https://doi.org/10.26483/ijarcs.v2i2.382

Survey on Data Security in Wireless Sensor Networks

C.Shabbir Basha, Abdul Gaffar.H

386-390

DOI: https://doi.org/10.26483/ijarcs.v2i2.392

Hand Gesture Recognition using skeleton of Hand and Hausdroff Distance

P.Swarna Latha, M.Rajasekhara Babu K.Siva Rajesh Reddy

391-395

DOI: https://doi.org/10.26483/ijarcs.v2i2.394

Emerging Technology in wireless network: Evolution of 4G

Mr. Shekhar P. Malvi, Prof. Pritish A. Tijare

396-400

DOI: https://doi.org/10.26483/ijarcs.v2i2.445
DOI: https://doi.org/10.26483/ijarcs.v2i2.395

The Biochip Technology Implementation and Major Advances in Medical Applications

Mr. Chaithanya Kadari, Dr. Ch GVN Prasad,Padma Koutarapu, Saidulu Yelagandula

409-412

DOI: https://doi.org/10.26483/ijarcs.v2i2.444
DOI: https://doi.org/10.26483/ijarcs.v2i2.409
DOI: https://doi.org/10.26483/ijarcs.v2i2.410
DOI: https://doi.org/10.26483/ijarcs.v2i2.413
DOI: https://doi.org/10.26483/ijarcs.v2i2.418
DOI: https://doi.org/10.26483/ijarcs.v2i2.422

Designing an Intelligent Web Browser Using Web Usage Mining Techniques

Subhendu pani, Manoj pandia, Satya Biswal, Santosh ku., Swain Bikram ke. Ratha

435-439

DOI: https://doi.org/10.26483/ijarcs.v2i2.429
DOI: https://doi.org/10.26483/ijarcs.v2i2.442
DOI: https://doi.org/10.26483/ijarcs.v2i2.368

Future Aspects of Cloud Computing

Madhurima Bhatia, Vandana Dhingra

451-453

DOI: https://doi.org/10.26483/ijarcs.v2i2.390

Defect Detection in Texture using Statistical Approach and Principal Component Analysis

Punamchand M. Mahajan, Dr. Satish R. Kolhe, Dr. Pradeep M. Patil

454-458

DOI: https://doi.org/10.26483/ijarcs.v2i2.417
DOI: https://doi.org/10.26483/ijarcs.v2i2.430

An Enhanced Polyalphabetic Cipher using Extended Vigenere Table

Ravindra Babu Kallam, Dr.S. Udaya Kumar,A. Vinaya Babu, Md Abdul Rasool,Puskur Pavan

463-465

DOI: https://doi.org/10.26483/ijarcs.v2i2.369

Performance based Efficient K-means Algorithm for Data Mining

Rajesh Ahirwar, Mukesh Goyal, Narendra Kumar Kori

466-471

DOI: https://doi.org/10.26483/ijarcs.v2i2.420
DOI: https://doi.org/10.26483/ijarcs.v2i2.427
DOI: https://doi.org/10.26483/ijarcs.v2i2.434
DOI: https://doi.org/10.26483/ijarcs.v2i2.446
DOI: https://doi.org/10.26483/ijarcs.v2i2.2828
DOI: https://doi.org/10.26483/ijarcs.v2i2.440
DOI: https://doi.org/10.26483/ijarcs.v2i2.391

Introduction of Component Based Testing

Vikas Verma, Dr.Sona Malhotra,Gurbaj Singh, Divyendu Kumar Mishra

496-497

DOI: https://doi.org/10.26483/ijarcs.v2i2.441
DOI: https://doi.org/10.26483/ijarcs.v2i2.5998

Performance Evaluation on Reactive Routing Protocols for Ad Hoc Networks

D. Suresh kumar, K. Manikandan, M. A. Saleem Durai

509-513

DOI: https://doi.org/10.26483/ijarcs.v2i2.447

A Way to Improve Pectoral Muscle Isolation in Digital Mammograms

Sara Dehghani, Mashallah Abbasi, Amir Masoud Rahmani

514-518

DOI: https://doi.org/10.26483/ijarcs.v2i2.358
DOI: https://doi.org/10.26483/ijarcs.v2i2.448

Next Generation Business Models in E Commerce

Gaurav Agarwal, Saurabh Singh, Ashok Kumar

523-526

DOI: https://doi.org/10.26483/ijarcs.v2i2.450
DOI: https://doi.org/10.26483/ijarcs.v2i2.5999

WLAN CCMP Protocol Nonce Enhancement using Transmission Rate

R. Buvaneswari, Dr.R. Balasubramanian

532-535

DOI: https://doi.org/10.26483/ijarcs.v2i2.449
DOI: https://doi.org/10.26483/ijarcs.v2i2.454