DOI: https://doi.org/10.26483/ijarcs.v2i3

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v2i3.517

Towards Pattern-Based Refactoring: Abstract Factory

Davoud Keshvari Ghourbanpour, Mohammad Hossein Yektaie

6-9

DOI: https://doi.org/10.26483/ijarcs.v2i3.501
DOI: https://doi.org/10.26483/ijarcs.v2i3.518
DOI: https://doi.org/10.26483/ijarcs.v2i3.571

Shuffle-RAT: An FPGA-based Iterative Block Cipher

Rajdeep Chakraborty, Sananda Mitra, J. K. Mandal

21-24

DOI: https://doi.org/10.26483/ijarcs.v2i3.476
DOI: https://doi.org/10.26483/ijarcs.v2i3.482
DOI: https://doi.org/10.26483/ijarcs.v2i3.467
DOI: https://doi.org/10.26483/ijarcs.v2i3.462
DOI: https://doi.org/10.26483/ijarcs.v2i3.466
DOI: https://doi.org/10.26483/ijarcs.v2i3.457
DOI: https://doi.org/10.26483/ijarcs.v2i3.464
DOI: https://doi.org/10.26483/ijarcs.v2i3.519

Transformation by Modeling MOF QVT 2.0: From UML to MVC2 Web model

Redouane Esbai, Mimoun Moussaoui,Samir Mbarki, Ibtissam Arrassen, Mohammed Erramdani, Abdelouafi Meziane

51-57

DOI: https://doi.org/10.26483/ijarcs.v2i3.498
DOI: https://doi.org/10.26483/ijarcs.v2i3.473
DOI: https://doi.org/10.26483/ijarcs.v2i3.468
DOI: https://doi.org/10.26483/ijarcs.v2i3.469
DOI: https://doi.org/10.26483/ijarcs.v2i3.470
DOI: https://doi.org/10.26483/ijarcs.v2i3.508
DOI: https://doi.org/10.26483/ijarcs.v2i3.471
DOI: https://doi.org/10.26483/ijarcs.v2i3.472

Secure Routing Based on ECC in Cluster Wireless Sensor Networks

Rayala Upendar Rao, Madarapu Naresh Kumar, K Palanivel

99-106

DOI: https://doi.org/10.26483/ijarcs.v2i3.504

Cluster Based Data Gathering in Wireless Sensor Networks

Narendran .M, Shobanalakshmi.R, Maivizhi.C

107-112

DOI: https://doi.org/10.26483/ijarcs.v2i3.474
DOI: https://doi.org/10.26483/ijarcs.v2i3.477

Performance Analysis of Gaming Application on Multicore Architecture

N. Muhammed Talha, M. Rajasekhara Babu, M. Khalid

117-120

DOI: https://doi.org/10.26483/ijarcs.v2i3.485
DOI: https://doi.org/10.26483/ijarcs.v2i3.497
DOI: https://doi.org/10.26483/ijarcs.v2i3.491
DOI: https://doi.org/10.26483/ijarcs.v2i3.505

A novel approach for intrusion detection using KNN classification and DS-Theory

Deepika Dave, Dr. RK Pandey, Prof. Vineet Richhariya

134-138

DOI: https://doi.org/10.26483/ijarcs.v2i3.479
DOI: https://doi.org/10.26483/ijarcs.v2i3.495
DOI: https://doi.org/10.26483/ijarcs.v2i3.486
DOI: https://doi.org/10.26483/ijarcs.v2i3.489

IP Spoofing Traceback – Recent Challenges and Techniques

Manish Kumar, Dr. M. Hanumanthappa, Dr. T.V. Suresh Kumar

152-158

DOI: https://doi.org/10.26483/ijarcs.v2i3.503
DOI: https://doi.org/10.26483/ijarcs.v2i3.460
DOI: https://doi.org/10.26483/ijarcs.v2i3.463
DOI: https://doi.org/10.26483/ijarcs.v2i3.461
DOI: https://doi.org/10.26483/ijarcs.v2i3.6001

Content Based Image Mining Systems Using Search Engine

Amit Kumar Gupta, Priyanka Ahlawat Mann

180-181

DOI: https://doi.org/10.26483/ijarcs.v2i3.478

Visualizing Cache Coherence And The Internet Using Vallatory Solen

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

182-185

DOI: https://doi.org/10.26483/ijarcs.v2i3.509

Digital Watermarking : The reliable protection to multimedia content

Ms Namrata Jain, Ms Anamika Joshi, Rashmi Tiwari

186-190

DOI: https://doi.org/10.26483/ijarcs.v2i3.515

Distributed Architecture for Backbone Area Security of Wireless Mesh Networks

Umesh Kumar Singh, Lokesh Laddhani, Shivlal Mewada

191-195

DOI: https://doi.org/10.26483/ijarcs.v2i3.483

Internet banking in India: Problems and Prospects

Ms Namrata Jain, Ms Rashmi Tiwari, Megha Jain

196-200

DOI: https://doi.org/10.26483/ijarcs.v2i3.516

A Novel Expert System for PC Network Troubleshooting and Maintenance

Akhil Kaushik, Manoj Barnela,Satvika Khanna, Harish Kumar

201-203

DOI: https://doi.org/10.26483/ijarcs.v2i3.520

Controlling Object-Oriented Languages Using Semantic Methodologies

Dr.D. Subbarao, kantipudi MVV prasad, M Arun Kumar

204-207

DOI: https://doi.org/10.26483/ijarcs.v2i3.510
DOI: https://doi.org/10.26483/ijarcs.v2i3.487
DOI: https://doi.org/10.26483/ijarcs.v2i3.493
DOI: https://doi.org/10.26483/ijarcs.v2i3.507

Variants of Public Key Cryptosystem RSA

Mr. Amit Manakshe, Prof. Vijay Gulhane

219-221

DOI: https://doi.org/10.26483/ijarcs.v2i3.521

Image Denoising Using Non Linear Filtering

Miss.Arti V. Gautam, Prof .Mr..D.M. Dakhane

222-224

DOI: https://doi.org/10.26483/ijarcs.v2i3.527

Enclosing Problem on Two Dimensional Point Set

Priya Ranjan Sinha Mahapatra

225-227

DOI: https://doi.org/10.26483/ijarcs.v2i3.523

Extraction of Texture features Using Euclidean, Canberra and Both Distance

Mr. Ganesh B. Regulwar, Dr. Prashant R. Deshmukh

228-234

DOI: https://doi.org/10.26483/ijarcs.v2i3.526

Challenges in Mobile Cloud Computing

Ms Namrata Jain, Ms Rashmi Tiwari, Mr. Anurag Jain

235-238

DOI: https://doi.org/10.26483/ijarcs.v2i3.513
DOI: https://doi.org/10.26483/ijarcs.v2i3.522

Information Hiding in Higher LSB Layer in an Audio Image

Prof. Samir Kumar Bandyopadhyay, Biswajita Datta, Koushik Dutta

243-254

DOI: https://doi.org/10.26483/ijarcs.v2i3.543

Formal Verification of Access Control Policies

Ramanuj Chouksey, R Sivashankari

255-260

DOI: https://doi.org/10.26483/ijarcs.v2i3.502
DOI: https://doi.org/10.26483/ijarcs.v2i3.512

A novel Image mining Technique for Classification of Mammograms using Hybrid Feature Selection

Aswini Kumar Mohanty, Manas Ranjan Senapati, Saroj Kumar Lenka

265-272

DOI: https://doi.org/10.26483/ijarcs.v2i3.528

Green Computing Practices: A solution to save environment

Ms Namrata Jain, Ms Rashmi Tiwari, Anurag Jain

273-276

DOI: https://doi.org/10.26483/ijarcs.v2i3.514
DOI: https://doi.org/10.26483/ijarcs.v2i3.531

Architecting Web Services Using Secure Information

Dr.D. Subbarao, Kantipudi Mvv Prasad, M Arun Kumar

283-286

DOI: https://doi.org/10.26483/ijarcs.v2i3.511

E-mail Forensics For Real Life Application in Evidence Building

Lokendra Kumar Tiwari, Shefalika Ghosh Samaddar, Chandra Kant Dwivedi

287-293

DOI: https://doi.org/10.26483/ijarcs.v2i3.458

New Implementation of IP Trace back

Krishna Reddy. Gangula, Raghavendra. V

294-299

DOI: https://doi.org/10.26483/ijarcs.v2i3.465
DOI: https://doi.org/10.26483/ijarcs.v2i3.539
DOI: https://doi.org/10.26483/ijarcs.v2i3.475

Controlling Systems And Scheme With Icy Wold

Dr.D. Subbarao, kantipudi mvv prasad, Arun Kumar

309-312

DOI: https://doi.org/10.26483/ijarcs.v2i3.532
DOI: https://doi.org/10.26483/ijarcs.v2i3.524

Implementing key Technologies in Multicast Environment through IP Multicast

B.V.S.S.R.S. Sastry, Mayank Sharma, Dr.S.M.Afroz, S.Santhi Priya, K. Akshitha

319-323

DOI: https://doi.org/10.26483/ijarcs.v2i3.533

Load Balancing in Mobile Ad-Hoc Networks: A Review

Jayant Vats, Dr.R.K Singh, Tanu Preet Singh

324-328

DOI: https://doi.org/10.26483/ijarcs.v2i3.530
DOI: https://doi.org/10.26483/ijarcs.v2i3.490
DOI: https://doi.org/10.26483/ijarcs.v2i3.529
DOI: https://doi.org/10.26483/ijarcs.v2i3.492
DOI: https://doi.org/10.26483/ijarcs.v2i3.494

A visit on Maximum Covering and Annulus Problem

Priya Ranjan Sinha Mahapatra

346-349

DOI: https://doi.org/10.26483/ijarcs.v2i3.525

Taxonomy for Establishing Electronic Signature System

B.V.S.S.R.S. Sastry, Mayank Sharma,S.Santhi Priya, K. Akshitha

350-356

DOI: https://doi.org/10.26483/ijarcs.v2i3.534

Routing protocols classification for Ad Hoc Networks

Chandra Naik. M, B.G.Obula Reddy,Ch.Venkata Narayana, Dr. Sai Satyanaraya Reddy

357-363

DOI: https://doi.org/10.26483/ijarcs.v2i3.535
DOI: https://doi.org/10.26483/ijarcs.v2i3.552
DOI: https://doi.org/10.26483/ijarcs.v2i3.540
DOI: https://doi.org/10.26483/ijarcs.v2i3.541
DOI: https://doi.org/10.26483/ijarcs.v2i3.555

Challenges and Countermeasures for Web Applications

O. Nagamani, Mayank Sharma, Pragati.G

381-384

DOI: https://doi.org/10.26483/ijarcs.v2i3.537

A Review on Security Issues in Multipath Routing Protocol in MANET

P. Purniemaa, K.Manikandan, M.A.Saleem Durai

385-390

DOI: https://doi.org/10.26483/ijarcs.v2i3.542

Recognition of ecg arrhythmias using back propagation Neural network

Pooja Kalra, Ankita Mittal, Saurabh Mittal

391-393

DOI: https://doi.org/10.26483/ijarcs.v2i3.499

An Automated Methodology to Design a Clustered Class

Ajeet A. Chikkamannur, Dr. Shivanand M. Handigund

394-398

DOI: https://doi.org/10.26483/ijarcs.v2i3.496

Minimizing Congestion in Neuro Fuzzy System

Priya Kasana, Sunita Parashar

399-401

DOI: https://doi.org/10.26483/ijarcs.v2i3.500

Decoupling Access Points from the Ethernet in Symmetric Encryption

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

402-405

DOI: https://doi.org/10.26483/ijarcs.v2i3.544
DOI: https://doi.org/10.26483/ijarcs.v2i3.506

Performance Comparisons of Different Multicast Routing Protocols: ODMRP and AM Route

Chandra Naik. M, Dr. S. Sai Satyanaraya Reddy, B.G.Obula Reddy,

409-414

DOI: https://doi.org/10.26483/ijarcs.v2i3.536
DOI: https://doi.org/10.26483/ijarcs.v2i3.570
DOI: https://doi.org/10.26483/ijarcs.v2i3.545

Enhancing Malfunction Resilience in Cognitive Radio Networks

Vibhakar Pathak, Dr. K C Roy, Santosh Kumar Singh

425-428

DOI: https://doi.org/10.26483/ijarcs.v2i3.546
DOI: https://doi.org/10.26483/ijarcs.v2i3.547
DOI: https://doi.org/10.26483/ijarcs.v2i3.548

The Influence Of Electronic Communication On Machine Learning

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

436-439

DOI: https://doi.org/10.26483/ijarcs.v2i3.549

Face Detection in Multi-Resolution Images

Jidesh. P, Ramesh Kumar Jallu

440-444

DOI: https://doi.org/10.26483/ijarcs.v2i3.550

Implementation of Hadamard Gate Using Quantum Artificial Neural Network

Shaktikanta Nayak, Sitakanta Nayak, Prof. J.P.Singh

445-447

DOI: https://doi.org/10.26483/ijarcs.v2i3.554

BENE: A Methodology for the Improvement of Voice-over-IP

Dr.D. Subbarao, kantipudi mvv prasad

448-450

DOI: https://doi.org/10.26483/ijarcs.v2i3.553

Economic Load Dispatch Using Genetic Algorithm

Jatin Garg, Pooja Khatri, Aziz Ahmad

451-454

DOI: https://doi.org/10.26483/ijarcs.v2i3.551

Modified FPF algorithm for clustering the web

Dr. M. Hanumanthappa, B R Prakash, Manish Kumar

455-459

DOI: https://doi.org/10.26483/ijarcs.v2i3.459
DOI: https://doi.org/10.26483/ijarcs.v2i3.480

Real Time Wireless Sensor Network for Tide Prediction Using Genetic Fuzzy Model

Arabinda Nanda, Nibedita Mohanty,Ramakanta Rath, Biswajita Mohanty

465-469

DOI: https://doi.org/10.26483/ijarcs.v2i3.484
DOI: https://doi.org/10.26483/ijarcs.v2i3.488

Multimedia Streaming in Multicast Environment

O. Nagamani, Mayank Sharma, Pragati.G

474-478

DOI: https://doi.org/10.26483/ijarcs.v2i2.538
DOI: https://doi.org/10.26483/ijarcs.v2i3.556

The Effect Of Reliable Archetypes On Cyberinformatics

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

483-486

DOI: https://doi.org/10.26483/ijarcs.v2i3.557

New Approach Secure AODV in Mobile Ad-hoc Network

Akansha Gupta, Rajdeep Singh, Nirlesh Sharma

487-490

DOI: https://doi.org/10.26483/ijarcs.v2i3.558
DOI: https://doi.org/10.26483/ijarcs.v2i3.576
DOI: https://doi.org/10.26483/ijarcs.v2i3.563
DOI: https://doi.org/10.26483/ijarcs.v2i3.559

UDDI and SAML based framework for Secure Semantic Web Services

Anil Sharma, Suresh Kumar, Manjeet Singh

508-511

DOI: https://doi.org/10.26483/ijarcs.v2i3.561

A Survey on Contemporary Security issues of Wireless Sensor Networks

N.Narayanan Prasanth, K.Navaz,S.Yamini, T.Saravanan, H. Abubacker Siddique

518-532

DOI: https://doi.org/10.26483/ijarcs.v2i3.562
DOI: https://doi.org/10.26483/ijarcs.v2i3.560
DOI: https://doi.org/10.26483/ijarcs.v2i3.566

The Influence of Pseudo Random Communication on Crypto Analysis

Dr.D. Subbarao, kantipudi MVV prasad, M Arun Kumar

543-547

DOI: https://doi.org/10.26483/ijarcs.v2i3.564
DOI: https://doi.org/10.26483/ijarcs.v2i3.565

ECHO Cancelation using LMS Filters

Tarun Singhal, Javed Ashraf, Ritu singh

551-553

DOI: https://doi.org/10.26483/ijarcs.v2i3.567
DOI: https://doi.org/10.26483/ijarcs.v2i3.568

An Enhanced Approach for Botnet Path Monitoring

Sudhar Shankar .B, Prof. Usha Devi .G

559-562

DOI: https://doi.org/10.26483/ijarcs.v2i3.569

A Face Recognition implementation Using The Simple PCA LDA Algorithm

Sukhvinder Singh, Dr. N Suresh Rao, Meenakshi Sharma

563-568

DOI: https://doi.org/10.26483/ijarcs.v2i3.572
DOI: https://doi.org/10.26483/ijarcs.v2i3.574
DOI: https://doi.org/10.26483/ijarcs.v2i3.481

The Simplest Way of Presenting PCA Algorithm To Recognize Face

Sukhvinder Singh, Meenakshi Sharma, Dr. N.Suresh Rao

576-579

DOI: https://doi.org/10.26483/ijarcs.v2i3.573
DOI: https://doi.org/10.26483/ijarcs.v2i3.575
DOI: https://doi.org/10.26483/ijarcs.v2i3.577

Implementing ARM7TDMI-S through EXPRESSION ADL

Dr. Manoj Kumar Jain, Veena Ramnani

595-599

DOI: https://doi.org/10.26483/ijarcs.v2i3.578