DOI: https://doi.org/10.26483/ijarcs.v2i5

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v2i5.767
DOI: https://doi.org/10.26483/ijarcs.v2i5.770

Applying Wall Layer Building Algorithm for Optimizing the Equal Dimension Boxes in Vehicle Load Filling

J. Sheik Mohamed, B. Narendra Babu,Dr. S. Sreekanth, Dr. N. Ch. S. N. Iyengar

12-17

DOI: https://doi.org/10.26483/ijarcs.v2i5.764
DOI: https://doi.org/10.26483/ijarcs.v2i5.760

Face Detection and Tracking Techniques: A Review

Nandita Sethi, Alankrita Aggarwal

23-27

DOI: https://doi.org/10.26483/ijarcs.v2i5.761
DOI: https://doi.org/10.26483/ijarcs.v2i5.768
DOI: https://doi.org/10.26483/ijarcs.v2i5.745
DOI: https://doi.org/10.26483/ijarcs.v2i5.747
DOI: https://doi.org/10.26483/ijarcs.v2i5.763
DOI: https://doi.org/10.26483/ijarcs.v2i5.759
DOI: https://doi.org/10.26483/ijarcs.v2i5.765

Performance Evaluation Of Spatial Indexing Techniques

S Mahaboob Hussain, Pullela S V V S R Kumar, Dr MHM Krishna Prasad

59-64

DOI: https://doi.org/10.26483/ijarcs.v2i5.766
DOI: https://doi.org/10.26483/ijarcs.v2i5.762

Generalized Representation of Advice Using Sequence Trace Diagram

Shruti Dubey, Neha Rahatekar, Ugrasen Suman

80-84

DOI: https://doi.org/10.26483/ijarcs.v2i5.769

Image Change Detection for Earthquake Damage Assessment

Sanjay Kumar Jain, Ashok Kumar Dubey

85-89

DOI: https://doi.org/10.26483/ijarcs.v2i5.717
DOI: https://doi.org/10.26483/ijarcs.v2i5.713
DOI: https://doi.org/10.26483/ijarcs.v2i5.771
DOI: https://doi.org/10.26483/ijarcs.v2i5.773

Management of Node Mobility in Mobile Ad Hoc Networks Using Multipath Routing Protocol

Jhunu Debbarma, Rupanjal Debbarma,Shimal Das, Dr. Sudipta Roy

107-113

DOI: https://doi.org/10.26483/ijarcs.v2i5.774

Security Coding Technique for Web Applications

Shylaja Akinapally, K.Srinivas,T.P.Shekhar, A.Sanjeeva Raju

114-120

DOI: https://doi.org/10.26483/ijarcs.v2i5.714

A Frame Work Using Hyper-Based Methods for Image Registration and Super Resolution

Suresh Babu Yalavarthi, D.V. Chandra Shekar, Dr.G.S.Prasad

121-125

DOI: https://doi.org/10.26483/ijarcs.v2i5.775
DOI: https://doi.org/10.26483/ijarcs.v2i5.719
DOI: https://doi.org/10.26483/ijarcs.v2i5.752
DOI: https://doi.org/10.26483/ijarcs.v2i5.741
DOI: https://doi.org/10.26483/ijarcs.v2i5.776

A New Modified Fuzzy Rule Based Edge Detection

Er.Manpreet Kaur, Ms.Sumeet Kaur

144-147

DOI: https://doi.org/10.26483/ijarcs.v2i5.833
DOI: https://doi.org/10.26483/ijarcs.v2i5.777

Cyber Crime in India

Susheel Chandra Bhatt, Durgesh Pant

153-156

DOI: https://doi.org/10.26483/ijarcs.v2i5.778

Modeling the mutual coupling of circular DRA MIMO array using Artificial Neural Networks

K Jagadeesh Babu, Dr. K Sri Ramakrishna,Dr.L Pratap Reddy, J Lakshmi Narayana

157-160

DOI: https://doi.org/10.26483/ijarcs.v2i5.779
DOI: https://doi.org/10.26483/ijarcs.v2i5.712
DOI: https://doi.org/10.26483/ijarcs.v2i5.780

Audio Watermarking by Reducing Noise Using Fast Fourier Transformation

Parminder Singh, Preetinder Kaur Mann, Mandeep Singh Sandhu

171-174

DOI: https://doi.org/10.26483/ijarcs.v2i5.732
DOI: https://doi.org/10.26483/ijarcs.v2i5.6068
DOI: https://doi.org/10.26483/ijarcs.v2i5.781

Adopting K-Mean Clustering Algorithm on Multiple Choices Feedback Opinion Mining

J. Sheik Mohamed, P. Nirmala,Dr. P. Chitti Babu, Dr. S. Ramakrishna

203-206

DOI: https://doi.org/10.26483/ijarcs.v2i5.782

A Novel Economic Based Resource Allocation Model for Grid

Ashish Chandak, Bibhudatta Sahoo, Ashok Kumar Turuk

207-211

DOI: https://doi.org/10.26483/ijarcs.v2i5.783

FRI Miner: A Tool for Frequent Regular Itemsets Mining

KHK Sairaj, Dr MHM Krishna Prasad

212-216

DOI: https://doi.org/10.26483/ijarcs.v2i5.784

Rectangular features extraction from aerial image of urban area

Deshmukh Nilesh K., Khamitkar Santosh D., Bhalchandra Parag U.

217-220

DOI: https://doi.org/10.26483/ijarcs.v2i5.785

A Proposal for Construction of P-Box

Palash Dutta, Tazid Ali

221-225

DOI: https://doi.org/10.26483/ijarcs.v2i4.715
DOI: https://doi.org/10.26483/ijarcs.v2i5.786
DOI: https://doi.org/10.26483/ijarcs.v2i5.787

A Survey on Routing Protocols of Wireless Sensor Networks

Seyed Reza Taghizadeh, Dr. Shahriar Mohammadi

234-254

DOI: https://doi.org/10.26483/ijarcs.v2i5.6074
DOI: https://doi.org/10.26483/ijarcs.v2i5.718

Combined Method of Routing Multimedia Data in Computer Networks

Safwan Al Salaimeh, Khaldoun Besoul, Khaled Batiha

259-260

DOI: https://doi.org/10.26483/ijarcs.v2i5.788

Filtering Spam Emails Based on User Behaviors

Mashael Alsowaiel, Omar Batarfi

261-266

DOI: https://doi.org/10.26483/ijarcs.v2i5.735
DOI: https://doi.org/10.26483/ijarcs.v2i5.720
DOI: https://doi.org/10.26483/ijarcs.v2i5.789
DOI: https://doi.org/10.26483/ijarcs.v2i5.721
DOI: https://doi.org/10.26483/ijarcs.v2i5.723
DOI: https://doi.org/10.26483/ijarcs.v2i5.748

High Speed & Highly Secured Image Annotation Using Soft and Hard Watermarks

Anup.V. Kalaskar, Prof. YashKshirsagar, Shilpa.R.Jadhav

286-290

DOI: https://doi.org/10.26483/ijarcs.v2i5.790

Pattern Discovery using Coherent Rules

Praveen Kumar Ullengala

291-296

DOI: https://doi.org/10.26483/ijarcs.v2i5.6070
DOI: https://doi.org/10.26483/ijarcs.v2i5.791

Security Issues & Challenges in Wireless Mesh Networks

Shivlal Mewada, Umesh Kumar Singh

301-304

DOI: https://doi.org/10.26483/ijarcs.v2i5.792
DOI: https://doi.org/10.26483/ijarcs.v2i5.749

Protection based Routing Mechanism for Ad-hoc Network

Deshraj Ahirwar, Yogendra kumar Jain, Geetika S. Pandey

309-315

DOI: https://doi.org/10.26483/ijarcs.v2i5.793

Huddle based Harmonic K means Clustering Algorithm

S. Adaekalavan, Dr. C. Chandrasekar

316-318

DOI: https://doi.org/10.26483/ijarcs.v2i5.794
DOI: https://doi.org/10.26483/ijarcs.v2i5.795
DOI: https://doi.org/10.26483/ijarcs.v2i5.796
DOI: https://doi.org/10.26483/ijarcs.v2i5.797
DOI: https://doi.org/10.26483/ijarcs.v2i5.753
DOI: https://doi.org/10.26483/ijarcs.v2i5.798
DOI: https://doi.org/10.26483/ijarcs.v2i5.799
DOI: https://doi.org/10.26483/ijarcs.v2i5.710
DOI: https://doi.org/10.26483/ijarcs.v2i5.800
DOI: https://doi.org/10.26483/ijarcs.v2i5.801
DOI: https://doi.org/10.26483/ijarcs.v2i5.802
DOI: https://doi.org/10.26483/ijarcs.v2i5.726
DOI: https://doi.org/10.26483/ijarcs.v2i4.716
DOI: https://doi.org/10.26483/ijarcs.v2i5.803
DOI: https://doi.org/10.26483/ijarcs.v2i5.722

A study on Penetration Testing

S. Angel, Dr.S. Sarala

395-398

DOI: https://doi.org/10.26483/ijarcs.v2i5.804
DOI: https://doi.org/10.26483/ijarcs.v2i5.724
DOI: https://doi.org/10.26483/ijarcs.v2i5.805
DOI: https://doi.org/10.26483/ijarcs.v2i5.725

Skeletal Bone Age Assessment – Research Directions

P. Thangam, K. Thanushkodi, T.V.Mahendiran

415-423

DOI: https://doi.org/10.26483/ijarcs.v2i5.806
DOI: https://doi.org/10.26483/ijarcs.v2i5.728
DOI: https://doi.org/10.26483/ijarcs.v2i5.729
DOI: https://doi.org/10.26483/ijarcs.v2i5.730
DOI: https://doi.org/10.26483/ijarcs.v2i5.731

Evaluating the Effectiveness of Generic Personalized WebSearch

N.Venkata Ramana, Prof. D.Raghu, Ch.Raja Jocob

444-449

DOI: https://doi.org/10.26483/ijarcs.v2i5.751
DOI: https://doi.org/10.26483/ijarcs.v2i5.733

Advanced Reputation Management and P2P Networks

Ranjit Kumar. Ravi, Swarnalatha.S, Srikanth. Jatla

455-460

DOI: https://doi.org/10.26483/ijarcs.v2i5.734

C-Queued Technique against SQL injection attack

Sumit Dhariwal, Romil Rawat, Nikhil Patearia

461-464

DOI: https://doi.org/10.26483/ijarcs.v2i5.737
DOI: https://doi.org/10.26483/ijarcs.v2i5.807
DOI: https://doi.org/10.26483/ijarcs.v2i5.808
DOI: https://doi.org/10.26483/ijarcs.v2i5.809
DOI: https://doi.org/10.26483/ijarcs.v2i5.810
DOI: https://doi.org/10.26483/ijarcs.v2i5.743

An Enhanced RSA Public key Cryptographic Algorithm

Ravindra Babu Kallam, Dr. S. Udaya Kumar,V.Shravan Kumar, Dr.A. Vinaya Babu

497-499

DOI: https://doi.org/10.26483/ijarcs.v2i5.811

E-Learning Standards and their Necessity

Bharat Singh Deora, Prof. S.S. Sarangdevot

500-504

DOI: https://doi.org/10.26483/ijarcs.v2i5.812

Efficient personalization and Recommendation Methods for Web Mining

Mahendra Pratap Singh Dohare, Premnarayan Arya, Vinod Kumar

505-509

DOI: https://doi.org/10.26483/ijarcs.v2i5.813
DOI: https://doi.org/10.26483/ijarcs.v2i5.754

Studying Satellite Image Quality Based on the Fusion Techniques

Firouz Abdullah Al-Wassai, N.V. Kalyankar, Ali A. Al-Zaky

516-524

DOI: https://doi.org/10.26483/ijarcs.v2i5.755

Key Generator based secured system against SQL-Injection attack

Sumit Dhariwal, Romil Rawat, Nikhil Patearia

525-528

DOI: https://doi.org/10.26483/ijarcs.v2i5.738

Survey on Applications nf Social Network Analysis

Mrs. L. Rajeswari, Dr.S.S. Dhenakaran

529-532

DOI: https://doi.org/10.26483/ijarcs.v2i5.814
DOI: https://doi.org/10.26483/ijarcs.v2i5.711

An Effective Way of Knowledge Representation by FRS

Shilpa Kalra, Naveen Hemrajani,Savita Shiwani, Ruchi Dave

538-540

DOI: https://doi.org/10.26483/ijarcs.v2i5.815
DOI: https://doi.org/10.26483/ijarcs.v2i5.6073

Cyclic groups of Elliptic curves-An Implementation to Cryptography

A.Chandra Sekhar, G,Naga Lakshmi,B.Ravi Kumar G.Sivanagamalleswar Rao

544-546

DOI: https://doi.org/10.26483/ijarcs.v2i5.816

Android Mobile Security – An Issue of Future

Dr. S. O. Khanna, Mr. Pritesh Patel

547-549

DOI: https://doi.org/10.26483/ijarcs.v2i5.756
DOI: https://doi.org/10.26483/ijarcs.v2i5.746
DOI: https://doi.org/10.26483/ijarcs.v2i5.817
DOI: https://doi.org/10.26483/ijarcs.v2i5.727
DOI: https://doi.org/10.26483/ijarcs.v2i5.740
DOI: https://doi.org/10.26483/ijarcs.v2i5.742
DOI: https://doi.org/10.26483/ijarcs.v2i5.818

Mining Regular Patterns in Transactional Databases using Vertical Format

G. Vijay Kumar, M. Sreedevi, NVS. Pavan Kumar

581-583

DOI: https://doi.org/10.26483/ijarcs.v2i5.819
DOI: https://doi.org/10.26483/ijarcs.v2i5.744
DOI: https://doi.org/10.26483/ijarcs.v2i5.820
DOI: https://doi.org/10.26483/ijarcs.v2i5.757
DOI: https://doi.org/10.26483/ijarcs.v2i5.821
DOI: https://doi.org/10.26483/ijarcs.v2i5.758
DOI: https://doi.org/10.26483/ijarcs.v2i5.822
DOI: https://doi.org/10.26483/ijarcs.v2i5.823
DOI: https://doi.org/10.26483/ijarcs.v2i5.736

Optimal Routing Algorithm in a Octagon-Cell Network

Sanjukta Mohanty, Dr Prafulla ku. Behera

625-636

DOI: https://doi.org/10.26483/ijarcs.v2i5.824
DOI: https://doi.org/10.26483/ijarcs.v2i5.739
DOI: https://doi.org/10.26483/ijarcs.v2i5.825
DOI: https://doi.org/10.26483/ijarcs.v2i5.826

Cluster Based Authentication algorithm to deliver packet data over 802.11

Rajwinder Kaur, Mr. Sandeep Singh Kang, Hina Wadhwan

656-660

DOI: https://doi.org/10.26483/ijarcs.v2i5.827

Efficient Frequent Itemset Discovery Method in Uncertain Data

Sandhya Rawat, Ajit Kumar Shrivastav, Sanjaydeep Singh Lodhi

661-667

DOI: https://doi.org/10.26483/ijarcs.v2i5.828
DOI: https://doi.org/10.26483/ijarcs.v2i5.829
DOI: https://doi.org/10.26483/ijarcs.v2i5.830
DOI: https://doi.org/10.26483/ijarcs.v2i5.831
DOI: https://doi.org/10.26483/ijarcs.v2i5.832

Face Emotion Recognition Using Optimality Parameters Eye and Lip in Different Geographical Area

Ahmad Habibizad Navin, Mehdi Akhari ,Mirkamal Mirnia, Nima Jafari Navimipour

691-695

DOI: https://doi.org/10.26483/ijarcs.v2i5.834