DOI: https://doi.org/10.26483/ijarcs.v2i3

Published: 2017-01-13

Towards Pattern-Based Refactoring: Abstract Factory

Davoud Keshvari Ghourbanpour, Mohammad Hossein Yektaie

6-9

Shuffle-RAT: An FPGA-based Iterative Block Cipher

Rajdeep Chakraborty, Sananda Mitra, J. K. Mandal

21-24

Transformation by Modeling MOF QVT 2.0: From UML to MVC2 Web model

Redouane Esbai, Mimoun Moussaoui,Samir Mbarki, Ibtissam Arrassen, Mohammed Erramdani, Abdelouafi Meziane

51-57

Secure Routing Based on ECC in Cluster Wireless Sensor Networks

Rayala Upendar Rao, Madarapu Naresh Kumar, K Palanivel

99-106

Cluster Based Data Gathering in Wireless Sensor Networks

Narendran .M, Shobanalakshmi.R, Maivizhi.C

107-112

Performance Analysis of Gaming Application on Multicore Architecture

N. Muhammed Talha, M. Rajasekhara Babu, M. Khalid

117-120

A novel approach for intrusion detection using KNN classification and DS-Theory

Deepika Dave, Dr. RK Pandey, Prof. Vineet Richhariya

134-138

IP Spoofing Traceback – Recent Challenges and Techniques

Manish Kumar, Dr. M. Hanumanthappa, Dr. T.V. Suresh Kumar

152-158

Content Based Image Mining Systems Using Search Engine

Amit Kumar Gupta, Priyanka Ahlawat Mann

180-181

Visualizing Cache Coherence And The Internet Using Vallatory Solen

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

182-185

Digital Watermarking : The reliable protection to multimedia content

Ms Namrata Jain, Ms Anamika Joshi, Rashmi Tiwari

186-190

Distributed Architecture for Backbone Area Security of Wireless Mesh Networks

Umesh Kumar Singh, Lokesh Laddhani, Shivlal Mewada

191-195

Internet banking in India: Problems and Prospects

Ms Namrata Jain, Ms Rashmi Tiwari, Megha Jain

196-200

A Novel Expert System for PC Network Troubleshooting and Maintenance

Akhil Kaushik, Manoj Barnela,Satvika Khanna, Harish Kumar

201-203

Controlling Object-Oriented Languages Using Semantic Methodologies

Dr.D. Subbarao, kantipudi MVV prasad, M Arun Kumar

204-207

Variants of Public Key Cryptosystem RSA

Mr. Amit Manakshe, Prof. Vijay Gulhane

219-221

Image Denoising Using Non Linear Filtering

Miss.Arti V. Gautam, Prof .Mr..D.M. Dakhane

222-224

Enclosing Problem on Two Dimensional Point Set

Priya Ranjan Sinha Mahapatra

225-227

Extraction of Texture features Using Euclidean, Canberra and Both Distance

Mr. Ganesh B. Regulwar, Dr. Prashant R. Deshmukh

228-234

Challenges in Mobile Cloud Computing

Ms Namrata Jain, Ms Rashmi Tiwari, Mr. Anurag Jain

235-238

Information Hiding in Higher LSB Layer in an Audio Image

Prof. Samir Kumar Bandyopadhyay, Biswajita Datta, Koushik Dutta

243-254

Formal Verification of Access Control Policies

Ramanuj Chouksey, R Sivashankari

255-260

A novel Image mining Technique for Classification of Mammograms using Hybrid Feature Selection

Aswini Kumar Mohanty, Manas Ranjan Senapati, Saroj Kumar Lenka

265-272

Green Computing Practices: A solution to save environment

Ms Namrata Jain, Ms Rashmi Tiwari, Anurag Jain

273-276

Architecting Web Services Using Secure Information

Dr.D. Subbarao, Kantipudi Mvv Prasad, M Arun Kumar

283-286

E-mail Forensics For Real Life Application in Evidence Building

Lokendra Kumar Tiwari, Shefalika Ghosh Samaddar, Chandra Kant Dwivedi

287-293

New Implementation of IP Trace back

Krishna Reddy. Gangula, Raghavendra. V

294-299

Controlling Systems And Scheme With Icy Wold

Dr.D. Subbarao, kantipudi mvv prasad, Arun Kumar

309-312

Implementing key Technologies in Multicast Environment through IP Multicast

B.V.S.S.R.S. Sastry, Mayank Sharma, Dr.S.M.Afroz, S.Santhi Priya, K. Akshitha

319-323

Load Balancing in Mobile Ad-Hoc Networks: A Review

Jayant Vats, Dr.R.K Singh, Tanu Preet Singh

324-328

A visit on Maximum Covering and Annulus Problem

Priya Ranjan Sinha Mahapatra

346-349

Taxonomy for Establishing Electronic Signature System

B.V.S.S.R.S. Sastry, Mayank Sharma,S.Santhi Priya, K. Akshitha

350-356

Routing protocols classification for Ad Hoc Networks

Chandra Naik. M, B.G.Obula Reddy,Ch.Venkata Narayana, Dr. Sai Satyanaraya Reddy

357-363

Challenges and Countermeasures for Web Applications

O. Nagamani, Mayank Sharma, Pragati.G

381-384

A Review on Security Issues in Multipath Routing Protocol in MANET

P. Purniemaa, K.Manikandan, M.A.Saleem Durai

385-390

Recognition of ecg arrhythmias using back propagation Neural network

Pooja Kalra, Ankita Mittal, Saurabh Mittal

391-393

An Automated Methodology to Design a Clustered Class

Ajeet A. Chikkamannur, Dr. Shivanand M. Handigund

394-398

Minimizing Congestion in Neuro Fuzzy System

Priya Kasana, Sunita Parashar

399-401

Decoupling Access Points from the Ethernet in Symmetric Encryption

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

402-405

Performance Comparisons of Different Multicast Routing Protocols: ODMRP and AM Route

Chandra Naik. M, Dr. S. Sai Satyanaraya Reddy, B.G.Obula Reddy,

409-414

Enhancing Malfunction Resilience in Cognitive Radio Networks

Vibhakar Pathak, Dr. K C Roy, Santosh Kumar Singh

425-428

The Influence Of Electronic Communication On Machine Learning

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

436-439

Face Detection in Multi-Resolution Images

Jidesh. P, Ramesh Kumar Jallu

440-444

Implementation of Hadamard Gate Using Quantum Artificial Neural Network

Shaktikanta Nayak, Sitakanta Nayak, Prof. J.P.Singh

445-447

BENE: A Methodology for the Improvement of Voice-over-IP

Dr.D. Subbarao, kantipudi mvv prasad

448-450

Economic Load Dispatch Using Genetic Algorithm

Jatin Garg, Pooja Khatri, Aziz Ahmad

451-454

Modified FPF algorithm for clustering the web

Dr. M. Hanumanthappa, B R Prakash, Manish Kumar

455-459

Real Time Wireless Sensor Network for Tide Prediction Using Genetic Fuzzy Model

Arabinda Nanda, Nibedita Mohanty,Ramakanta Rath, Biswajita Mohanty

465-469

Multimedia Streaming in Multicast Environment

O. Nagamani, Mayank Sharma, Pragati.G

474-478

The Effect Of Reliable Archetypes On Cyberinformatics

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

483-486

New Approach Secure AODV in Mobile Ad-hoc Network

Akansha Gupta, Rajdeep Singh, Nirlesh Sharma

487-490

UDDI and SAML based framework for Secure Semantic Web Services

Anil Sharma, Suresh Kumar, Manjeet Singh

508-511

A Survey on Contemporary Security issues of Wireless Sensor Networks

N.Narayanan Prasanth, K.Navaz,S.Yamini, T.Saravanan, H. Abubacker Siddique

518-532

The Influence of Pseudo Random Communication on Crypto Analysis

Dr.D. Subbarao, kantipudi MVV prasad, M Arun Kumar

543-547

ECHO Cancelation using LMS Filters

Tarun Singhal, Javed Ashraf, Ritu singh

551-553

An Enhanced Approach for Botnet Path Monitoring

Sudhar Shankar .B, Prof. Usha Devi .G

559-562

A Face Recognition implementation Using The Simple PCA LDA Algorithm

Sukhvinder Singh, Dr. N Suresh Rao, Meenakshi Sharma

563-568

The Simplest Way of Presenting PCA Algorithm To Recognize Face

Sukhvinder Singh, Meenakshi Sharma, Dr. N.Suresh Rao

576-579

Implementing ARM7TDMI-S through EXPRESSION ADL

Dr. Manoj Kumar Jain, Veena Ramnani

595-599