DOI: https://doi.org/10.26483/ijarcs.v2i6

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v2i6.865
DOI: https://doi.org/10.26483/ijarcs.v2i6.844

Word-Based LSB Image Steganography

Dr. Mohammed Abbas Fadhil Al-Husainy

15-19

DOI: https://doi.org/10.26483/ijarcs.v2i6.846

High Performance Computing Solution in Bangladesh through Grid Computing

Husnain-Al -Bustam, Saif-Un-Noor, Md. Thesun-Al-Amin

20-24

DOI: https://doi.org/10.26483/ijarcs.v2i6.848
DOI: https://doi.org/10.26483/ijarcs.v2i6.871

Analytical Modeling for Performance of Multimedia Applications in WLAN

D. Ramesh, Dr. B. P. Mallikarjunaswamy, B.R.Prakash

30-34

DOI: https://doi.org/10.26483/ijarcs.v2i6.872
DOI: https://doi.org/10.26483/ijarcs.v2i6.873
DOI: https://doi.org/10.26483/ijarcs.v2i6.835

Data Mining Technique for Agriculture and Related Areas

Mamta Rajshree, Shwetank, R.P.Agarwal

43-45

DOI: https://doi.org/10.26483/ijarcs.v2i6.858
DOI: https://doi.org/10.26483/ijarcs.v2i6.6075
DOI: https://doi.org/10.26483/ijarcs.v2i6.874
DOI: https://doi.org/10.26483/ijarcs.v2i6.859

A Model for Making NTFS Permissions Setting More Usable

Mina Izadi Firouz-Abadi, Nasser Ghassem- Aghaei

60-64

DOI: https://doi.org/10.26483/ijarcs.v2i6.839

Energy-efficient clustering for Wireless Sensor Networks-A Survey

D.G. Anand, Dr.H.G.Chandrakanth, Dr.M.N.Giriprasad

65-69

DOI: https://doi.org/10.26483/ijarcs.v2i6.875
DOI: https://doi.org/10.26483/ijarcs.v2i6.845
DOI: https://doi.org/10.26483/ijarcs.v2i6.6076
DOI: https://doi.org/10.26483/ijarcs.v2i6.921

Deducing and Mapping the Class Path of JAR File

PM. Shanthi, Dr. K. Duraiswamy

88-92

DOI: https://doi.org/10.26483/ijarcs.v2i6.876

Neural Network based Classifying Static Hand Gesture Recognition

Vaishali M. Gulhane, Madhavi S. Joshi, Manik D. Ingole

93-96

DOI: https://doi.org/10.26483/ijarcs.v2i6.877
DOI: https://doi.org/10.26483/ijarcs.v2i6.878

A Study of Techniques to Avoid Congestion in Wireless Sensor Networks

Seyed Mojtaba Salari, Mohammad Javad Fattahi, Fazlollah Adibniya

103-107

DOI: https://doi.org/10.26483/ijarcs.v2i6.851

Using Clustering To Boost Sales In Chain Stores:A Real Case In Iran

Peyman Gholami, Meysam Eftekhary, Nezamedin Faghih

108-111

DOI: https://doi.org/10.26483/ijarcs.v2i6.879
DOI: https://doi.org/10.26483/ijarcs.v2i6.880
DOI: https://doi.org/10.26483/ijarcs.v2i6.866

Advanced Security of Route Discovery in MANETs

G. Yedukondalu, M. Srinivas, V. Kondala Rao R. Ravikumar

123-129

DOI: https://doi.org/10.26483/ijarcs.v2i6.869
DOI: https://doi.org/10.26483/ijarcs.v2i6.881

Analysis of EMI Effects on Attenuator Circuit

Mandeep Kaur, Danvir Mandal

132-140

DOI: https://doi.org/10.26483/ijarcs.v2i6.882
DOI: https://doi.org/10.26483/ijarcs.v2i6.883
DOI: https://doi.org/10.26483/ijarcs.v2i6.856

Design of Fault Tolearnt Reversible Full Adder/Subtarctor

Balwinder Singh Dhaliwal, Parminder kaur, Sheenu Chopra

152-155

DOI: https://doi.org/10.26483/ijarcs.v2i6.884

Quantum Key Distribution and Testing

M.Kishore Kumar, N.Santhosh kumar, R.Srinivas H.Shyamsundar

156-165

DOI: https://doi.org/10.26483/ijarcs.v2i6.885
DOI: https://doi.org/10.26483/ijarcs.v2i6.886
DOI: https://doi.org/10.26483/ijarcs.v2i6.887
DOI: https://doi.org/10.26483/ijarcs.v2i6.920

Framework of Visual Search Engines and Data Integration

M. Saritha, K.Kiran Reddy, J.Srikanth

187-193

DOI: https://doi.org/10.26483/ijarcs.v2i6.888
DOI: https://doi.org/10.26483/ijarcs.v2i6.837
DOI: https://doi.org/10.26483/ijarcs.v2i6.838

A Review of PAPR Reduction Techniques in OFDM

Mr. Prashant Maruti Jadhav, Mrs. L.S. Admuthe

204-209

DOI: https://doi.org/10.26483/ijarcs.v2i6.889

Analysis and Delay Function of Ad hoc Routing Network Protocols

Kaliyaperumal Karthikeyan, S.K.Manju Bargavi, M.Aswani Kumar

210-213

DOI: https://doi.org/10.26483/ijarcs.v2i6.919
DOI: https://doi.org/10.26483/ijarcs.v2i6.841
DOI: https://doi.org/10.26483/ijarcs.v2i6.890
DOI: https://doi.org/10.26483/ijarcs.v2i6.842
DOI: https://doi.org/10.26483/ijarcs.v2i6.891

Density Based Cluster Technique for Sensor Data

Netreshwari Sharma, Kapil Kumar Nagwanshi, Lokesh Kumar Sharma

230-233

DOI: https://doi.org/10.26483/ijarcs.v2i6.892
DOI: https://doi.org/10.26483/ijarcs.v2i6.893

System Testability Assessment and testing with Micro architectures

J.M.S.V.Ravi Kumar, I. Rajendra Kumar.,P.ashok Reddy Dr.M.Babu Reddy

239-243

DOI: https://doi.org/10.26483/ijarcs.v2i6.895
DOI: https://doi.org/10.26483/ijarcs.v2i6.862
DOI: https://doi.org/10.26483/ijarcs.v2i6.854
DOI: https://doi.org/10.26483/ijarcs.v2i6.857

Protein Local Structure Prediction through Improved Clustering Support Vector Machines (ICSVM)

Sasmita Rout, Tripti Swarnkar,Debabrata Senapati, Saswati Mahapatra

255-258

DOI: https://doi.org/10.26483/ijarcs.v2i6.896

Application of Gps in Fisheries and Marine Studies

C. Hentry, S. Saravanan, N. Chandrasekar, A. Ponniah Raju, K. Kulathuran

259-263

DOI: https://doi.org/10.26483/ijarcs.v2i6.897
DOI: https://doi.org/10.26483/ijarcs.v2i6.870
DOI: https://doi.org/10.26483/ijarcs.v2i6.847

Deception Detection under Fuzzified Communication Media Syndromes

MR.S.Raj kumar, DR.S.P.Victor, MRS.V.Narayani

276-278

DOI: https://doi.org/10.26483/ijarcs.v2i6.836

Study of Software Process Model Selection

Er.Neha Budhija, Er. Satinder Pal Ahuja

279-282

DOI: https://doi.org/10.26483/ijarcs.v2i6.898
DOI: https://doi.org/10.26483/ijarcs.v2i6.899
DOI: https://doi.org/10.26483/ijarcs.v2i6.900
DOI: https://doi.org/10.26483/ijarcs.v2i6.901

Analysis of RC6 Symmetric Encryption Algorithm

Rutuja R. Yawale, Prof. S.V. Rode

297-301

DOI: https://doi.org/10.26483/ijarcs.v2i6.843
DOI: https://doi.org/10.26483/ijarcs.v2i6.902
DOI: https://doi.org/10.26483/ijarcs.v2i6.903
DOI: https://doi.org/10.26483/ijarcs.v2i6.904
DOI: https://doi.org/10.26483/ijarcs.v2i6.849

Speaker Ensembles Recognition In Different Noisy Environments

Ketha. Sriramachandram, K. Ramanjaneyulu

319-325

DOI: https://doi.org/10.26483/ijarcs.v2i6.905

Automatic Speech Recognition: Architecture, Methodologies and Challenges - A Review

S. Karpagavalli, R.Deepika, P.Kokila, K.Usha Rani, Dr.E. Chandra

326-331

DOI: https://doi.org/10.26483/ijarcs.v2i6.906
DOI: https://doi.org/10.26483/ijarcs.v2i6.6081
DOI: https://doi.org/10.26483/ijarcs.v2i6.907
DOI: https://doi.org/10.26483/ijarcs.v2i6.908

Segmentation of Textures Using Echo State Neural Network

Shobarani Shobarani, Dr. S. Purushothaman

348-353

DOI: https://doi.org/10.26483/ijarcs.v2i6.909

A Survey on Deadlock Free Network Reconfiguration

S.Mohiadeen Abdul Kadhar, Dr. T. Revathi

354-361

DOI: https://doi.org/10.26483/ijarcs.v2i6.861

Privacy Preservation in Data Mining by Hybridization of Partitioning on Medical Data

Madhan Subramaniam, Senthil R,Bathmanaban L, Suhasini Manoharan

362-365

DOI: https://doi.org/10.26483/ijarcs.v2i6.894

Clustered approach to Web Search Using SVM as Load Balancing Module

Miss. Rita Shelke, Prof. Devendrasingh Thakore

366-372

DOI: https://doi.org/10.26483/ijarcs.v2i6.867

Design of a Bdp Tool Using Data Mining Techniques

N.Sree Ram, Dr.J.V.R.Murthy, Dr.K.Satya Prasad

373-376

DOI: https://doi.org/10.26483/ijarcs.v2i6.910
DOI: https://doi.org/10.26483/ijarcs.v2i6.911
DOI: https://doi.org/10.26483/ijarcs.v2i6.860
DOI: https://doi.org/10.26483/ijarcs.v2i6.912
DOI: https://doi.org/10.26483/ijarcs.v2i6.913
DOI: https://doi.org/10.26483/ijarcs.v2i6.864

Text Line Segmentation on Odia Printed Documents

Debabrata Senapati, Soumya Mishra,Debananda Padhi, Sasmita Rout

396-399

DOI: https://doi.org/10.26483/ijarcs.v2i6.914
DOI: https://doi.org/10.26483/ijarcs.v2i6.915
DOI: https://doi.org/10.26483/ijarcs.v2i6.855

Adaptive Rood Algorithm for Motion compensation in video streams

Sanipini Venkata Kiran, P. Darwin, Ch. Srinivasa Rao

410-418

DOI: https://doi.org/10.26483/ijarcs.v2i6.840
DOI: https://doi.org/10.26483/ijarcs.v2i6.916
DOI: https://doi.org/10.26483/ijarcs.v2i6.853
DOI: https://doi.org/10.26483/ijarcs.v2i6.850

Optimized Query Processing for Virtual and Distributed Xml Databases

M.Sai Kumar, C.Balarengadurai , J.Srikanth

432-437

DOI: https://doi.org/10.26483/ijarcs.v2i6.935
DOI: https://doi.org/10.26483/ijarcs.v2i6.917

A Fuzzy Expert System for Cancer Diagnosis

Chaitali S. Suratkar, Prof. V. T. Gaikwad

443-447

DOI: https://doi.org/10.26483/ijarcs.v2i6.918
DOI: https://doi.org/10.26483/ijarcs.v2i6.863

A Grading System For Fruits Maturity Using Neural Networks Approach

Kestina Rai, Maitreyee Dutta, Sunil Aggarwal

451-454

DOI: https://doi.org/10.26483/ijarcs.v2i6.868

Reactive vs Proactive in VANET Scenarios

V.Lakshmi Praba, A. Ranichitra

455-460

DOI: https://doi.org/10.26483/ijarcs.v2i6.936
DOI: https://doi.org/10.26483/ijarcs.v2i6.922
DOI: https://doi.org/10.26483/ijarcs.v2i6.923

Auv Design: Intelligent Vehicle Using Sensor Fusion Control Scheme

Irshad Ahmad Ansari, Sachin Sharma , Gaurav Kumar

468-471

DOI: https://doi.org/10.26483/ijarcs.v2i6.924

Energy Efficient Clustering Algorithm in Wireless Sensor Network

Sachinpal Sachinpal, Sanjeev khambra, Amritpal singh

472-475

DOI: https://doi.org/10.26483/ijarcs.v2i6.925
DOI: https://doi.org/10.26483/ijarcs.v2i6.926

Genetic Algorithm based Network Intrusion Detection System

Nitin Gupta, Nitin Pareek, Kavita Pandey

480-483

DOI: https://doi.org/10.26483/ijarcs.v2i6.927
DOI: https://doi.org/10.26483/ijarcs.v2i6.928
DOI: https://doi.org/10.26483/ijarcs.v2i6.929
DOI: https://doi.org/10.26483/ijarcs.v2i6.930
DOI: https://doi.org/10.26483/ijarcs.v2i6.931
DOI: https://doi.org/10.26483/ijarcs.v2i6.932
DOI: https://doi.org/10.26483/ijarcs.v2i6.933
DOI: https://doi.org/10.26483/ijarcs.v2i6.934