DOI: https://doi.org/10.26483/ijarcs.v3i3

Published: 2017-01-13

MASP A Model for Business Processes Analysis and Specification

Ghenima Sini, Catherine Comparot, Malik SI-Mohammed

7-12

Benchmarking of High Performance Cluster Reynolds

Sandip Sarkar, Raghavendra Krishnamurthy, Satish Kumar Ajmani

21-32

A Hybrid Technique for Quality of Service Evaluation of Cellular Wireless Networks

Apkar Salatian, Gregory Onoh, Eke James, NetworksLawrence Oborkhale

62-67

Impact of Mobile Internet among Nau Students

Uduiguomen U. C, V.E. Ejiofor,Njoku C.A, Alika G.V.

93-95

Optimal Search Mechanism using Backtracking in Cloud Environment

K. Govinda, Gurunathaprasad V, SathishKumar H

107-110

Rethinking of Computing Curricula in Higher Education in Pakistan

Dr. Muhammad Anwar- ur-Rehman Pasha, Dr. Shaheen Pasha,

111-115

Operational Risk Evaluating and Modeling for E-Banking

M. Pirouz, M. Salahi,M. Mahdavi, R. Ebrahimi Atani

136-139

Development of SIP UDP Transport Process under Linux Environment

K. Venkateswarlu, Swarnalatha.P, L. Ramanathan, D. Ganesh Gopal

153-162

Wireless Information Access System for Registered Vehicles Using SMS

Okeke, Moses I, Inyiama, H. C.,Okoye Christian. o, Ejiofor V. E

163-167

TR-069 Protocol Stack Development

Swarnalatha. P, Galla Sobha, M.Anbarasi

168-171

Development of Virtual Experiment on Rectifier Circuits

Pradeep B. Dahikar, Bhaskar Y. Kathane

197-200

Analysis of Clinical Databases Using Data Mining Techniques

L. Jagjeevan Rao, N. V. S. Pavan Kumar, M.Srinivas

214-216

A New approach for fingerprint recognition using Earth Mover’s Distance

B.K. Tripathy, P.V.S.S.R.Chandramouli, Bimalendu Ranajit

223-227

Non Contact Human Computer Interaction Using Eye Blinks

Ms. S. Vijiyalakshmi, R.K.Jananee, N.Karthiga Dr. S. Sivasathya

249-252

Architecture of X-Band Data Product Generator

Saurabh Kumar, Rajendran S., Abhishek Kumar

262-265

Ranking Spatial Data using Quality Preferences

Murali Krishna M, Ramesh Naidu G

276-279

An Approach to Analysis Software Reusability

Ashish Agrawal, Sachin Patel

286-290

Security in Location Based Services: A Survey

Gaurav Gupta, Deepika Goel Gupta

311-315

Trajectory Clustering Approaches for Location Aware Services

Lokesh Kumar Sharma, Sanjiv Kumar Shukla, Sourabh Rungta

323-327

An Overview of Fuzzy Query Processing

Garima Singh, Awadhesh Kumar Sharma

328-330

An Efficient Design Framework for Building Alerting Systems to Make Regular tags Intelligent

Dr JKR Sastry, N. Venkataram,Dr. LSS Reddy, T Sri Lakshmi,K. Sreenivasa Ravi

345-348

Comparative Study of Spell Checking Algorithms and Tools

Khyati Shah, Mayuri Patel,Jikitsha Sheth, Dr. kalpesh Lad

421-426

Analysis of Conflict DoS Attacks Process and Counter Measure on SIP Based VoIP Network

Md. Ruhul Islam, Dr.Smarajit Ghosh, Nausrat Jahan Ahmed

433-437

Frequency Based Structural Analysis for Document Plagiarism

Santosh Kumar Gupta, Anurag Rai, Pranav Singh

438-444

An adaptive QOS-aware Routing in MANETs

R. Madhanmohan, Dr.K. Selvakumar

445-449

Heart Rate Determination with RR Interval and PP Interval Time Series

Sahil Verma, Ramesh Kumar Sunkaria, Barjinder Singh Saini

450-455

Evolution of Object Oriented Analysis & Design in Software Engineering

Amit Kumar Shrivastava, Sanjiv Kumar Shriwastava, Rohit Sharma

456-463

Image Reconstruction Algorithm Using R-Tree Approach and Delaunay Triangulation

Rohit Sharma, Sanjiv Kumar Shriwastava, Amit Kumar Shrivastava

464-468

Certificate Revocation in Mobile Ad Hoc Networks with a Threshold value

CH.Rathan Kumar, K. Sunil kumar, S. Sateesh Reddy

488-492

BUID: A Virtual Agent to Become Robust Integrated Core Financial System

Vaibhav R. Bhedi, Ujwal A. Lanjewar, Shrinivas P. Deshpande

512-515

XML Data Mining using XQuery and Improved Apriori Algorithm

Tabassum N. Mujawar, Subhash K.Shinde, Varunakshi Bhojane

516-521

Frequent Pattern Mining Based On Clustering and Association Rule Algorithm

Kavita M. Gawande, Mr. Subhash K.Shinde, Mrs .Dipti Patil

522-527

Shape Based Features Extracted Using Wavelet Decomposition and Morphological Operators

Padmashree D. Desai, Jagadeesh Pujari, Nagaratna Yaligar

556-561

A Study and Comparison of Methods for Fuzzy Data Equivalence

Ankita Srivastava, Awadhesh Kumar Sharma

562-565

Syslog a Promising Solution to Log Management

P. K. Sahoo, Dr. R. K. Chottray,Dr. Gunamani Jena, Dr. S. Pattnaiak

584-588

Group of Continuous Time Recurrent Neural Networks

Neeraj Sahu, Poonam Sinha, A.K. Verma

622-625

An Alternative approach to Temporary Memory Management in Databases using Object Oriented Systems

Sunil Kr Pandey, Dr. Sanjiv Kumar Shriwastava, Amit Kumar Shrivastava

647-654

A Comprehensive Study on Cross Layer Design and its Future

Prabhat Singh, Vinay Kumar,Akhilesh Kumar, Awadhesh Kumar

669-674