DOI: https://doi.org/10.26483/ijarcs.v1i2

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v1i2.12
DOI: https://doi.org/10.26483/ijarcs.v1i2.10

Fracture Extraction from Colored X-Ray Images

N. Ravia Shabnam Parveen, Dr.M.Mohammed Sathik

13-16

DOI: https://doi.org/10.26483/ijarcs.v1i2.14

An Efficient Method to find Video Objects

Ms. P. Peer Fatima, Dr. M. Mohamed Sathik, M. Parveen

17-22

DOI: https://doi.org/10.26483/ijarcs.v1i2.15

Improving Distributed Denial of Service (DDOS) Attack Detection Performance using Priority Queuing

Y. Rebahi, J. J. Pallares, D. Vingarzan, F. Gouveia, T. Magedanz, Andreea Ancuta Onofrei

23-27

DOI: https://doi.org/10.26483/ijarcs.v1i2.11

Modular Arithmetic Inverse of a Rectangular Matrix

V. Umakanta Sastry, D. S. R. Murthy

28-30

DOI: https://doi.org/10.26483/ijarcs.v1i2.17

Half Logistic Software Reliability Growth Model

Dr.R.Satya Prasad, Dr.R.R.L. Kantam

31-36

DOI: https://doi.org/10.26483/ijarcs.v1i2.18

Cryptography of a Binary Image using a Modified Hill Cipher

Dr. V. Umakanta Sastry, D. S. R. Murthy, Durga Bhavani

37-40

DOI: https://doi.org/10.26483/ijarcs.v1i2.19

Towards Formalizing Multi-Agent Systems Functional Requirements In Maude

Fathi Hamidane, Farid Mokhati, Habiba Belleili-Souici

41-48

DOI: https://doi.org/10.26483/ijarcs.v1i2.20
DOI: https://doi.org/10.26483/ijarcs.v1i2.21
DOI: https://doi.org/10.26483/ijarcs.v1i2.22
DOI: https://doi.org/10.26483/ijarcs.v1i2.23

Security and Software Architectures

S. Ramamoorthy, Dr. S. P. Rajagopalan, S. Sathyalakshmi

63-66

DOI: https://doi.org/10.26483/ijarcs.v1i2.24
DOI: https://doi.org/10.26483/ijarcs.v1i2.25

Memory Circuit Design in Quaternary Logic

Vasundara Patel K S, K S Gurumurthy

70-78

DOI: https://doi.org/10.26483/ijarcs.v1i2.26
DOI: https://doi.org/10.26483/ijarcs.v1i2.27

New Authenticated Key Agreement Protocol with Key Confirmation

Pritiranjan Bijayasingh, Asis Kumar Tripathy, Biswanath Sethi

90-93

DOI: https://doi.org/10.26483/ijarcs.v1i2.28

Fuzzy Clustering in Web Mining

Ms.Anjali B. Raut, Dr. G. R. Bamnote

94-97

DOI: https://doi.org/10.26483/ijarcs.v1i2.29
DOI: https://doi.org/10.26483/ijarcs.v1i2.31

Hybrid Segmentation Approach using FCM and Dominant Intensity Grouping with Region Growing on Medical Image

S.Zulaikha Beevi, M.Mohammed Sathik,K.Senthamarai Kannan, J.H Jaseema Yasmin,

104-109

DOI: https://doi.org/10.26483/ijarcs.v1i2.30
DOI: https://doi.org/10.26483/ijarcs.v1i2.32
DOI: https://doi.org/10.26483/ijarcs.v1i2.33
DOI: https://doi.org/10.26483/ijarcs.v1i2.34

Role of Inforamtion Communication Technology and its Impact on Health Sector

Rajender Kumar, Pankaj Kumar Verma, Sandeep Nehra

124-127

DOI: https://doi.org/10.26483/ijarcs.v1i2.35
DOI: https://doi.org/10.26483/ijarcs.v1i2.36

Variations in V Model for Software Development

Mr. Ganesh B. Regulwar, Mr. P. M. Jawandhiya, Mr. V.S. Gulhane, Dr. P .R. Deshmukh, Mr. R. M. Tugnayat

135-140

DOI: https://doi.org/10.26483/ijarcs.v1i2.37

The Inventory Management System using RFID: Requirements Management

Mudiana Mokhsin, Saidatul Rahah Hamidi,Syamsulhairi Yaako Zatul Amilah Shaffiei

141-151

DOI: https://doi.org/10.26483/ijarcs.v1i2.38

High Performance Mobile Checkpointing Algorithm

Surender Kumar, R.K. Chauhan, Parveen Kumar

152-157

DOI: https://doi.org/10.26483/ijarcs.v1i2.39
DOI: https://doi.org/10.26483/ijarcs.v1i2.40
DOI: https://doi.org/10.26483/ijarcs.v1i2.41
DOI: https://doi.org/10.26483/ijarcs.v1i2.42
DOI: https://doi.org/10.26483/ijarcs.v1i2.43
DOI: https://doi.org/10.26483/ijarcs.v1i2.44

Medical Image Registration Using Curvelets

Ankita Anupama, Som Shankar Sahoo

186-189

DOI: https://doi.org/10.26483/ijarcs.v1i2.45
DOI: https://doi.org/10.26483/ijarcs.v1i2.46

Improved Data Access Method In Ad hoc Networks

Anil Kumar, Parveen Gupta, Rakesh Sharma

194-198

DOI: https://doi.org/10.26483/ijarcs.v1i2.47
DOI: https://doi.org/10.26483/ijarcs.v1i2.48
DOI: https://doi.org/10.26483/ijarcs.v1i2.49

Fuzzy Logic in Control Design Anti-Lock Brake System

Sarbjeet Singh, Meenkshi Sharma,Priyanka Kakkar, Sukhvinder Singh

210-212

DOI: https://doi.org/10.26483/ijarcs.v1i2.50