DOI: https://doi.org/10.26483/ijarcs.v4i4

Published: 2017-01-13

Self-Organizing-Healing Paradigm for Mobile Networks

Okon S. C., Asagba P. O., Aloysius Akpanobong

1-7

DOI: https://doi.org/10.26483/ijarcs.v4i4.1606
DOI: https://doi.org/10.26483/ijarcs.v4i4.1633
DOI: https://doi.org/10.26483/ijarcs.v4i4.1634

Soil Testing Reports Extracted Using Combined Mining Patterns

Mathavi parvathi, pandimurugan, Dr.Paul rodrigues

18-21

DOI: https://doi.org/10.26483/ijarcs.v4i4.1635
DOI: https://doi.org/10.26483/ijarcs.v4i4.1636

Improved techniques for Image Retrieval

Priyanka Gupta, Mr. Umesh Kumar

28-33

DOI: https://doi.org/10.26483/ijarcs.v4i4.1637
DOI: https://doi.org/10.26483/ijarcs.v4i4.1594

E-commerce In Enterprise Marketing Management Environment

Mangesh S. Dabhade, Dr. P. N. ChatuR, Prof. R. V. Mante

40-44

DOI: https://doi.org/10.26483/ijarcs.v4i4.1638
DOI: https://doi.org/10.26483/ijarcs.v4i4.1639
DOI: https://doi.org/10.26483/ijarcs.v4i4.1596

Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme

Sarita Motghare, P.S.Mohod,S.P.Khandait, Anil Jaiswal

55-59

DOI: https://doi.org/10.26483/ijarcs.v4i4.1640
DOI: https://doi.org/10.26483/ijarcs.v4i4.1597
DOI: https://doi.org/10.26483/ijarcs.v4i4.1598
DOI: https://doi.org/10.26483/ijarcs.v4i4.1599

Private Cloud Implementation at Enterprise with IBM Workload Deployer

Prashant A. Gadling, Prof. A.V. Deorankar, Dr.P. N. Chatur

77-80

DOI: https://doi.org/10.26483/ijarcs.v4i4.1600

Privacy Issues and Measurement in Cloud Computing: A Review

Ishan Rastogi, Adesh Chandra,Vivek Kumar Gupta, Dr. Abhishek Vaish

81-86

DOI: https://doi.org/10.26483/ijarcs.v4i4.1602
DOI: https://doi.org/10.26483/ijarcs.v4i4.1641
DOI: https://doi.org/10.26483/ijarcs.v4i4.1642
DOI: https://doi.org/10.26483/ijarcs.v4i4.1643

Online Video Streaming System

Ms. Supriya Thombre, Samruddha Barai, Pranay Tiwari, Gaurav Diyewar

106-108

DOI: https://doi.org/10.26483/ijarcs.v4i4.1644

Various Edge Detection Techniques: Survey, Implementation and Comparison

Krupa Shah, Khushbu Patel, Ghanshyam I Prajapati

109-113

DOI: https://doi.org/10.26483/ijarcs.v4i4.1603
DOI: https://doi.org/10.26483/ijarcs.v4i4.1645

Optical Watermark Based On Digital Printing

Pise Anil Audumbar, Gupta Hitesh, Chabukswar Hrishikesh

119-124

DOI: https://doi.org/10.26483/ijarcs.v4i4.1646

SOA Appliances: An Embedded System Perspective

Deepali Tripathi, Yogita Punjabi

125-128

DOI: https://doi.org/10.26483/ijarcs.v4i4.1604

Governance Through Cloud in India (GCI)

Anurag Singh, Kumar Anurupam, Rajnish Sagar, Shashikant Rai

129-136

DOI: https://doi.org/10.26483/ijarcs.v4i4.1647
DOI: https://doi.org/10.26483/ijarcs.v4i4.1624
DOI: https://doi.org/10.26483/ijarcs.v4i4.1607

Encryption and Decryption Technique in Wireless Sensor Networks

S. Kannadhasan, P.Suresh, M.Rajesh Baba

145-147

DOI: https://doi.org/10.26483/ijarcs.v4i4.1608
DOI: https://doi.org/10.26483/ijarcs.v4i4.1618
DOI: https://doi.org/10.26483/ijarcs.v4i4.1616
DOI: https://doi.org/10.26483/ijarcs.v4i4.1611
DOI: https://doi.org/10.26483/ijarcs.v4i4.1612
DOI: https://doi.org/10.26483/ijarcs.v4i4.1613
DOI: https://doi.org/10.26483/ijarcs.v4i4.1619

Fingerprint Geometry matching by Divide and Conquer Strategy

Sanjukta Pal, Sucharita pal, Prof. (Dr) Pranam Paul

179-183

DOI: https://doi.org/10.26483/ijarcs.v4i4.1621
DOI: https://doi.org/10.26483/ijarcs.v4i4.1622
DOI: https://doi.org/10.26483/ijarcs.v4i4.1626

J1 Accumulator-Based Processor for Educational Purposes

Askari Yadollahpour Mansour, Ahmad Habibizad Navin, Amir Masoud Rahmani

191-194

DOI: https://doi.org/10.26483/ijarcs.v4i4.1592
DOI: https://doi.org/10.26483/ijarcs.v4i4.1595
DOI: https://doi.org/10.26483/ijarcs.v4i4.1593
DOI: https://doi.org/10.26483/ijarcs.v4i4.1648
DOI: https://doi.org/10.26483/ijarcs.v4i4.1649
DOI: https://doi.org/10.26483/ijarcs.v4i4.1601

A Review On A Mechanism Of Ensuring Data Storage Security In Cloud Computing

Gayatri V. Shastri, Charul D.Akhade,Dnyaneshwar P.Shirame, Prof.Sandip T.Dhagdi

218-223

DOI: https://doi.org/10.26483/ijarcs.v4i4.1650
DOI: https://doi.org/10.26483/ijarcs.v4i4.1605

Security Concerns In the World of Cloud Computing

Kashish Goyal, Supriya Supriya

230-234

DOI: https://doi.org/10.26483/ijarcs.v4i4.1614
DOI: https://doi.org/10.26483/ijarcs.v4i4.1651

Join Queries Translation from SQL to XML

Bhargavi K, Chaithra H. S.

241-247

DOI: https://doi.org/10.26483/ijarcs.v4i4.1652
DOI: https://doi.org/10.26483/ijarcs.v4i4.1654
DOI: https://doi.org/10.26483/ijarcs.v4i4.1617

Real Time Static Hand Gesture Recognition System Using Hci For Recognition Of Numbers

Prof J.R. Pansare, Jay Shrotriya, Rahul Durrani, Sonam Jaisinghani

258-262

DOI: https://doi.org/10.26483/ijarcs.v4i4.1653
DOI: https://doi.org/10.26483/ijarcs.v4i4.1627
DOI: https://doi.org/10.26483/ijarcs.v4i4.1628
DOI: https://doi.org/10.26483/ijarcs.v4i4.1629
DOI: https://doi.org/10.26483/ijarcs.v4i4.1632
DOI: https://doi.org/10.26483/ijarcs.v4i4.1655
DOI: https://doi.org/10.26483/ijarcs.v4i4.1609

High Capacity Image Steganography Using Curvelet Transform and Bit Plane Slicing

Sheshang D. Degadwala, Amit R. Thakkar, Rikin J. Nayak

307-312

DOI: https://doi.org/10.26483/ijarcs.v4i4.1610

Visual role mining to avoid text complexity using fuzzy logic decision system

G. Narmada, M.K.Shanmathi, Ms.N.D.Thamarai selvi

313-136

DOI: https://doi.org/10.26483/ijarcs.v4i4.1656

PG-RM: Prognostic Approach for optimizing Grid computation using Risk Management Methodology.

Rahul Bose, Prabhat Kumar Singh,Sunil Kumar Singh, S Venkatesan

317-323

DOI: https://doi.org/10.26483/ijarcs.v4i4.1630
DOI: https://doi.org/10.26483/ijarcs.v4i4.1657

Mining of Different Types of Hidden Knowledge from Log Files

Wajih Abdul Ghani Abdul Hussain, Dr. Hussain k. Al _khafaji

329-336

DOI: https://doi.org/10.26483/ijarcs.v4i4.1658

Matching of Fingerprint Geometry by Advanced Divide and Conquer Technique

Sanjukta Pal, Sucharita pal, Prof.(Dr) Pranam Paul

337-343

DOI: https://doi.org/10.26483/ijarcs.v4i4.1620

E-Commerce on Cloud: Issues, Attacks & Security

P. S. Lokhande, B. B. Meshram

344-350

DOI: https://doi.org/10.26483/ijarcs.v4i4.1623
DOI: https://doi.org/10.26483/ijarcs.v4i4.1631

A Model for Inferring Trust for an Unknown User on Social Networking Sites

Amrita Srivastava, Ruchi Verma, Ram Chandra Yadav, S. Venkatesan

357-361

DOI: https://doi.org/10.26483/ijarcs.v4i4.1659
DOI: https://doi.org/10.26483/ijarcs.v4i4.1625
DOI: https://doi.org/10.26483/ijarcs.v4i4.1660

A Novel Architecture for Personalized Image Retrieval from Social Websites

M. Kameswara Rao, Priyanka Mondal, M. Sarath Chandra, Pujari NagaLakshmi,

369-373

DOI: https://doi.org/10.26483/ijarcs.v4i4.1661
DOI: https://doi.org/10.26483/ijarcs.v4i4.1615