Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
International Journal of Advanced Research in Computer Science
Current
Archives
Author Guideline
Editorial board
Announcements
About
About the Journal
Submissions
Contact
Search
Home
Archives
Vol. 4 No. 6 (2013): SPECIAL ISSUE II, MAY 2013
DOI:
https://doi.org/10.26483/ijarcs.v4i6
Published:
2017-01-13
Articles
A Survey - Different Models in Cloud Computing
Dharti S. Kute, Ankita S. Patil, Nilima V. Pardakhe
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1688
Intrusion Detection for eliminating Security Issues in Wireless Mobile Ad Hoc Networks
P. R Ubhale, A. M. Sahu
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1690
License Plate Recognition System
Miss. Jayshri V. Choudhary, Mr. Amit M. sahu
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1691
Developing Linux Device Drivers For Audio Codec
Miss.Sapana S. Kukade
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1692
Survey on Face Recognition Under Variable Illuminations and Poses
Ms. Khushboo B.Trivedi, Prof.V.T. Gaikwad
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1693
Survey on Data Mining Technique Using Decision tree For Hepatitis virus
Miss K. P. Lokhande, Prof. Avinash. P. Wadhe
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1694
Energy Efficient Networks : A Survey
Hemant P. Moodliar, Dr. Raju. M. Tugnayat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1695
Analysis of Various Topology Based Routing Protocols in VANET
1Ms. N. V. Pardakhe, Prof. R. R Keole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1696
Infrastructure of Authentication and Authorization for Mobile Users Using Pervasive- PKI
Ms. Poonam. A. Manjare, Prof. R. R Keole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1697
Misuse Detection System Using Various Techniques: A Review
Ms.R.S. Landge, Mr.A.P. Wadhe
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1698
Review Paper on Artificial Neural Networks
Rani Pagariya, Mahip Bartere
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1699
Enhanced Ant Colony Based Algorithm for Routing in Mobile Ad Hoc Network
Ms. Sneha R. Kaware, Prof .K.G. Bagde
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1700
A Comparative Study of Audio and Video Query Retrieval Approaches in Multimedia Databases
Sneha U. Bohra, Prof.Satish Alaspurkar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1701
“The Routing of an Autonomous System with C-Border Gateway Protocol in Networkâ€
Miss. Snehal D. Nanhore, Mr. Mahip M. Bartere
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1702
A Review Paper on Cloud Computing Security
Miss. Trupti S. Lokhande, Prof. Rajeshri R. Shelke
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1703
Optical Burst Switching
Miss. Vaishali K. Bhusari, Mr. Amit M. Sahu
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1704
Faster Retrival Of Webpages Using Memory Caching Technique
Miss. Afroz K.. Khan, Miss. Urmila S. Gavali, Mr. Rajshekhar , Prof. S. P. Aware
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1705
Digital Image Processing
Harshada M. Kariya, Anushree Wasu
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1706
Cloud Management with Open Source Tools
Manish S. Thakare, Akash T. Kuratkar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1707
GSM/GPRS Based Vehicle Tracking System and Speed Detection with Toll Collection
Pratik Prakash Thakare, Vrushali Prakash Thakare, Mayuri Avdhutrao Joshi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1708
Cloud based Implicit Password Authentication System
Ms. Chaitali B. Khodani, Ms. Namrata A. Khodke, Prof. Aditya Bakshi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1709
Single Sign On Certificate Based Authentication for WS-Security
Miss. Prachi M. Kharat, Miss. Prachi A. Deshpande, Prof. Aaditya P. Bakshi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1710
Fraud Detection with the Help of Hidden Markov Model and Neural Network
Sagar P. Jumde, Radha W.Nalamwar, Prof. Sunita P.Aware
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1711
History and Features of a developer tool in iOS: XCODE
Miss Priyanka V. Kanoi, Miss Payal N. ingole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1712
An Task and Time Scheduler System Based on Rich Internet Applications
Miss. Rupali R. Waghmare, Miss. Reshma R. Gatade, Miss. Rashmi R. Rajurkar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1713
Wireless Network Security for IEEE 802.1 1A/B/G and Bluetooth
Mr.Rahul S. Joshi, Mr.Chandrakant A. Atram, Prof.Dr.R.M.Tugnayat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1714
Botnet Analysis and Detection
Prof Amit sahu, B. G. Dalvi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1715
QR Codes and Security Mechanism Using Mobile Phones
Mr. Sarang A. Kotalwar, Prof. Onkar V. Chandure
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1716
A Survey paper on Comparative Analysis on Routing Protocol for Energy Efficiency in MANET
Miss. Namrata R. Borkar, Prof. S.J. Alasapurkar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1717
Design of Game Application using Android Architecture
Miss. Shital V. Narlawar, SonalG.Chopade,VaishnaviC.Vikhore, Sandip A. Kahate
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1718
Vehicular Mobility Simulation For VANET
Miss.Shruti S. Khope, Miss. Swati V.Gayakwad, Prof.Sandip T. Dhagdi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1719
Grid Operating System: Making Dynamic Virtual Services in Organizations
Miss.Snehal S. Dhole, Prof. M. R. Shahade
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1720
Virtual Machine and Network-Performance,Study,Advantages And Virtualisation Option
Miss. Snehal R. Dive, Mr. Amit D.Ingale, Mr.M.R.Shahade
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1721
An Effective Technique For Generation And detection Of QR code
Miss. Usha R. pardhi, Prof. Onkar V. Chandure, Miss. Priyanka S. Atal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1722
Mobile Telephony Over Wi-Fi Using VOIP
Ms. Vaishali R. Mhatarmare, Prof. A. D. Raut
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1723
An Effective mechanism for Ensuring Security of QR Code
Ashish R. Wane, Siddharth P. Jamankar, Onkar V. Chandure
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1724
Challenges and Future Directions in Ad Hoc Networking-Review
K. S. Tayde, A. M. Sahu
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1725
Implementation of Elliptic Curve Cryptography in Primary Field
Miss. Namrata Sable, Mr. Avinash P. Wadhe
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1726
GSM mobile phone based LED scrolling message display system
Priyanka A. Borkar, Ashish K. Muley,Niraj B.Masram, Dr. R.M. Tugnayat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1727
Traffic Square Management System
Sujata V. Padole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1728
ASL Based Hand Gesture Recognition System
Mr. Swapnil A. Bobade, Prof. Vijaya K. Shandilya
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1729
ARM Based Remote control Toy Car
Harish G Langar, Atul P Shinghade, Pavan V Sukode
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1730
WAVE: Wireless Access for Vehicular Environment
Miss Bhagyashri S.Kharate, Prof. Sandip T. Dhagdi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1731
Network Traffic Monitoring with IDS
Ms. P. A. Patil, Prof. R. R Keole
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1732
A Survey On New Approach For Detecting Blackhole Attack
Ankush D. Patil, Jyoti B. Rathi, Yogadhar Pandey
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1733
Methodological Advances in Remote Sensing Image Processing
Amruta G. Chakkarwar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1734
Detection Of Duplicate Code
Ms. Kanchan A. Jadhao, Mr. Shubhendra R.Puri,Nikita S.Varhade, Prof. Ganesh B.Regulwar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1735
Script Identification of Text Words from Indian Document through Discriminating Features
Miss. Priyanka P. Yeotikar, Prof. P. R. Deshmukh
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1736
Design of Electricity Theft Monitoring System in Customer Consumptions
Saurabh Manohar Hadge, Sarang Giridhar Kamble, Prof. A. D. Raut
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1737
Nymble: Blocking Misbehaving Users inAnonymizing Networks
Dipali V. Yelane, Navita Nagdive, Prof. Dr. R. M. Tugnayat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1738
Sharing Backup and Restoring Data Using Android Based Server
Ms.Dhanashri R. Karanjkar, Mr.Gopal P. Dhole, Prof.Sunita P. Aware
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1748
A Novel Implementation of Video Display and Different Application Online Using Html5
Mr Rupal B. Jaiswal, Mr. Sanket N Jadhav, Prof SandipDhagdi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1749
Advancement in Image processing using Android
Mr. Sadanand S . Muktawar, Miss.Juhi R. Bobade, Prof.S.A. Kahate
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1750
A Secure Authentication Using Graphical Password Authentication System: GPAS
Nikhil Arun Pogale, Deepak Ganpatrao Rasekar, Prof. Aditya P. Bakshi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1751
Review Paper on Sentiment Analysis Using Web 2.0 by Classification Method
Miss. Siddhi Patni, Prof. Avinash Wadhe
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1752
A Review: Oracle Big Data Aplliance
Vivek D. Honule, Mrunali G. Bukkawar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v4i6.1754