DOI: https://doi.org/10.26483/ijarcs.v4i8

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v4i8.1782

Security Enhancement For Reliable Computing In Cloud

K. Subala, Akshaya.V,Vignesh.R.C, Jhansi Lakshmi.D.V, M.Infanto hearty Shamirna

6-9

DOI: https://doi.org/10.26483/ijarcs.v4i8.1757

Agent Vs Object with an in-depth insight to Multi-Agent Systems

Mohamed Osama Khozium, Adnan Ghazi Abuarafah, Hussam Aleem Mohammed

10-17

DOI: https://doi.org/10.26483/ijarcs.v4i8.1764
DOI: https://doi.org/10.26483/ijarcs.v4i8.1802
DOI: https://doi.org/10.26483/ijarcs.v4i8.1767
DOI: https://doi.org/10.26483/ijarcs.v4i8.1803

A Formalism for Checking Consistency of Component-Based Real-Time Systems

Sina Zangbari Kouhi, Dr. Jaber Karimpour, Faranak Nejati

31-38

DOI: https://doi.org/10.26483/ijarcs.v4i8.1756

Virtual-IP Routing Architecture Using OpenFlow

Abhinandan Goti, Annapurna Patil

39-45

DOI: https://doi.org/10.26483/ijarcs.v4i8.1804
DOI: https://doi.org/10.26483/ijarcs.v4i8.1799
DOI: https://doi.org/10.26483/ijarcs.v4i8.1758
DOI: https://doi.org/10.26483/ijarcs.v4i8.6024
DOI: https://doi.org/10.26483/ijarcs.v4i8.1760

Benchmarking Parallel Natural Algorithms for Telecommunications Devices Design

Carlos Henrique da Silva-Santos, Hugo Enrique Hernández-Figueroa

69-74

DOI: https://doi.org/10.26483/ijarcs.v4i8.1773

A New Type Of Node Split Rule For Decision Tree Learning

C. Sudarsana Reddy, Dr. V. Vasu, B. Kumara Swamy Achari

75-80

DOI: https://doi.org/10.26483/ijarcs.v4i8.1762

Mapping of BASEL III and COBIT 5 framework in Banking Sector of India: A Futuristic Approach

Deepti Kushwaha, Ashwini Vasant Gadankush, Dr. Shanktanu Das

81-85

DOI: https://doi.org/10.26483/ijarcs.v4i8.1763
DOI: https://doi.org/10.26483/ijarcs.v4i8.1772

Optimization of Collection Tree Protocol

Harleen Kaur, Prof. Gaurang Raval

92-95

DOI: https://doi.org/10.26483/ijarcs.v4i8.1805

Towards Virtualization in Cloud Computing

Mohammad Masdari, Behnam Zebardast, Yaghoub Lotfi

96-101

DOI: https://doi.org/10.26483/ijarcs.v4i8.1806
DOI: https://doi.org/10.26483/ijarcs.v4i8.1807
DOI: https://doi.org/10.26483/ijarcs.v4i8.1808

A Design of Information Extraction System

J. Pavithra, R.Monisa, G.Ramya,

109-111

DOI: https://doi.org/10.26483/ijarcs.v4i8.1777
DOI: https://doi.org/10.26483/ijarcs.v4i8.1765
DOI: https://doi.org/10.26483/ijarcs.v4i8.1771
DOI: https://doi.org/10.26483/ijarcs.v4i8.1797

Whistleblower’s Protection Act 2011, India: A Critical Analysis

Trishna Chaturvedi, Dr. V.K. Chaurasiya,Nandita Singh, Priyanka Dwivedi

136-141

DOI: https://doi.org/10.26483/ijarcs.v4i8.1766

Web Application Vulnerabilities Monitoring & Avoiding Techniques

Neeraj Sharma, Mohammad Arshad, Anurag Jain

142-145

DOI: https://doi.org/10.26483/ijarcs.v4i8.1809
DOI: https://doi.org/10.26483/ijarcs.v4i8.1790
DOI: https://doi.org/10.26483/ijarcs.v4i8.1796
DOI: https://doi.org/10.26483/ijarcs.v4i8.1810
DOI: https://doi.org/10.26483/ijarcs.v4i8.1787
DOI: https://doi.org/10.26483/ijarcs.v4i8.1780
DOI: https://doi.org/10.26483/ijarcs.v4i8.1811
DOI: https://doi.org/10.26483/ijarcs.v4i8.1776
DOI: https://doi.org/10.26483/ijarcs.v4i8.1794

Emulation of Snort on Deter Testbed

Luvpreet Kaur, Monika Saluj, Krishan Saluja

186-191

DOI: https://doi.org/10.26483/ijarcs.v4i8.1812
DOI: https://doi.org/10.26483/ijarcs.v4i8.1785
DOI: https://doi.org/10.26483/ijarcs.v4i8.1813
DOI: https://doi.org/10.26483/ijarcs.v4i8.1784
DOI: https://doi.org/10.26483/ijarcs.v4i8.1788

Smile detection : A simple Approach

Praveen N, Pavithra K,Manjula, Archana Yashodhar

211-214

DOI: https://doi.org/10.26483/ijarcs.v4i8.1814
DOI: https://doi.org/10.26483/ijarcs.v4i8.1769

A survey of Image Processing and Analysis in Distributed Environment

Pavithra K, Praveen N, Manjula K, Archana Yashodhar

220-222

DOI: https://doi.org/10.26483/ijarcs.v4i8.1798
DOI: https://doi.org/10.26483/ijarcs.v4i8.1783
DOI: https://doi.org/10.26483/ijarcs.v4i8.1786
DOI: https://doi.org/10.26483/ijarcs.v4i8.1755
DOI: https://doi.org/10.26483/ijarcs.v4i8.1792

Sustainable E-Education Through Mobile Enabled Technology

Mrs. Swarnangini Sinha, Ms. Megha Jain, Ms.Surbhi Birani

257-260

DOI: https://doi.org/10.26483/ijarcs.v4i8.1759

Implementation of K-Means Clustering and Fuzzy C-Means Algorithm for Brain Tumor Segmentation

Ms Mrinalini Shringirishi, Mrs. Pritee Gupta,Jitendra Gupta, Mr. Deepak Bhattnagar

261-264

DOI: https://doi.org/10.26483/ijarcs.v4i8.1816
DOI: https://doi.org/10.26483/ijarcs.v4i8.1817

Secure Agent Base Data Transmission in MANET

J. K. Mandal, Khondekar Lutful Hassan

238-241

DOI: https://doi.org/10.26483/ijarcs.v4i8.1761
DOI: https://doi.org/10.26483/ijarcs.v4i8.1815
DOI: https://doi.org/10.26483/ijarcs.v4i8.1775
DOI: https://doi.org/10.26483/ijarcs.v4i8.1768
DOI: https://doi.org/10.26483/ijarcs.v4i8.1770
DOI: https://doi.org/10.26483/ijarcs.v4i8.1779

Image Based Authentication Using Steganography Technique

Satish Kumar Sonker, Sanjeev Kumar,Amit Kumar, Dr. Pragya Singh

277-282

DOI: https://doi.org/10.26483/ijarcs.v4i8.1818

Opinion Mining Task and Techniques: A Survey

Harpreet Kaur, Priya Priya

283-287

DOI: https://doi.org/10.26483/ijarcs.v4i8.1781
DOI: https://doi.org/10.26483/ijarcs.v4i8.1793
DOI: https://doi.org/10.26483/ijarcs.v4i8.1774
DOI: https://doi.org/10.26483/ijarcs.v4i8.6025

Security Analysis Challenges for Future Generation Networks

Sumanth C M, A.Rohini, Avidaasa H C, Sukshma

295-302

DOI: https://doi.org/10.26483/ijarcs.v4i8.1819
DOI: https://doi.org/10.26483/ijarcs.v4i8.1778

An improved Bayesian filtering technique for spam recognition

Ainam Jean- Paul, Adekunle Y.A, Adio A.K

306-310

DOI: https://doi.org/10.26483/ijarcs.v4i8.1800

Semantic Approach for Query Explication

Shruti Gupta, Mahesh Verma

311-314

DOI: https://doi.org/10.26483/ijarcs.v4i8.1791

Blind and Non- blind Image Restoration Techniques

Arshwinder Kaur, Deepankar Verma

315-317

DOI: https://doi.org/10.26483/ijarcs.v4i8.1823
DOI: https://doi.org/10.26483/ijarcs.v4i8.1795
DOI: https://doi.org/10.26483/ijarcs.v4i8.1789
DOI: https://doi.org/10.26483/ijarcs.v4i8.1801

Memory Reclamation by Garbage Collectors: SPECjvm 2008

Nitan S. Kotwal, Shubhnandan S. Jamwal

333-337

DOI: https://doi.org/10.26483/ijarcs.v4i8.1820

Improving Efficiency of MANET by Reducing Queuing Delay Using Hybrid Algorithm

Madhup Shrivastava, Monika Sahu, Sonika Matele, Dr. M. A. Rizvi

338-344

DOI: https://doi.org/10.26483/ijarcs.v4i8.1822
DOI: https://doi.org/10.26483/ijarcs.v4i8.1821