DOI: https://doi.org/10.26483/ijarcs.v5i4

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v5i4.2073

The Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks

S.V. Subramanyam, P.G.V.Suresh Kumar,Nune Sreenivas, Yoseph Abate
DOI: https://doi.org/10.26483/ijarcs.v5i4.2074

Imperial Analysis of Threats and Vulnerabilities in Cloud Computing

Ruchita D. Londhe, Swati S. Sherekar, V. M. Thakare
DOI: https://doi.org/10.26483/ijarcs.v5i4.2075
DOI: https://doi.org/10.26483/ijarcs.v5i4.2076
DOI: https://doi.org/10.26483/ijarcs.v5i4.2077

Chasu-Chat Survey Application using Hadoop

Sree Lekha.G, Vaishali Chavan,Apurva.K, G.Shyam Prasad, 2Sudheer Kumar Battlula, Aditya Jetta
DOI: https://doi.org/10.26483/ijarcs.v5i4.2078

Detection and Prevention of Premium Number Fraud in Mobile Computing

Marri Rami Reddy, Jadala Vijaya Chandra, Gyaderla Ranjith
DOI: https://doi.org/10.26483/ijarcs.v5i4.2079
DOI: https://doi.org/10.26483/ijarcs.v5i4.2080
DOI: https://doi.org/10.26483/ijarcs.v5i4.2081

Network Coding for Energy Efficiency in Wireless Networks

K. Srinivas, A.Venugopal Reddy, V.Prashanthi
DOI: https://doi.org/10.26483/ijarcs.v5i4.2082
DOI: https://doi.org/10.26483/ijarcs.v5i4.2083

A Novel Data Replication Strategy in HADOOP

3K.Durga Natasha, B.Sudheer Kumar, D.Sraveena, K.Sravanthi
DOI: https://doi.org/10.26483/ijarcs.v5i4.2084

Weather Damage Prophecy using Big-Data Analytics

A. Shruthi, G.Shyam Prasad,CH. Divya Sruthi, P.Bhagavathi
DOI: https://doi.org/10.26483/ijarcs.v5i4.2085

Improvement of Security in Playfair Cipher

Chinmoy Ghosh, Satyendra Nath Mandal
DOI: https://doi.org/10.26483/ijarcs.v5i4.2086
DOI: https://doi.org/10.26483/ijarcs.v5i4.2087
DOI: https://doi.org/10.26483/ijarcs.v5i4.2088
DOI: https://doi.org/10.26483/ijarcs.v5i4.2089
DOI: https://doi.org/10.26483/ijarcs.v5i4.2090
DOI: https://doi.org/10.26483/ijarcs.v5i4.2091
DOI: https://doi.org/10.26483/ijarcs.v5i4.2092

A New Strategy For Video Recommendation

B. Sudheer Kumar, A.Swetha,Ch.Deepa, Ch.Naveen, Y. Divya
DOI: https://doi.org/10.26483/ijarcs.v5i4.2093
DOI: https://doi.org/10.26483/ijarcs.v5i4.2094
DOI: https://doi.org/10.26483/ijarcs.v5i4.2095
DOI: https://doi.org/10.26483/ijarcs.v5i4.2096
DOI: https://doi.org/10.26483/ijarcs.v5i4.2097
DOI: https://doi.org/10.26483/ijarcs.v5i4.2098
DOI: https://doi.org/10.26483/ijarcs.v5i4.2099

A Study on Recent Advancements in Bio-Metric Identity Verification

V. Sandhya, M.Archana,PVRNSSV Sai Leela, Sampath Kumar R
DOI: https://doi.org/10.26483/ijarcs.v5i4.2100
DOI: https://doi.org/10.26483/ijarcs.v5i4.2101
DOI: https://doi.org/10.26483/ijarcs.v5i4.2102
DOI: https://doi.org/10.26483/ijarcs.v5i4.2103

Innovative TCP over Wireless Networks

Basil Romi Jose, Nagaraj Vernekar
DOI: https://doi.org/10.26483/ijarcs.v5i4.2104
DOI: https://doi.org/10.26483/ijarcs.v5i4.2105
DOI: https://doi.org/10.26483/ijarcs.v5i4.2106
DOI: https://doi.org/10.26483/ijarcs.v5i4.2107

Strong Authentication for On-line Transactions

J.V.R.S. Sriharsha, S.S.Alekhya, M. Akkalakshmi
DOI: https://doi.org/10.26483/ijarcs.v5i4.2108
DOI: https://doi.org/10.26483/ijarcs.v5i4.2109

Supplanting HDFS with BSFS

D. Santhoshi, T.Tejaswini Singh,V.Teja, K.Shyam Prasad
DOI: https://doi.org/10.26483/ijarcs.v5i4.2110

The Comparative Study of Automated Face Morphing Methods for Images and Video

Harrmesh Sanghvi, D. R. Kasat,Sanjeev Jain, V. M. Thakare
DOI: https://doi.org/10.26483/ijarcs.v5i4.2111
DOI: https://doi.org/10.26483/ijarcs.v5i4.2112
DOI: https://doi.org/10.26483/ijarcs.v5i4.2113

Analysis of Fault Tolerance in Hypercube

P. Radhika, Sri Sowmya.G, P.Venkat Reddy, D.Srinivasa Rao
DOI: https://doi.org/10.26483/ijarcs.v5i4.2114
DOI: https://doi.org/10.26483/ijarcs.v5i4.2115
DOI: https://doi.org/10.26483/ijarcs.v5i4.2116
DOI: https://doi.org/10.26483/ijarcs.v5i4.2117
DOI: https://doi.org/10.26483/ijarcs.v5i4.2118
DOI: https://doi.org/10.26483/ijarcs.v5i4.2119
DOI: https://doi.org/10.26483/ijarcs.v5i4.2120
DOI: https://doi.org/10.26483/ijarcs.v5i4.2121

Study of Mobile Cloud Computing Security against Cyber Attacks

Miss. Ankita S. Koleshwar, Mrs. S. S. Sherekar, V.M. Thakare
DOI: https://doi.org/10.26483/ijarcs.v5i4.2122

An Analysis of Data Privacy Techniques in Cloud Computing

Arvind S. Kapse, V. M. Thakare, Sudarson Jena
DOI: https://doi.org/10.26483/ijarcs.v5i4.2123

Trusted Environment in Virtual Cloud

Arif Mohammad Abdul, M Balraju,Sudarson Jena, S. Durga Prasad
DOI: https://doi.org/10.26483/ijarcs.v5i4.2124
DOI: https://doi.org/10.26483/ijarcs.v5i4.2125
DOI: https://doi.org/10.26483/ijarcs.v5i4.2126

Performance Evaluation of Various Speech Enhancement Techniques

Prathamesh V. Phadke, V.M. Thakare, R.N. Khobragade
DOI: https://doi.org/10.26483/ijarcs.v5i4.2127
DOI: https://doi.org/10.26483/ijarcs.v5i4.2128
DOI: https://doi.org/10.26483/ijarcs.v5i4.2129
DOI: https://doi.org/10.26483/ijarcs.v5i4.2130
DOI: https://doi.org/10.26483/ijarcs.v5i4.2131

Comparative study of DSR, AODV Routing Protocol for WPAN Using NetSim Simulator

Nazia Tabassum Tabassum, Padmalaya Nayak, Saraswati Bhakare
DOI: https://doi.org/10.26483/ijarcs.v5i4.2132
DOI: https://doi.org/10.26483/ijarcs.v5i4.2133
DOI: https://doi.org/10.26483/ijarcs.v5i4.2134
DOI: https://doi.org/10.26483/ijarcs.v5i4.2136

Advanced Network Security with Palladium

B.Ramana Reddy, M.Susmitha, B.Sireesha
DOI: https://doi.org/10.26483/ijarcs.v5i4.2137
DOI: https://doi.org/10.26483/ijarcs.v5i3.2135