Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
International Journal of Advanced Research in Computer Science
Current
Archives
Author Guideline
Editorial board
Announcements
About
About the Journal
Submissions
Contact
Search
Home
Archives
Vol. 5 No. 4 (2014): SPECIAL ISSUE II April
DOI:
https://doi.org/10.26483/ijarcs.v5i4
Published:
2017-01-13
Articles
Dual Stegnography Scheme for Secure Data Communication using Finite State
S. Srilakshmi
PDF
The Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks
S.V. Subramanyam, P.G.V.Suresh Kumar,Nune Sreenivas, Yoseph Abate
PDF
Imperial Analysis of Threats and Vulnerabilities in Cloud Computing
Ruchita D. Londhe, Swati S. Sherekar, V. M. Thakare
PDF
Finding the Optimal Clusters from Discrete Data using Evolutionary Clustering Algorithm
P.M. Chaudhari, R.V. Dharaskar, V. M. Thakare
PDF
Brain Tumor Detection Using Efficient K-Means Clustering Segmentation
A. L. Bhargavi, G. Anil Kumar
PDF
Chasu-Chat Survey Application using Hadoop
Sree Lekha.G, Vaishali Chavan,Apurva.K, G.Shyam Prasad, 2Sudheer Kumar Battlula, Aditya Jetta
PDF
Detection and Prevention of Premium Number Fraud in Mobile Computing
Marri Rami Reddy, Jadala Vijaya Chandra, Gyaderla Ranjith
PDF
Cloud Computing For Library: A New Vision
B. Kumar
PDF
Optimizing SPARQL queries in Linked Open Data using Heuristic approach
Gouri D. Potdar, Rachel Dhanaraj
PDF
Network Coding for Energy Efficiency in Wireless Networks
K. Srinivas, A.Venugopal Reddy, V.Prashanthi
PDF
A Frame Work for Spatial Query Processing on Spatial Database
T.Aruna Sri, Ch. Sanjay, Sudarson Jena
PDF
A Novel Data Replication Strategy in HADOOP
3K.Durga Natasha, B.Sudheer Kumar, D.Sraveena, K.Sravanthi
PDF
Weather Damage Prophecy using Big-Data Analytics
A. Shruthi, G.Shyam Prasad,CH. Divya Sruthi, P.Bhagavathi
PDF
Improvement of Security in Playfair Cipher
Chinmoy Ghosh, Satyendra Nath Mandal
PDF
Integrity Checking in Cloud Storage using Simple Encryption Algorithm
B. Srinu, S. Ramana Reddy
PDF
Enhancing the Key Pre-Distribution on Wireless Sensor Networks by Reducing Storage Overhead
Manoj R, Tripti C,Y.Md.Riyazuddin, G.Victor Daniel
PDF
Survey and analysis of Indian Sign Language Recognition research
P. R. Futane, R.V. Dharaskar, V M Thakare
PDF
A Modified Community Based Collaborative Approach for Web Search Personalization
Pradnya Prakash Bhagat, Maruska Mascarenhas
PDF
Performance Evaluation of Clustering Methods for Low and High Dimensional Data
Smita Chormunge, Ch. Sanjay, Sudarson Jena
PDF
Profit Maximization via Virtual Resources Allocation in Cloud-Computing
M.G Madhusudha, K. Delhi Babu, D. Giridhar Kumar
PDF
A New Strategy For Video Recommendation
B. Sudheer Kumar, A.Swetha,Ch.Deepa, Ch.Naveen, Y. Divya
PDF
BGIDS-Behavioral Graph based Intrusion Detection System
Ajay Poonia, J.A. Laxminarayana
PDF
Geographical Information System & Remote Sensing in Landslide Vulnerable Mapping
M. Sunandana Reddy, K. Lakshmikanta Reddy
PDF
Network Reliability Evaluation of Fault Tolerant Varietal Hypercube Network
N.K. Barpanda, R.K.Dash, Sudarson Jena
PDF
E-Commerce In Librareis In Light Of Mobile Computing
P. Venkateshwar Rao
PDF
Sensor Based Techniques for Searching Dimension Incomplete Databases
Sneha Arjun Dhargalkar, A.U. Bapat
PDF
Performance Evaluation of LEACH Protocol for Wireless Sensor Network in a Mobile Environment
Padmalaya Nayak, D. Anurag, Ganji Sai Krishna
PDF
A Study on Recent Advancements in Bio-Metric Identity Verification
V. Sandhya, M.Archana,PVRNSSV Sai Leela, Sampath Kumar R
PDF
Efficient Monitoring and Maintenance of Project over the Global
Seshagirirao Boddepalli, GRS Murthy
PDF
Stress Monitoring using Music therapy Techniques for health care and wellness
Ram K. Nawasalkar, V.M. Thakre, Pradeep K. Butey
PDF
Optimized form of Data Representation of Odour Expressions in Human Beings
Suhashini Chaurasia, Vilas M. Thakare
PDF
Innovative TCP over Wireless Networks
Basil Romi Jose, Nagaraj Vernekar
PDF
Modeling and Performance Simulation of Source Initiative Routing Protocol in Wireless Network
S. G. Gupta, V.M. Thakare, R.N. Khobragade
PDF
Forensic Presevation of Digital Evidence on Mobile Devices from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices (EGFFMD)
Rizwan Ahmed, Rajiv V. Dharaskar, Vilas M. Thakare
PDF
Design and Implementation of Energy efficient Routing protocol for wireless Sensor networks
Pavan R. Jagtap, V.M. Thakare, Mohammad Atique
PDF
Strong Authentication for On-line Transactions
J.V.R.S. Sriharsha, S.S.Alekhya, M. Akkalakshmi
PDF
Identifying the Places of Data Hiding and Ways of Digital Evidence Collection in Different Types of File Systems
Manish H Bhagwani, Rajiv V Dharaskar, V. M. Thakare
PDF
Supplanting HDFS with BSFS
D. Santhoshi, T.Tejaswini Singh,V.Teja, K.Shyam Prasad
PDF
The Comparative Study of Automated Face Morphing Methods for Images and Video
Harrmesh Sanghvi, D. R. Kasat,Sanjeev Jain, V. M. Thakare
PDF
Authentication techniques in VANETs-A Survey
Remyakrishnan. P, Tripti C
PDF
Analysis of Various Digital Forensic Techniques for Cloud Computing
Deoyani Shirkhedkar, Sulabha Patil
PDF
Analysis of Fault Tolerance in Hypercube
P. Radhika, Sri Sowmya.G, P.Venkat Reddy, D.Srinivasa Rao
PDF
Analysis of User Movement Behaviour Pattern Mining Approaches for Mobile Environments
R. R. Shelke
PDF
Design Analysis of AND (2T) and OR (2T) Based Low Power Full Adder Circuit
E. Arun Jyothi, K. N.Mahesh Kumar, D. Harish Bhargav
PDF
Comparative Analysis of AODV and SSA Protocol Based on Routing Parameters
Swapneel S. Naik, A.U Bapat
PDF
A Survey on Energy Efficient Multipath Routing Algorithms for Wireless Sensor Networks
K. Chandra Reddy, Chinmaya P Padhy, Sudarson Jena
PDF
Review of Load Balancing Techniques in Cloud Computing Environment: Challenges and Algorithms
G.Narendrababu Reddy, S.Phani Kumar
PDF
Search Engine Optimization Techniques- The Analysis
Sandhya Dahake
PDF
Clustering Techniques for Temporal Data:A Survey
Sweta C. Morajkar, J.A Laxminarayana
PDF
Study of Mobile Cloud Computing Security against Cyber Attacks
Miss. Ankita S. Koleshwar, Mrs. S. S. Sherekar, V.M. Thakare
PDF
An Analysis of Data Privacy Techniques in Cloud Computing
Arvind S. Kapse, V. M. Thakare, Sudarson Jena
PDF
Trusted Environment in Virtual Cloud
Arif Mohammad Abdul, M Balraju,Sudarson Jena, S. Durga Prasad
PDF
Performance Investigation of different Classification Algorithms Using Waikato Environment for Knowledge Analysis
G.Victor Daniel, G.Sunny Demoli,P.Prathyusha, K.Suresh Kumar
PDF
A Survey on Enhancement of Quality of Service in Wireless Data Networks
Nirupama. A, M. Akkalakshmi, Sudarson Jena
PDF
Performance Evaluation of Various Speech Enhancement Techniques
Prathamesh V. Phadke, V.M. Thakare, R.N. Khobragade
PDF
Membership Optimization for Clustering Process in Machine Intelligence-A Practical Approach
Asrar Ahmad, V.M. Thakare, M.A. Atique
PDF
Cloud System Capacity Leasing using the Open Nebula Engine
Archana P. Choudhary
PDF
Sensor Web Service: A Geographical Information System (GIS) Based Model for Reliable Fire Detection in Buildings
S. Kavitha Kavitha
PDF
An Analysis of the Properties of Various Interconnection Networks
K. Karthik, Sudarson Jena, T. Venu Gopal
PDF
Comparative study of DSR, AODV Routing Protocol for WPAN Using NetSim Simulator
Nazia Tabassum Tabassum, Padmalaya Nayak, Saraswati Bhakare
PDF
Lossless Compression of Color Map Images by Context Tree Modeling
Archana P Choudhary
PDF
Devanagari Character Recognition: A Comprehensive Survey
Teja C. Kundaikar, J.A Laxminarayana
PDF
Strategies for Reducing Energy Consumption in Wireless Sensor Networks
Nivedita Karamadi, Nagaraj Vernekar
PDF
Advanced Network Security with Palladium
B.Ramana Reddy, M.Susmitha, B.Sireesha
PDF
Comparison and Simulation of Various Image Compression and Enhancement Techniques
Vaibhav B. Aundhakar, R. N. Khobragade, V. M. Thakare
PDF