Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
International Journal of Advanced Research in Computer Science
Current
Archives
Author Guideline
Editorial board
Announcements
About
About the Journal
Submissions
Contact
Search
Home
Archives
Vol. 5 No. 4 (2014): SPECIAL ISSUE II April
DOI:
https://doi.org/10.26483/ijarcs.v5i4
Published:
2017-01-13
Articles
Dual Stegnography Scheme for Secure Data Communication using Finite State
S. Srilakshmi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2073
The Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks
S.V. Subramanyam, P.G.V.Suresh Kumar,Nune Sreenivas, Yoseph Abate
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2074
Imperial Analysis of Threats and Vulnerabilities in Cloud Computing
Ruchita D. Londhe, Swati S. Sherekar, V. M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2075
Finding the Optimal Clusters from Discrete Data using Evolutionary Clustering Algorithm
P.M. Chaudhari, R.V. Dharaskar, V. M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2076
Brain Tumor Detection Using Efficient K-Means Clustering Segmentation
A. L. Bhargavi, G. Anil Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2077
Chasu-Chat Survey Application using Hadoop
Sree Lekha.G, Vaishali Chavan,Apurva.K, G.Shyam Prasad, 2Sudheer Kumar Battlula, Aditya Jetta
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2078
Detection and Prevention of Premium Number Fraud in Mobile Computing
Marri Rami Reddy, Jadala Vijaya Chandra, Gyaderla Ranjith
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2079
Cloud Computing For Library: A New Vision
B. Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2080
Optimizing SPARQL queries in Linked Open Data using Heuristic approach
Gouri D. Potdar, Rachel Dhanaraj
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2081
Network Coding for Energy Efficiency in Wireless Networks
K. Srinivas, A.Venugopal Reddy, V.Prashanthi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2082
A Frame Work for Spatial Query Processing on Spatial Database
T.Aruna Sri, Ch. Sanjay, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2083
A Novel Data Replication Strategy in HADOOP
3K.Durga Natasha, B.Sudheer Kumar, D.Sraveena, K.Sravanthi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2084
Weather Damage Prophecy using Big-Data Analytics
A. Shruthi, G.Shyam Prasad,CH. Divya Sruthi, P.Bhagavathi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2085
Improvement of Security in Playfair Cipher
Chinmoy Ghosh, Satyendra Nath Mandal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2086
Integrity Checking in Cloud Storage using Simple Encryption Algorithm
B. Srinu, S. Ramana Reddy
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2087
Enhancing the Key Pre-Distribution on Wireless Sensor Networks by Reducing Storage Overhead
Manoj R, Tripti C,Y.Md.Riyazuddin, G.Victor Daniel
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2088
Survey and analysis of Indian Sign Language Recognition research
P. R. Futane, R.V. Dharaskar, V M Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2089
A Modified Community Based Collaborative Approach for Web Search Personalization
Pradnya Prakash Bhagat, Maruska Mascarenhas
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2090
Performance Evaluation of Clustering Methods for Low and High Dimensional Data
Smita Chormunge, Ch. Sanjay, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2091
Profit Maximization via Virtual Resources Allocation in Cloud-Computing
M.G Madhusudha, K. Delhi Babu, D. Giridhar Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2092
A New Strategy For Video Recommendation
B. Sudheer Kumar, A.Swetha,Ch.Deepa, Ch.Naveen, Y. Divya
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2093
BGIDS-Behavioral Graph based Intrusion Detection System
Ajay Poonia, J.A. Laxminarayana
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2094
Geographical Information System & Remote Sensing in Landslide Vulnerable Mapping
M. Sunandana Reddy, K. Lakshmikanta Reddy
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2095
Network Reliability Evaluation of Fault Tolerant Varietal Hypercube Network
N.K. Barpanda, R.K.Dash, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2096
E-Commerce In Librareis In Light Of Mobile Computing
P. Venkateshwar Rao
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2097
Sensor Based Techniques for Searching Dimension Incomplete Databases
Sneha Arjun Dhargalkar, A.U. Bapat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2098
Performance Evaluation of LEACH Protocol for Wireless Sensor Network in a Mobile Environment
Padmalaya Nayak, D. Anurag, Ganji Sai Krishna
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2099
A Study on Recent Advancements in Bio-Metric Identity Verification
V. Sandhya, M.Archana,PVRNSSV Sai Leela, Sampath Kumar R
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2100
Efficient Monitoring and Maintenance of Project over the Global
Seshagirirao Boddepalli, GRS Murthy
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2101
Stress Monitoring using Music therapy Techniques for health care and wellness
Ram K. Nawasalkar, V.M. Thakre, Pradeep K. Butey
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2102
Optimized form of Data Representation of Odour Expressions in Human Beings
Suhashini Chaurasia, Vilas M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2103
Innovative TCP over Wireless Networks
Basil Romi Jose, Nagaraj Vernekar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2104
Modeling and Performance Simulation of Source Initiative Routing Protocol in Wireless Network
S. G. Gupta, V.M. Thakare, R.N. Khobragade
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2105
Forensic Presevation of Digital Evidence on Mobile Devices from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices (EGFFMD)
Rizwan Ahmed, Rajiv V. Dharaskar, Vilas M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2106
Design and Implementation of Energy efficient Routing protocol for wireless Sensor networks
Pavan R. Jagtap, V.M. Thakare, Mohammad Atique
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2107
Strong Authentication for On-line Transactions
J.V.R.S. Sriharsha, S.S.Alekhya, M. Akkalakshmi
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2108
Identifying the Places of Data Hiding and Ways of Digital Evidence Collection in Different Types of File Systems
Manish H Bhagwani, Rajiv V Dharaskar, V. M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2109
Supplanting HDFS with BSFS
D. Santhoshi, T.Tejaswini Singh,V.Teja, K.Shyam Prasad
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2110
The Comparative Study of Automated Face Morphing Methods for Images and Video
Harrmesh Sanghvi, D. R. Kasat,Sanjeev Jain, V. M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2111
Authentication techniques in VANETs-A Survey
Remyakrishnan. P, Tripti C
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2112
Analysis of Various Digital Forensic Techniques for Cloud Computing
Deoyani Shirkhedkar, Sulabha Patil
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2113
Analysis of Fault Tolerance in Hypercube
P. Radhika, Sri Sowmya.G, P.Venkat Reddy, D.Srinivasa Rao
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2114
Analysis of User Movement Behaviour Pattern Mining Approaches for Mobile Environments
R. R. Shelke
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2115
Design Analysis of AND (2T) and OR (2T) Based Low Power Full Adder Circuit
E. Arun Jyothi, K. N.Mahesh Kumar, D. Harish Bhargav
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2116
Comparative Analysis of AODV and SSA Protocol Based on Routing Parameters
Swapneel S. Naik, A.U Bapat
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2117
A Survey on Energy Efficient Multipath Routing Algorithms for Wireless Sensor Networks
K. Chandra Reddy, Chinmaya P Padhy, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2118
Review of Load Balancing Techniques in Cloud Computing Environment: Challenges and Algorithms
G.Narendrababu Reddy, S.Phani Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2119
Search Engine Optimization Techniques- The Analysis
Sandhya Dahake
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2120
Clustering Techniques for Temporal Data:A Survey
Sweta C. Morajkar, J.A Laxminarayana
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2121
Study of Mobile Cloud Computing Security against Cyber Attacks
Miss. Ankita S. Koleshwar, Mrs. S. S. Sherekar, V.M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2122
An Analysis of Data Privacy Techniques in Cloud Computing
Arvind S. Kapse, V. M. Thakare, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2123
Trusted Environment in Virtual Cloud
Arif Mohammad Abdul, M Balraju,Sudarson Jena, S. Durga Prasad
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2124
Performance Investigation of different Classification Algorithms Using Waikato Environment for Knowledge Analysis
G.Victor Daniel, G.Sunny Demoli,P.Prathyusha, K.Suresh Kumar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2125
A Survey on Enhancement of Quality of Service in Wireless Data Networks
Nirupama. A, M. Akkalakshmi, Sudarson Jena
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2126
Performance Evaluation of Various Speech Enhancement Techniques
Prathamesh V. Phadke, V.M. Thakare, R.N. Khobragade
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2127
Membership Optimization for Clustering Process in Machine Intelligence-A Practical Approach
Asrar Ahmad, V.M. Thakare, M.A. Atique
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2128
Cloud System Capacity Leasing using the Open Nebula Engine
Archana P. Choudhary
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2129
Sensor Web Service: A Geographical Information System (GIS) Based Model for Reliable Fire Detection in Buildings
S. Kavitha Kavitha
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2130
An Analysis of the Properties of Various Interconnection Networks
K. Karthik, Sudarson Jena, T. Venu Gopal
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2131
Comparative study of DSR, AODV Routing Protocol for WPAN Using NetSim Simulator
Nazia Tabassum Tabassum, Padmalaya Nayak, Saraswati Bhakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2132
Lossless Compression of Color Map Images by Context Tree Modeling
Archana P Choudhary
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2133
Devanagari Character Recognition: A Comprehensive Survey
Teja C. Kundaikar, J.A Laxminarayana
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2134
Strategies for Reducing Energy Consumption in Wireless Sensor Networks
Nivedita Karamadi, Nagaraj Vernekar
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2136
Advanced Network Security with Palladium
B.Ramana Reddy, M.Susmitha, B.Sireesha
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i4.2137
Comparison and Simulation of Various Image Compression and Enhancement Techniques
Vaibhav B. Aundhakar, R. N. Khobragade, V. M. Thakare
PDF
DOI:
https://doi.org/10.26483/ijarcs.v5i3.2135