DOI: https://doi.org/10.26483/ijarcs.v1i4

Published: 2017-01-13

DOI: https://doi.org/10.26483/ijarcs.v1i4.2831
DOI: https://doi.org/10.26483/ijarcs.v1i4.136
DOI: https://doi.org/10.26483/ijarcs.v1i4.137
DOI: https://doi.org/10.26483/ijarcs.v1i4.138
DOI: https://doi.org/10.26483/ijarcs.v1i4.139
DOI: https://doi.org/10.26483/ijarcs.v1i4.140

Attacks on Computer Network and Corresponding Security Measures

Gajanan D. Kurundkar, Quadri M.N., Dr.Santosh D. Khamitkar

32-34

DOI: https://doi.org/10.26483/ijarcs.v1i4.141

Handoff Implementation through WAP

Prof. Jayant N. Patil, Dr. Sagar Jambhorkar

35-37

DOI: https://doi.org/10.26483/ijarcs.v1i4.142
DOI: https://doi.org/10.26483/ijarcs.v1i4.143
DOI: https://doi.org/10.26483/ijarcs.v1i4.144
DOI: https://doi.org/10.26483/ijarcs.v1i4.145
DOI: https://doi.org/10.26483/ijarcs.v1i4.146
DOI: https://doi.org/10.26483/ijarcs.v1i4.147

A Comparative Study using Wavelet and SVM for Devanagri Characters Recognition

Anil Kumar N. Holambe, Dr.Ravinder C. Thool,Sushil Kumar N.Hola Ganesh K. Pakle

69-73

DOI: https://doi.org/10.26483/ijarcs.v1i4.148

Image Encryption using the Standard Hill Cipher

Gaurav Agarwal, Saurabh Singh, Meeta Chaudhary

74-76

DOI: https://doi.org/10.26483/ijarcs.v1i4.149
DOI: https://doi.org/10.26483/ijarcs.v1i4.150
DOI: https://doi.org/10.26483/ijarcs.v1i4.151
DOI: https://doi.org/10.26483/ijarcs.v1i4.152

Protocal Usage Model & An Architecture Design for Bluetooth – A Short Range Transaction System

Virparia Paresh V, Kamani Krunalkumar C,Kathiriya Dhaval, Ghodasara Yogesh

87-92

DOI: https://doi.org/10.26483/ijarcs.v1i4.153
DOI: https://doi.org/10.26483/ijarcs.v1i4.154

Haptic Technology: An Evolution towards Naturality in Communication

Mudit Ratana Bhalla, Harsh Vardhan Bhalla, Anand Vardhan Bhalla

97-103

DOI: https://doi.org/10.26483/ijarcs.v1i4.155
DOI: https://doi.org/10.26483/ijarcs.v1i4.156
DOI: https://doi.org/10.26483/ijarcs.v1i4.157

The Next Generation Computing Brainwave-Quantum Computing

T. Venkat Narayana Rao, Shirish Pathania

113-119

DOI: https://doi.org/10.26483/ijarcs.v1i4.158
DOI: https://doi.org/10.26483/ijarcs.v1i4.159
DOI: https://doi.org/10.26483/ijarcs.v1i4.160
DOI: https://doi.org/10.26483/ijarcs.v1i4.161

Advanced Hill Cipher Involving Permutation and Iteration

V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar

141-145

DOI: https://doi.org/10.26483/ijarcs.v1i4.162
DOI: https://doi.org/10.26483/ijarcs.v1i4.210
DOI: https://doi.org/10.26483/ijarcs.v1i4.163

A Survey on DoS Attacks and Countermeasures in Mobile Ad Hoc Networks

M. Gunasekaran, K. Premalatha, B. Gopalakrishnan

156-164

DOI: https://doi.org/10.26483/ijarcs.v1i4.204
DOI: https://doi.org/10.26483/ijarcs.v1i4.165
DOI: https://doi.org/10.26483/ijarcs.v1i4.164

Advanced Hill Cipher Handling the Entire Plaintext as a Single Block

V.U.K. Sastry, Aruna Varanasi, S.Udaya Kumar

180-184

DOI: https://doi.org/10.26483/ijarcs.v1i4.166
DOI: https://doi.org/10.26483/ijarcs.v1i4.209

Fuzzy Clustering in Web Content Mining

Mr.Ranjit R. Keole, Dr. G.R. Bamnote

189-193

DOI: https://doi.org/10.26483/ijarcs.v1i4.167

Distributed Learning Predictors through Web Log Mining using Bayesian Networks

Dr (Mrs) Sujni Paul, Mr. Suresh, Mrs.Beulah Christalin Latha

194-198

DOI: https://doi.org/10.26483/ijarcs.v1i4.168

Semantic Web–A Conceptual Model for Heterogeneous Ontology Environment

Vasavi Bande, Keerthi Manchikanti, M.V.N Bhargava

199-206

DOI: https://doi.org/10.26483/ijarcs.v1i4.211
DOI: https://doi.org/10.26483/ijarcs.v1i4.212
DOI: https://doi.org/10.26483/ijarcs.v1i4.213
DOI: https://doi.org/10.26483/ijarcs.v1i4.169

Some Advantages on Monte Carlo Integration using Variance Reduction Procedures

Behrouz Fathi Vajargah, Farshid Mehrdoust,Ahmad Pourdarvish, Forough Norouzi Saziroud

220-224

DOI: https://doi.org/10.26483/ijarcs.v1i4.170

Clustering Techniques in Web Content Mining

Mr.Ranjit R. Keole, Dr.G.R. Bamnote

225-228

DOI: https://doi.org/10.26483/ijarcs.v1i4.171

Remote Desktop Access using Mobile Phones and an Enhancement for Intra-Mobile Search

Dr.N.Ch.S.N. Iyengar, R.Padma Priya,Vijayasherly, H.Mohamed Ameer Irshad

229-232

DOI: https://doi.org/10.26483/ijarcs.v1i4.214

A Modus to Secure Data with Authentication & Integrity using EHDES

Ramveer Singh, Sanjive Tyagi,Ajay Agarwal, Deo Brat Ojha,

233-236

DOI: https://doi.org/10.26483/ijarcs.v1i4.215
DOI: https://doi.org/10.26483/ijarcs.v1i4.172
DOI: https://doi.org/10.26483/ijarcs.v1i4.216
DOI: https://doi.org/10.26483/ijarcs.v1i4.217

Experimenting Oriya Text Chunking with Divide-Conquer Strategy

Rakesh Chandra Balabantaray, Manoj kumar Jena

256-260

DOI: https://doi.org/10.26483/ijarcs.v1i4.223
DOI: https://doi.org/10.26483/ijarcs.v1i4.224

Secured Authentication for Online Banking using Mobile Phones

Prof. S Sumathy, R Hemalatha, V Jayashree

264-268

DOI: https://doi.org/10.26483/ijarcs.v1i4.225
DOI: https://doi.org/10.26483/ijarcs.v1i4.218
DOI: https://doi.org/10.26483/ijarcs.v1i4.222
DOI: https://doi.org/10.26483/ijarcs.v1i4.219

Robust Application with RoR

Prof. P. Karthikeyan, Rama Pandian M

283-286

DOI: https://doi.org/10.26483/ijarcs.v1i4.220

Nailing Network Partition in Ad Hoc Network

S. Vijayalakshmi, S. Albert Rabara

287-291

DOI: https://doi.org/10.26483/ijarcs.v1i4.221

Working of Web Services using SOA

Mrs. Aarti M. Karande, Prof. Vaibhav N. Chunekar, Dr. B.B. Meshram

292-296

DOI: https://doi.org/10.26483/ijarcs.v1i4.208
DOI: https://doi.org/10.26483/ijarcs.v1i4.173
DOI: https://doi.org/10.26483/ijarcs.v1i4.2827

Web Effort and Defect Prediction using Bayseian Model

Nandakumar .P, Magesh, Anitha Kumari.A

308-314

DOI: https://doi.org/10.26483/ijarcs.v1i4.174
DOI: https://doi.org/10.26483/ijarcs.v1i4.175
DOI: https://doi.org/10.26483/ijarcs.v1i4.226
DOI: https://doi.org/10.26483/ijarcs.v1i4.176
DOI: https://doi.org/10.26483/ijarcs.v1i4.177
DOI: https://doi.org/10.26483/ijarcs.v1i4.178
DOI: https://doi.org/10.26483/ijarcs.v1i4.179
DOI: https://doi.org/10.26483/ijarcs.v1i4.180
DOI: https://doi.org/10.26483/ijarcs.v1i4.181
DOI: https://doi.org/10.26483/ijarcs.v1i4.182

E-Learning for Simulating the Web Server Functionality

S. Arulselvarani, Dr. E. Kirubakaran

360-364

DOI: https://doi.org/10.26483/ijarcs.v1i4.195

Automation of Attendance Posting System Using Messaging Services

Prof.P. Kalyanaraman, Kappagantula Aditya

365-369

DOI: https://doi.org/10.26483/ijarcs.v1i4.199
DOI: https://doi.org/10.26483/ijarcs.v1i4.183
DOI: https://doi.org/10.26483/ijarcs.v1i4.184
DOI: https://doi.org/10.26483/ijarcs.v1i4.203
DOI: https://doi.org/10.26483/ijarcs.v1i4.196
DOI: https://doi.org/10.26483/ijarcs.v1i4.185

IP MASQUERADING: A Network Address Translation Technique

Chiranji Lal Chowdhary, Prashant P.J.

396-407

DOI: https://doi.org/10.26483/ijarcs.v1i4.198
DOI: https://doi.org/10.26483/ijarcs.v1i4.186

Dynamic Routing of Data with Secure Cryptographic Techniques

V. Soumya, S. Durgaprasad,Ma.Jabbar, T. Nagalakshmi

414-419

DOI: https://doi.org/10.26483/ijarcs.v1i4.200
DOI: https://doi.org/10.26483/ijarcs.v1i4.201

Enhancement of Aodv Protocol Performance by reducing the delay

R. Thandeeswaran, Vinithra J, N Hima Bindu

425-430

DOI: https://doi.org/10.26483/ijarcs.v1i4.202
DOI: https://doi.org/10.26483/ijarcs.v1i4.197

Secure E-Alliance Model for E-Communication

Deo Brat Ojha, Meenu Sahni, Abhishek Shukla

440-443

DOI: https://doi.org/10.26483/ijarcs.v1i4.227
DOI: https://doi.org/10.26483/ijarcs.v1i4.207
DOI: https://doi.org/10.26483/ijarcs.v1i4.187
DOI: https://doi.org/10.26483/ijarcs.v1i4.188
DOI: https://doi.org/10.26483/ijarcs.v1i4.189
DOI: https://doi.org/10.26483/ijarcs.v1i4.228
DOI: https://doi.org/10.26483/ijarcs.v1i4.229

The Extended Security in Mobile Ad-hoc Network with Modified PKI

Er.Harjivan Singh Brar, Er. Mandeep Singh Sandhu

489-492

DOI: https://doi.org/10.26483/ijarcs.v1i4.230
DOI: https://doi.org/10.26483/ijarcs.v1i4.231
DOI: https://doi.org/10.26483/ijarcs.v1i4.190
DOI: https://doi.org/10.26483/ijarcs.v1i4.206
DOI: https://doi.org/10.26483/ijarcs.v1i4.191

Undesired Sidetracking in Virtual Classroom Systems

Mrs.Rachana S. Jaiswal, Prof. A. S. Alvi

514-517

DOI: https://doi.org/10.26483/ijarcs.v1i4.192
DOI: https://doi.org/10.26483/ijarcs.v1i4.193

Adaptive SLA enforcement for SOA Applications Using a Middleware

Prof. P. Karthikeyan, Moorthy, S.Senthil Ganesh

526-529

DOI: https://doi.org/10.26483/ijarcs.v1i4.205
DOI: https://doi.org/10.26483/ijarcs.v1i4.234
DOI: https://doi.org/10.26483/ijarcs.v1i4.232
DOI: https://doi.org/10.26483/ijarcs.v1i4.233
DOI: https://doi.org/10.26483/ijarcs.v1i4.194

An Anti-Spoofing Method:Reducing Router Memory

Er.Divyendu Kumar Mishra, Kulvinder Singh Handa

555-563

DOI: https://doi.org/10.26483/ijarcs.v1i4.235
DOI: https://doi.org/10.26483/ijarcs.v1i4.236

TCP-LP: Low-Priority Service via End-Point Congestion Control

P. Swarnalatha, H. Parveen Sultana, M. Pounambal

47-52

DOI: https://doi.org/10.26483/ijarcs.v1i4.6078