DOI: https://doi.org/10.26483/ijarcs.v2i4

Published: 2017-01-13

Scattered Context Grammars with Priority

Jakub Křoustek, Stanislav Židek,Dušan Kolář, Alexander Meduna

1-6

DOI: https://doi.org/10.26483/ijarcs.v2i4.606
DOI: https://doi.org/10.26483/ijarcs.v2i4.579

Towards English to Arabic Machine Translation

Ehsan Abdulraheem Mohammed, Mohd. Juzaiddin Ab Aziz

13-18

DOI: https://doi.org/10.26483/ijarcs.v2i3.580
DOI: https://doi.org/10.26483/ijarcs.v2i4.581
DOI: https://doi.org/10.26483/ijarcs.v2i4.582

Enhancing Semantic web Image Search Precision Using Annotated RDF Model

T. Sumathi, G. Anitha Florence, K. Rosaline Mary Clare

27-33

DOI: https://doi.org/10.26483/ijarcs.v2i4.583
DOI: https://doi.org/10.26483/ijarcs.v2i4.584

QoS Congestion Control AQM Algorithms: A Survey

V. Sinthu Janita Prakash, Dr. D. I. George Amalarethinam, Dr. E. George Dharma Prakash Raj

38-41

DOI: https://doi.org/10.26483/ijarcs.v2i4.585
DOI: https://doi.org/10.26483/ijarcs.v2i4.586
DOI: https://doi.org/10.26483/ijarcs.v2i3.587

E-Learning for Simulating the Behavior of AJAX

S. Arulselvarani, Dr. E. Kirubakaran

52-58

DOI: https://doi.org/10.26483/ijarcs.v2i4.588

A Novel Edge Detection Technique using Gray-Level Spatial Correlation based on Statistical Parameters

T Divakar, Dr. R Satya Prasad,M Seetharama Prasad, B Srinivasa Rao, V Rama Krishna

59-63

DOI: https://doi.org/10.26483/ijarcs.v2i4.589

Emerging Techniques for Securing Modern Computer Networks

Hammad Khalid, M. Aqeel Iqbal,M. Usman Shabbir, Umer Farooq

64-70

DOI: https://doi.org/10.26483/ijarcs.v2i4.590

Most Flexible Human Computer Interactions Using Surface Computing Technology

Nousherwan Malik, M. Aqeel Iqbal,Haider Ali, Sardar Waqar Shahroon, Muhammad Naqash

71-77

DOI: https://doi.org/10.26483/ijarcs.v2i4.591
DOI: https://doi.org/10.26483/ijarcs.v2i4.592

Challenges in Face Recognition: A Review

Satonkar S.S., Kurhe A. B., Dr.Khanale P.B.

82-84

DOI: https://doi.org/10.26483/ijarcs.v2i4.593
DOI: https://doi.org/10.26483/ijarcs.v2i4.594
DOI: https://doi.org/10.26483/ijarcs.v2i4.595

Mining Multidimensional Association Rules

Rakesh Sharma, Pinki Sharma

100-103

DOI: https://doi.org/10.26483/ijarcs.v2i4.596

Random Matrices Based Image Secret Sharing

Jyoti Prakash Singh, Amitava Nag, Tapasi Bhattacharjee

104-108

DOI: https://doi.org/10.26483/ijarcs.v2i4.597
DOI: https://doi.org/10.26483/ijarcs.v2i4.598
DOI: https://doi.org/10.26483/ijarcs.v2i3.599
DOI: https://doi.org/10.26483/ijarcs.v2i4.600
DOI: https://doi.org/10.26483/ijarcs.v2i4.601
DOI: https://doi.org/10.26483/ijarcs.v2i4.602
DOI: https://doi.org/10.26483/ijarcs.v2i4.608
DOI: https://doi.org/10.26483/ijarcs.v2i4.603

A Survey of Traditional or Character Oriented Symmetric Key Cryptography

Sukalyan Som, Saikat Ghosh ghoshsaikat6@gmail.com

147-150

DOI: https://doi.org/10.26483/ijarcs.v2i4.604

Recognition of Hand movements to move cursor

Mr. Swapnil M. Gulhane, Mr. A. S. Alvi

151-155

DOI: https://doi.org/10.26483/ijarcs.v2i4.612

Analyzed Throughput of Fast Ethernet and FDDI LANs using OPNET Modeler

Ishu Gupta, Dr. Harsh Sadawarti, Dr. S.N. Panda

156-159

DOI: https://doi.org/10.26483/ijarcs.v2i4.605
DOI: https://doi.org/10.26483/ijarcs.v2i4.657
DOI: https://doi.org/10.26483/ijarcs.v2i4.613

Adaptive Enhancement Technique for MRI Imaging

Mr. G. N. Sarage, Dr. Sagar S Jambhorkar

170-172

DOI: https://doi.org/10.26483/ijarcs.v2i4.610

E-Payment: Issues and Challenges

Nidhi Gupta, Himanshu Sharma, Dolly Lavania

173-175

DOI: https://doi.org/10.26483/ijarcs.v2i4.658

Web Navigation Model based on linear probabilistic approach

Diksha Dani, Dr.Arvinder Kaur, Kamna Singh

176-179

DOI: https://doi.org/10.26483/ijarcs.v2i4.611
DOI: https://doi.org/10.26483/ijarcs.v2i4.659

Bonzar Agility and Agile Methods

Shafivullah Mohd, Dr. A. Yesu Babu,MethodsB. Rama Krishna S Phani Shashank

185-188

DOI: https://doi.org/10.26483/ijarcs.v2i4.660

An Improved Cognition based Authentication Scheme Using PassScript

Raj Mohammed Mohd, Dr. C.Shoba Bindu, Dr. D.Vasumathi

189-193

DOI: https://doi.org/10.26483/ijarcs.v2i4.661
DOI: https://doi.org/10.26483/ijarcs.v2i4.662
DOI: https://doi.org/10.26483/ijarcs.v2i4.614
DOI: https://doi.org/10.26483/ijarcs.v2i4.615
DOI: https://doi.org/10.26483/ijarcs.v2i4.617
DOI: https://doi.org/10.26483/ijarcs.v2i4.618
DOI: https://doi.org/10.26483/ijarcs.v2i4.663

Data Mining Techniques in User Profile Personalization

Robin Singh Bhadoria, Deepak Sain, Prof. Satendra Kumar Jain

230-234

DOI: https://doi.org/10.26483/ijarcs.v2i4.619
DOI: https://doi.org/10.26483/ijarcs.v2i4.629
DOI: https://doi.org/10.26483/ijarcs.v2i4.630
DOI: https://doi.org/10.26483/ijarcs.v2i4.631
DOI: https://doi.org/10.26483/ijarcs.v2i4.664
DOI: https://doi.org/10.26483/ijarcs.v2i4.665
DOI: https://doi.org/10.26483/ijarcs.v2i4.666

Image Compression Using Haar Wavelet Transform

Nidhi Sethi, Ram Krishna, Prof R.P. Arora

262-264

DOI: https://doi.org/10.26483/ijarcs.v2i4.667
DOI: https://doi.org/10.26483/ijarcs.v2i4.668
DOI: https://doi.org/10.26483/ijarcs.v2i4.627
DOI: https://doi.org/10.26483/ijarcs.v2i4.622
DOI: https://doi.org/10.26483/ijarcs.v2i4.669
DOI: https://doi.org/10.26483/ijarcs.v2i4.632

The Effect of Mobile Models on Cyberinformatics

Dr.D. Subbarao, Kantipudi MVV Prasad

285-288

DOI: https://doi.org/10.26483/ijarcs.v2i4.634
DOI: https://doi.org/10.26483/ijarcs.v2i4.670

Hybrid Approach of Data Mining clustering algorithms

Neetu Wadhwa, Er. Alankrita Aggawal, Er. Anish Soni

294-297

DOI: https://doi.org/10.26483/ijarcs.v2i4.671

Web Service Selection: A Model Driven Approach

Jyoti Jakhar, Anshu Parashar

298-301

DOI: https://doi.org/10.26483/ijarcs.v2i4.672

Towards the Improvement of Write-Ahead Logging

Dr.D. Subbarao, Kantipudi MVV Prasad

302-306

DOI: https://doi.org/10.26483/ijarcs.v2i4.635
DOI: https://doi.org/10.26483/ijarcs.v2i4.673
DOI: https://doi.org/10.26483/ijarcs.v2i4.674
DOI: https://doi.org/10.26483/ijarcs.v2i4.651
DOI: https://doi.org/10.26483/ijarcs.v2i4.675

Study of Link-Level Acknowledgements Using AltGum

Dr.D. Subbarao, Kantipudi MVV Prasad

324-327

DOI: https://doi.org/10.26483/ijarcs.v2i4.636
DOI: https://doi.org/10.26483/ijarcs.v2i4.652
DOI: https://doi.org/10.26483/ijarcs.v2i4.653
DOI: https://doi.org/10.26483/ijarcs.v2i4.676
DOI: https://doi.org/10.26483/ijarcs.v2i4.677

Knowledge-Based, Replicated Configurations

Dr.D. Subbarao, Kantipudi MVV Prasad

350-353

DOI: https://doi.org/10.26483/ijarcs.v2i4.637

Multisensor Images Fusion Based on Feature-Level

Firouz Abdullah Al-Wassai, N.V. Kalyankar, Ali A. Al-Zaky

354-362

DOI: https://doi.org/10.26483/ijarcs.v2i4.678
DOI: https://doi.org/10.26483/ijarcs.v2i4.679

Internet Key Exchange Aggressive mode negotiations using Cookie and Nonce Alternatives

Sushma Yalamanchili, M. Kameswara Rao, Ch. Smitha Chowdary

368-371

DOI: https://doi.org/10.26483/ijarcs.v2i4.680

Clustering Categorical Data – Study of Mining Tools for Data Labeling

B. V.V.S Prasad, M. Sathya Narayana,N. Siva Ram Babu, B.Suresh Kumar

372-377

DOI: https://doi.org/10.26483/ijarcs.v2i4.691
DOI: https://doi.org/10.26483/ijarcs.v2i4.638
DOI: https://doi.org/10.26483/ijarcs.v2i4.607
DOI: https://doi.org/10.26483/ijarcs.v2i4.682
DOI: https://doi.org/10.26483/ijarcs.v2i4.609

Web Page Prediction Model: Using a Web Usage Mining

Pravin C. Dilpak, Pramila Chawan

395-399

DOI: https://doi.org/10.26483/ijarcs.v2i4.683

Deploying Rasterization and Voice-over-IP

Dr.D. Subbarao, Kantipudi MVV Prasad

400-403

DOI: https://doi.org/10.26483/ijarcs.v2i4.639

Request Forwarding in Peer to Peer Network

Prof. V.S. Gulhane, Pravin U. Malve

404-407

DOI: https://doi.org/10.26483/ijarcs.v2i4.616

Image De-noising Performance of Rank filters

D. Regan, K.Gunasekaran,S. Vishnupriyan, B. Senthilkumar

408-411

DOI: https://doi.org/10.26483/ijarcs.v2i4.624
DOI: https://doi.org/10.26483/ijarcs.v2i4.684

Unified Structure for Exchange of University Information in Indian Context

Dr.P V Virparia, Dr.V R Rathod, Nehal Daulatjada, Swaminarayan Priya R

418-421

DOI: https://doi.org/10.26483/ijarcs.v2i4.633

Enabling DHTs and Congestion Control with Craven

Dr.D Subbarao, Kantipudi MVV Prasad

422-425

DOI: https://doi.org/10.26483/ijarcs.v2i4.640
DOI: https://doi.org/10.26483/ijarcs.v2i4.685
DOI: https://doi.org/10.26483/ijarcs.v2i4.650
DOI: https://doi.org/10.26483/ijarcs.v2i4.686

Limiting Behavior of The Queuing System M/G/1

Dr. Lokmanya Ravindra Pratap, Dr. Rajesh Kumar Sinha

440-442

DOI: https://doi.org/10.26483/ijarcs.v2i4.620

Wireless Sensor Based Health Monitoring System

B. Persis Urbana, J. Jayashree, J. Vijayashree

443-446

DOI: https://doi.org/10.26483/ijarcs.v2i4.647
DOI: https://doi.org/10.26483/ijarcs.v2i4.648
DOI: https://doi.org/10.26483/ijarcs.v2i4.687
DOI: https://doi.org/10.26483/ijarcs.v2i4.688

Analysis of Quantum Algorithm to Find the Solution of Integer factoriza-tion Problem

Anil Kumar Malviya, Vibhooti Singh, Lokendra Singh Umrao

469-472

DOI: https://doi.org/10.26483/ijarcs.v2i4.654

Elasticities and Index Analysis of Usual Internet Traffic Share Problem

Sharad Gangele, Diwakar Shukla,Kapil Verma, Pankaja Singh

473-478

DOI: https://doi.org/10.26483/ijarcs.v2i4.689
DOI: https://doi.org/10.26483/ijarcs.v2i4.656

Performance Evaluation of Mobile Ad-Hoc Network (MANET) Routing Protocols by Varying Mobility

Yash Veer Singh, Ashutosh Kumar Rao,Dilip Kumar, Alok Goel,Samayveer Singh

488-492

DOI: https://doi.org/10.26483/ijarcs.v2i4.690
DOI: https://doi.org/10.26483/ijarcs.v2i4.621
DOI: https://doi.org/10.26483/ijarcs.v2i4.692

A Study & Emergence To Implement The DISSP Using Netbed Software

G. Satya Vani, G. Varun Reddy,N.K. Vishal Babu, K. Srujan Raju, K. Vekatesh Sharma

501-504

DOI: https://doi.org/10.26483/ijarcs.v2i4.649
DOI: https://doi.org/10.26483/ijarcs.v2i4.625
DOI: https://doi.org/10.26483/ijarcs.v2i4.623
DOI: https://doi.org/10.26483/ijarcs.v2i4.645
DOI: https://doi.org/10.26483/ijarcs.v2i4.704

Synthesizing the Turing Machine Using Secure Modalities

Dr.D. Subbarao, kantipudi mvv prasad, Arun Kumar

610-613

DOI: https://doi.org/10.26483/ijarcs.v2i4.643
DOI: https://doi.org/10.26483/ijarcs.v2i4.703

Semantic Web Technology for Petroleum Industry

S. Venugopal, S. Giri Babu, N. Srinivasa Rao

617-619

DOI: https://doi.org/10.26483/ijarcs.v2i4.707

Deconstructing Red- Black Tress Using Pine

Dr.D. Subbarao, kantipudi mvv prasad, Arun Kumar

620-623

DOI: https://doi.org/10.26483/ijarcs.v2i4.644
DOI: https://doi.org/10.26483/ijarcs.v2i4.701
DOI: https://doi.org/10.26483/ijarcs.v2i4.641
DOI: https://doi.org/10.26483/ijarcs.v2i4.681

SOA: A Service – Oriented Technique for Deep Web Data Extraction

Dr.Ch. G. V. N. Prasad, P. Satyavathi, S. Swathi

510-519

DOI: https://doi.org/10.26483/ijarcs.v2i4.655
DOI: https://doi.org/10.26483/ijarcs.v2i4.626
DOI: https://doi.org/10.26483/ijarcs.v2i4.646
DOI: https://doi.org/10.26483/ijarcs.v2i4.694
DOI: https://doi.org/10.26483/ijarcs.v2i4.696

A LocationGuard Approach: An Efficacious Scheme to Alleviate DoS Attacks

K. Srikanth Reddy, B. Raj Kumar, G. Aruna Kranthi

542-546

DOI: https://doi.org/10.26483/ijarcs.v2i4.697

Predicting Missing Items in a Shopping Cart using Positional Mining Algorithm

Kanna Sandhya Laxmi, T.P.Shekhar, K. Sai Krishna

547-553

DOI: https://doi.org/10.26483/ijarcs.v2i4.693

Querying Fuzzy Object-Oriented Data Based On Fuzzy Association Algebra

Vu Duc Quang, Prof. Doan Van Ban, Dr.Ho Cam Ha

554-561

DOI: https://doi.org/10.26483/ijarcs.v2i4.702

Evaluation of Modern Crime Prediction Techniques

M.Vijaya Kumar, Dr .C. Chandrasekar

562-567

DOI: https://doi.org/10.26483/ijarcs.v2i4.695
DOI: https://doi.org/10.26483/ijarcs.v2i4.698
DOI: https://doi.org/10.26483/ijarcs.v2i4.699
DOI: https://doi.org/10.26483/ijarcs.v2i4.700
DOI: https://doi.org/10.26483/ijarcs.v2i4.628

An Understanding of 128 Bit Architectures using Opemay

Dr.D. Subbarao, kantipudi mvv prasad, M Arun Kumar

591-594

DOI: https://doi.org/10.26483/ijarcs.v2i4.642

Protein Profile Analysis: an exploration with HMM

Er. Neeshu Sharma, Er. Dinesh Kumar, Er. Reet Kamal Kaur

635-640

DOI: https://doi.org/10.26483/ijarcs.v2i4.705
DOI: https://doi.org/10.26483/ijarcs.v2i4.706
DOI: https://doi.org/10.26483/ijarcs.v2i4.709

Validating SIM-A Simulator with ARM Based Keil Software

Dr Manoj Kumar Jain, Gajendra Kumar Ranka

654-659

DOI: https://doi.org/10.26483/ijarcs.v2i4.708