DOI: https://doi.org/10.26483/ijarcs.v2i5

Published: 2017-01-13

Applying Wall Layer Building Algorithm for Optimizing the Equal Dimension Boxes in Vehicle Load Filling

J. Sheik Mohamed, B. Narendra Babu,Dr. S. Sreekanth, Dr. N. Ch. S. N. Iyengar

12-17

Face Detection and Tracking Techniques: A Review

Nandita Sethi, Alankrita Aggarwal

23-27

Performance Evaluation Of Spatial Indexing Techniques

S Mahaboob Hussain, Pullela S V V S R Kumar, Dr MHM Krishna Prasad

59-64

Generalized Representation of Advice Using Sequence Trace Diagram

Shruti Dubey, Neha Rahatekar, Ugrasen Suman

80-84

Image Change Detection for Earthquake Damage Assessment

Sanjay Kumar Jain, Ashok Kumar Dubey

85-89

Management of Node Mobility in Mobile Ad Hoc Networks Using Multipath Routing Protocol

Jhunu Debbarma, Rupanjal Debbarma,Shimal Das, Dr. Sudipta Roy

107-113

Security Coding Technique for Web Applications

Shylaja Akinapally, K.Srinivas,T.P.Shekhar, A.Sanjeeva Raju

114-120

A Frame Work Using Hyper-Based Methods for Image Registration and Super Resolution

Suresh Babu Yalavarthi, D.V. Chandra Shekar, Dr.G.S.Prasad

121-125

A New Modified Fuzzy Rule Based Edge Detection

Er.Manpreet Kaur, Ms.Sumeet Kaur

144-147

Cyber Crime in India

Susheel Chandra Bhatt, Durgesh Pant

153-156

Modeling the mutual coupling of circular DRA MIMO array using Artificial Neural Networks

K Jagadeesh Babu, Dr. K Sri Ramakrishna,Dr.L Pratap Reddy, J Lakshmi Narayana

157-160

Audio Watermarking by Reducing Noise Using Fast Fourier Transformation

Parminder Singh, Preetinder Kaur Mann, Mandeep Singh Sandhu

171-174

Adopting K-Mean Clustering Algorithm on Multiple Choices Feedback Opinion Mining

J. Sheik Mohamed, P. Nirmala,Dr. P. Chitti Babu, Dr. S. Ramakrishna

203-206

A Novel Economic Based Resource Allocation Model for Grid

Ashish Chandak, Bibhudatta Sahoo, Ashok Kumar Turuk

207-211

FRI Miner: A Tool for Frequent Regular Itemsets Mining

KHK Sairaj, Dr MHM Krishna Prasad

212-216

Rectangular features extraction from aerial image of urban area

Deshmukh Nilesh K., Khamitkar Santosh D., Bhalchandra Parag U.

217-220

A Proposal for Construction of P-Box

Palash Dutta, Tazid Ali

221-225

A Survey on Routing Protocols of Wireless Sensor Networks

Seyed Reza Taghizadeh, Dr. Shahriar Mohammadi

234-254

Combined Method of Routing Multimedia Data in Computer Networks

Safwan Al Salaimeh, Khaldoun Besoul, Khaled Batiha

259-260

Filtering Spam Emails Based on User Behaviors

Mashael Alsowaiel, Omar Batarfi

261-266

High Speed & Highly Secured Image Annotation Using Soft and Hard Watermarks

Anup.V. Kalaskar, Prof. YashKshirsagar, Shilpa.R.Jadhav

286-290

Pattern Discovery using Coherent Rules

Praveen Kumar Ullengala

291-296

Security Issues & Challenges in Wireless Mesh Networks

Shivlal Mewada, Umesh Kumar Singh

301-304

Protection based Routing Mechanism for Ad-hoc Network

Deshraj Ahirwar, Yogendra kumar Jain, Geetika S. Pandey

309-315

Huddle based Harmonic K means Clustering Algorithm

S. Adaekalavan, Dr. C. Chandrasekar

316-318

A study on Penetration Testing

S. Angel, Dr.S. Sarala

395-398

Skeletal Bone Age Assessment – Research Directions

P. Thangam, K. Thanushkodi, T.V.Mahendiran

415-423

Evaluating the Effectiveness of Generic Personalized WebSearch

N.Venkata Ramana, Prof. D.Raghu, Ch.Raja Jocob

444-449

Advanced Reputation Management and P2P Networks

Ranjit Kumar. Ravi, Swarnalatha.S, Srikanth. Jatla

455-460

C-Queued Technique against SQL injection attack

Sumit Dhariwal, Romil Rawat, Nikhil Patearia

461-464

An Enhanced RSA Public key Cryptographic Algorithm

Ravindra Babu Kallam, Dr. S. Udaya Kumar,V.Shravan Kumar, Dr.A. Vinaya Babu

497-499

E-Learning Standards and their Necessity

Bharat Singh Deora, Prof. S.S. Sarangdevot

500-504

Efficient personalization and Recommendation Methods for Web Mining

Mahendra Pratap Singh Dohare, Premnarayan Arya, Vinod Kumar

505-509

Studying Satellite Image Quality Based on the Fusion Techniques

Firouz Abdullah Al-Wassai, N.V. Kalyankar, Ali A. Al-Zaky

516-524

Key Generator based secured system against SQL-Injection attack

Sumit Dhariwal, Romil Rawat, Nikhil Patearia

525-528

Survey on Applications nf Social Network Analysis

Mrs. L. Rajeswari, Dr.S.S. Dhenakaran

529-532

An Effective Way of Knowledge Representation by FRS

Shilpa Kalra, Naveen Hemrajani,Savita Shiwani, Ruchi Dave

538-540

Cyclic groups of Elliptic curves-An Implementation to Cryptography

A.Chandra Sekhar, G,Naga Lakshmi,B.Ravi Kumar G.Sivanagamalleswar Rao

544-546

Android Mobile Security – An Issue of Future

Dr. S. O. Khanna, Mr. Pritesh Patel

547-549

Mining Regular Patterns in Transactional Databases using Vertical Format

G. Vijay Kumar, M. Sreedevi, NVS. Pavan Kumar

581-583

Optimal Routing Algorithm in a Octagon-Cell Network

Sanjukta Mohanty, Dr Prafulla ku. Behera

625-636

Cluster Based Authentication algorithm to deliver packet data over 802.11

Rajwinder Kaur, Mr. Sandeep Singh Kang, Hina Wadhwan

656-660

Efficient Frequent Itemset Discovery Method in Uncertain Data

Sandhya Rawat, Ajit Kumar Shrivastav, Sanjaydeep Singh Lodhi

661-667

Face Emotion Recognition Using Optimality Parameters Eye and Lip in Different Geographical Area

Ahmad Habibizad Navin, Mehdi Akhari ,Mirkamal Mirnia, Nima Jafari Navimipour

691-695