Join us Now..! Quality Publication | Full Peer Review | Fast Publication | High Visibility Want to Publish your paper on International Journal of Advanced Research in
Computer Science & Technology (IJARCST)
Email us: editor@ijarcst.com
Call us: +91 - 9779883785

ISSN: 2347 – 8446 (Online)
ISSN: 2347 – 9817 (Print)

1. Last Date of Paper Submission is 15th December 2017.    2. Call for Papers Publishing in IJARCST Vol. 5 Issue 4, (October to December 2017). (Best Quality with Normal Charges and Great Communications).    3. Author Get 15% Discount in our Publication if they Publish upto 10 Papers

Vol. 5 Issue 4, ( October to December 2017) is Online now

Vol. 2 Issue 1, Ver. 2, (Jan. - Mar. 2014)  [IJARCST] .........

S.No. Research Topic Paper ID Page No.
25. New Approach of Document Pattern Recognition Using Bi-Cubic Interpolation

M.BOUTAOUNTE, A.ELBALAOUI, Y.OUADID, A.MERBOUHA
IJARCST-21-2014-45 110-114
pdf
26. Pattern Recognition by Graphs: Application to Printed Tifinagh Character

Y.OUADID, B. MINAOUI, M.FAKIR, O.ABOULALA, M.BOUTAOUNTE, A.ELBALAOUI
IJARCST-21-2014-46 115-118
pdf
27. Intelligent Security System for Industries by Using GPS and GSM

Nandeesh G S, B Srinivasalu reddy, Sunil Kumar K M
IJARCST-21-2014-47 119-121
pdf
28. Confidential data protection using Fingerprint Minutiae

Namita Chandra, Ashwini Taksal, Dhanshri Shinde, Archana Lomte
IJARCST-21-2014-48 122-125
pdf
29. Establishing Video Multicast over TDMA-Based Wireless Mesh Networks Using SVC

Suriya Praba.P.V, Saravana Kumar.S
IJARCST-21-2014-49 126-131
pdf
30. A SECURING AND SHARING DATA LESS COST-EFFECTIVE USING MULTICLOUD STORAGE

Priyadharsshini.C, SathishKumar.S, Ranjidha.P
IJARCST-21-2014-50 132-136
pdf
31. An Eyes-Free Model Implementation: Voice Based Optical Character Recognition for Mobile Devices

Preethi.P, Baskaran.G, Christo Paul.E
IJARCST-21-2014-51 137-141
pdf
32. Model for Prediction of Dropout Student Using ID3 Decision Tree Algorithm

Sweta Rai, Priyanka Saini, Ajit Kumar Jain
IJARCST-21-2014-52 35-39
pdf
33. Performance Upgradation of a Transform Domain based Steganography using Neural Logics

Vikas Nain, NISHU BANSAL
IJARCST-21-2014-53 150-153
pdf
34. Scrutiny of DDoS Attacks Defense Mechanisms

Ms. Diksha Kale, Prof. Vijay Bhosale
IJARCST-21-2014-54 154-157
pdf
35. A Survey on Node Recovery from a Failure in Wireless Sensor Networks

S.Sathish, A. Lawrance Ramesh, G. Sarath Kumar
IJARCST-21-2014-55 158-161
pdf
36. Investigating the Privacy Preserving and Efficient Scheduling of Sensitive Datasets in Cloud Storage

Pradeeba. K, Baskaran.G
IJARCST-21-2014-56 162-166
pdf
37. Efficient Mapping of Resources Over Networked Cloud through ILS

Sindhu.S, Ramachandran.A
IJARCST-21-2014-57 167-171
pdf
38. Secured Hello Handshake Authentication (SHHA) in MANET

N.Sivabalasubramanian, T.Parameswaran, R.Ramkumar
IJARCST-21-2014-58 172-177
pdf
39. A Smart Traffic Management System using the Spatio-Temporal Relationships for an Emergency Vehicle

K.Udhayakumar, S.V.Manisekaran, R.RamKumar
IJARCST-21-2014-59 178-183
pdf
40. Laying the foundation for software development industry in Zimbabwe

Caroline Ruvinga, Lawrence Ruvinga, Munyaradzi Zhou, Samuel Musungwini, Tinashe Gwendolyn Zhou
IJARCST-21-2014-60 184-186
pdf
41. Interactive Supervised Attribute Clustering for Microarray Sample Classification

N.Sakthi Devi, Ms. S.Banupriya, G.Parvathi
IJARCST-21-2014-61 187-190
pdf
42. Rationalization of Certificate Revocation Based on Cluster for Mobile Ad Hoc Network

Revathy.M, Durgadevi.E, Saravana kumar.S
IJARCST-21-2014-62 191-193
pdf

Stay connected with us in your favorite flavor!