Join us Now..! Quality Publication | Full Peer Review | Fast Publication | High Visibility Want to Publish your paper on International Journal of Advanced Research in
Computer Science & Technology (IJARCST)
Email us: editor@ijarcst.com
Call us: +91 - 9779883785

ISSN: 2347 – 8446 (Online)
ISSN: 2347 – 9817 (Print)

1. Last Date of Paper Submission is 15th June 2017.    2. Call for Papers Publishing in IJARCST Vol. 5 Issue 2, (April to June 2017). (Best Quality with Normal Charges and Great Communications).    3. Author Get 15% Discount in our Publication if they Publish upto 10 Papers

Vol. 5 Issue 2, (April to June 2017) is Online Now

Vol. 2 Issue 4, Ver.1 (October - December 2014)  [IJARCST] .........

S.No.

Research Topic

Paper ID

Page No.
1. Robustness of the Feedback PD Compensator used with Second-Order and Third-Order Processes

Galal A. Hassaan
IJARCST-24-2014-267 10-14
pdf
2. A Survey of Software Fault Tolerance, Reliability and Safety

Anuj Verma, Disha Guleria, Karuna Lakhanpal
IJARCST-24-2014-268 15-16
pdf
3. Tuning of a First-order Lag-Lead Compensator used with a Simple Pole plus Double Integrator Process

Galal A. Hassaan
IJARCST-24-2014-269 17-20
pdf
4. Dynamic Routing Protocol for Energy Efficiency Using Gateways in Wireless Sensor Network- A Review

Mahesh Kumar, Ravinder Thakur
IJARCST-24-2014-270 21-23
pdf
5. Bloggers Performance Improving by Exploiting (WordPress) Tools with Ubuntu 12.04 and Apache HTTP Server

Ayad A. Abdulsalam, Asmaa Q. Shareef, Maha A. Sayal
IJARCST-24-2014-271 24-27
pdf
6. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs

Dr. Ashok Koujalagi
IJARCST-24-2014-272 28-38
pdf
7. Harmonic-Aware Scheduling for Fixed-Priority Real-Time Systems

Ashwini G. Ingale
IJARCST-24-2014-273 39-46
pdf
8. An Adaptive Channel Based Grid Topology with Minimum Interference in WMN’s

Maninder Kaur Mangat, Jatinder Singh Saini
IJARCST-24-2014-274 47-51
pdf
9. Vulnerability Analysis of A Device Connected to The Internet

Harish Pichukala, K P Raghuraman
IJARCST-24-2014-275 52-57
pdf
10. Detecting IT Infrastructure Policy Violations in a LAN Environment Using Triggers

Nickson M. Karie
IJARCST-24-2014-276 58-62
pdf
11. Network Security- Virus Attacks and Defence using Antivirus Software

Trupti Shah
IJARCST-24-2014-277 63-65
pdf
12. Data Mining Model For Network Intrusion Detection Using Boyer-Moore Algorithm

Kollu Vijaya Kumar, B Veerendranath
IJARCST-24-2014-278 66-67
pdf
13. Selecting Nodes Based on Resource Availability in Planetlab System

M.Vidhya, D.Gomathi
IJARCST-24-2014-279 70-72
pdf
14. Offloading Android Applications Framework with The Help of Cloud

Harsh Bandhu Parnami, Nishu Bansal, Mayank Arora
IJARCST-24-2014-280 73-77
pdf
15. Innovation of Mechanical Machinery in Medieval Centuries, Part IV: Mechanisms, Gear Trains and Cranes

Galal A. Hassaan
IJARCST-24-2014-281 78-84
pdf
16. Augmented Reality: Applications and Browsers

Fernando Sambinelli, Cecilia Sosa Arias
IJARCST-24-2014-282 85-89
pdf
17. Performance Study of TDNN Training Algorithm for Speech Recognition

Rubya Shaharin, Uzzal Kumar Prodhan, Dr. Md. Mijanur Rahman
IJARCST-24-2014-283 90-95
pdf
18. A Progress of Next Generation Network

M.Buvaneswari, Dr.N.Rajendran
IJARCST-24-2014-284 96-101
pdf
19. Catalog Integration Using Taxonomy

V. Rasagnya, K. Vinay Kumar
IJARCST-24-2014-285 102-105
pdf
20. Authorized Data Sharing in Multiparty Access Control for Online Social Networks

P.Aurchana, M. Marie Jichel Pethris, R.Yasodha
IJARCST-24-2014-286 102-105
pdf
21. Human Computer Interaction Where controlling Computer and Applications through Image Processing and Voice Recognition

Hardik Dinesh Patil, Bhuvaneshwar Annladasula, Viraj Birajdar, Amol Ambodhare
IJARCST-24-2014-287 110-113
pdf
22. REAL-TIME SEGMENTATION ALGORITHM FOR MOVING VEHICLES IN COMPLEX OUTDOOR CONDITIONS

V.Swathy, N.Manjubashini, R.Savitha
IJARCST-24-2014-288 114-122
pdf

Stay connected with us in your favorite flavor!