Join us Now..! Quality Publication | Full Peer Review | Fast Publication | High Visibility Want to Publish your paper on International Journal of Advanced Research in
Computer Science & Technology (IJARCST)
Email us: editor@ijarcst.com
Call us: +91 - 9779883785

ISSN: 2347 – 8446 (Online)
ISSN: 2347 – 9817 (Print)

1. Last Date of Paper Submission is 30th May 2017.    2. Call for Papers Publishing in IJARCST Vol. 5 Issue 2, (April to June 2017). (Best Quality with Normal Charges and Great Communications).    3. Author Get 15% Discount in our Publication if they Publish upto 10 Papers

Vol. 5 Issue 2, (April to June 2017) is Online Now

Vol. 2 Issue Special 1, January to March 2014,  [IJARCST] .........

S.No. Research Topic Paper ID Page No.
1. Preserving the Privacy on Social Networks by Clustering Based Anonymization

J.Poulin, M.Mathina Kani
IJARCST-CF-I-2014-1 11-14
pdf
2. An Efficient Framework for Unified Automation Testing: A Case Study on Software Industry

A.Divya, Mrs.S.Devi Mahalakshmi
IJARCST-CF-I-2014-2 15-19
pdf
3. Optimization of Pattern Matching Algorithm for Network Intrusion Detection System

Karthiga.R, Suresh.P
IJARCST-CF-I-2014-3 20-24
pdf
4. Augmenting the SWS Discovery by Categorization of Web Service

Pradeepha.S, Lakshmipathi.B
IJARCST-CF-I-2014-4 25-28
pdf
5. Privacy Preservation Decision Tree Learning of Functional Dependency Dataset

J.Karthik, J.Preethi
IJARCST-CF-I-2014-5 26-33
pdf
6. Avoid Redundant Matched Substring Using AML Prunes Within Web-Based Framework

Vaishnavi.N, Arockia Jesuraj.Y
IJARCST-CF-I-2014-6 34-37
pdf
7. This Paper is Removed due to Copyright Issue

IJARCST-CF-I-2014-7 38-41
pdf
8. Effective Feature Selection For High Dimensional Data using Fast Algorithm

P.Abinaya, Dr.J.Sutha
IJARCST-CF-I-2014-8 42-47
pdf
9. A Systemfor High Throughput Performanceand Reduce Low Memoryusing Pattern Matching with Hash Key

Viswanathan.V, Suresh.P
IJARCST-CF-I-2014-9 48-51
pdf
10. An Automatic Topic Summarization Using Content Anatomy

R.Sinduja, Dr. S.Senthamarai Kannanr
IJARCST-CF-I-2014-10 52-56
pdf
11. RFID System with IP Based Distributed DBMS

Gladson Joel R
IJARCST-CF-I-2014-11 57-60
pdf
12. Classification of Tissues for Detecting the Multiple Sclerosis Lesions in Brain MRI

R.Vidhya, Mrs.P.Rajarajeswari, Mrs.S.Ellammal
IJARCST-CF-I-2014-12 61-66
pdf
13. Performance Enhancement of an Image Retrieval by Integrating Text and Visual Features

Najimun Nisha S, Mehar Ban K.A
IJARCST-CF-I-2014-13 67-71
pdf
14. Detection of Abandoned Objects by Geometric Alignment of Video Frames

S.S.Karthiga, B.Pandeeswari
IJARCST-CF-I-2014-14 72-75
pdf
15. A Novel Technique to Reduce the Image Noise Using Image Fusion

A.Aushik, Mrs.S.Sridevi
IJARCST-CF-I-2014-15 76-79
pdf
16. ANFIS Classifier Based Lung Tumor Severity Diagnosis

Mohamed Abubakkar Siddique.M, Selva Ganesh.B, Ganesan.R
IJARCST-CF-I-2014-16 80-83
pdf
17. An Effective Method of Stout Face Recognition Using Genetic Algorithm For Haziness and Elucidation

Mohideen, Vijaya Kumar
IJARCST-CF-I-2014-17 84-86
pdf
18. Optic Disc and Optic Cup Segmentation for Glaucoma Classification

K.Kavitha, M.Malathi
IJARCST-CF-I-2014-18 87-90
pdf
19. A Secure Authentication Method for Grayscale Document Images

M.Mahalakshmi, C.Callins Christiyana
IJARCST-CF-I-2014-19 91-94
pdf
20. Fuzzy C-Means Clustering With Local Information and Kernel Metric For Image Segmentation

P.Sivasangareswari, K.Sathish Kumar
IJARCST-CF-I-2014-20 95-99
pdf
21. Face Detection for Human Identification in Surveillance

S.G.Kartheeswari, Ms.B.Vijaya Lakshmi (M.E(Ph.D))
IJARCST-CF-I-2014-21 100-103
pdf
22. Classification of High-Resolution Remotely Sensed Image by Combining Spectral, Structural and Semantic Features Using SVM Approach

Saranya.K, Poomani@Punitha.M
IJARCST-CF-I-2014-22 104-108
pdf
23. Secure Route Discovery in Mobile Ad-Hoc Network Using MAC Based Group Key Management Protocol

K.Pazhanisamy, Dr. Lathaparthiban
IJARCST-CF-I-2014-23 109-113
pdf
24. FACM: Fuzzy Based Resource Admission Control For Multipath Routing in MANET

C.Anecia Mary, Mrs. S.Pushpalatha
IJARCST-CF-I-2014-24 114-119
pdf
25. Trust Metrics Evaluation for Peer-to-Peer Systems

S.Nithya, Dr. Kannan Balasubramanian
IJARCST-CF-I-2014-25 120-125
pdf
26. Cloud Based Mobile Data Storage Application System

V.Malligai, V.Venkatesa Kumar
IJARCST-CF-I-2014-26 126-128
pdf
27. An Enhanced Timeliness for Energy Efficient Relocation of Gateway by AQM in Wireless Sensor Networks

Rahmath Ameena S.S
IJARCST-CF-I-2014-27 129-133
pdf
28. A Study on System Virtualization Techniques

S.Suresh, Dr. M.Kannan
IJARCST-CF-I-2014-28 134-139
pdf
29. Performance Analysis of Scalable Point to Point Routing in Wireless Sensor Networks Using Greedy Forwarding Algorithm

Priyadharshini.P, Krishnaveni.P, Dr.J.Sutha
IJARCST-CF-I-2014-29 140-143
pdf
30. Novel Probability Model to Analyse Redundancy Management for Multipath Routing in Heterogenous Wireless Sensor Network

Vinoshiya.G, Krishnaveni.P, Dr. J.Sutha
IJARCST-CF-I-2014-30 144-147
pdf
31. Multi-Hop Wireless Network Optimization Solution using Automatic Distributed Joint Routing for Delay Sensitive Applications

S.Akila Rajini, J.Raja Shahul Hameed
IJARCST-CF-I-2014-31 148-152
pdf
32. An Efficient Solution for Target Tracking and Node Detection in MWSN

G.Leela Ganapathi, M.Madhumathi
IJARCST-CF-I-2014-32 153-156
pdf
33. Investigations on Job Scheduling Algorithms in Cloud Computing

M.Vijayalakshmi, V.Venkatesa Kumar
IJARCST-CF-I-2014-33 157-161
pdf
34. IM.Vijayalakshmi, IIV.Venkatesa Kumar

K.Leelarani, D.Abitha Kumari
IJARCST-CF-I-2014-34 162-165
pdf
35. A Novel Method for Privacy Preserving Data Publishing

G.Sivaranjani, G.Vaira Suganthi
IJARCST-CF-I-2014-35 166-169
pdf
36. Spectrum Holes Sensing Policy For Cognitive Radio Network Using Reinforcement-Learning

U.Thuslimbanu, D.Abitha Kumari, Sutha.J
IJARCST-CF-I-2014-36 170-173
pdf
37. Efficient Routing Protocol for Update the Position of Node in MANET

G.Renugadevi, R.Renugadevi
IJARCST-CF-I-2014-37 174-177
pdf
38. Peak Transmission of Typical Aware Aggregated Data Using Potential Based Dynamic Routing in Wireless Sensor Network

B.Muthulakshmi, G.Mervin George
IJARCST-CF-I-2014-38 178-181
pdf
38. Peak Transmission of Typical Aware Aggregated Data Using Potential Based Dynamic Routing in Wireless Sensor Network

B.Muthulakshmi, G.Mervin George
IJARCST-CF-I-2014-38 178-181
pdf
38. Peak Transmission of Typical Aware Aggregated Data Using Potential Based Dynamic Routing in Wireless Sensor Network

B.Muthulakshmi, G.Mervin George
IJARCST-CF-I-2014-38 178-181
pdf
39. An Enhanced Algorithm for Papr Reduction in MIMO OFDM/A

Narmatha.T, Sathish Kumar.K
IJARCST-CF-I-2014-39 182-185
pdf
40. Design of Novel Routing Protocol for Wireless Sensor Network

Yasmin Jenifer.A, Jeyalakshmi.C
IJARCST-CF-I-2014-40 186-189
pdf
41. Performance of Multi-flow Wireless Multimedia Transmissions

P.Sangeetha, P.Marichamy, B.Guruprakash
IJARCST-CF-I-2014-41 190-195
pdf
42. Cloud Computing Integrated With Testing to Ensure Quality

S. Rahamath Nazneen, R.Kavitha
IJARCST-CF-I-2014-42 196-199
pdf
43. Privacy Preserving Authentication for Security in VANET

Mahalakshmi.R.S, Alangudi Balaji.N
IJARCST-CF-I-2014-43 200-203
pdf
44. QOS Parameter Optimization For Cognitive Radio Networks

IVinutha.P, IISutha.J
IJARCST-CF-I-2014-44 204-208
pdf
45. Integrated Detection and Localization of Multiple Spoofing Attackers in WSN

Manikandan.S, Alangudi Balaji.N
IJARCST-CF-I-2014-45 209-212
pdf
46. Enhancing the Performance of Wireless Network through Efficient Bandwidth Estimation Technique

A. Khiruthika Devi, S.Rajarajeswari, Dr.J. Sutha
IJARCST-CF-I-2014-46 213-216
pdf
47. Recovering of Node Failure in Wireless Sensor Networks

R.Mohanapriya, C.Jeyalakshmi
IJARCST-CF-I-2014-47 217-220
pdf
48. Implementation of 8 Bit Microcontroller Using VLSI

Chokkalingam.S, Arunprasath.V, Dinesh Kumar.P
IJARCST-CF-I-2014-48 221-224
pdf
49. Implementation of Hyperbolic Tangent Activation Function in VLSI

P. Motcha Mary Rathi Pushpa, K. Manimala
IJARCST-CF-I-2014-49 225-228
pdf
50. LPEDAP: Localized Power Efficient Data Aggregation Tree Protocol for Wireless Sensor Networks

K.M.RAMYA., ME (CSE-IIyr), P. SHANTHI., ME., (Ph.D)
IJARCST-CF-I-2014-50 229-234
pdf
51. Advanced Vehicle Tracking and Model Recognition in Rural Areas using SURF Method

P.Senthilraja, T.Karthikeyan
IJARCST-CF-I-2014-51 235-237
pdf
52. Attribute Based Mechanism Using Cipher Policy Verification

V.Abinaya, V.Ramesh
IJARCST-CF-I-2014-52 238-241
pdf
53. Locating Multiple Spoofing Attackers in Wireless Networks

P.Vijayalakshmi, R.Sankar
IJARCST-CF-I-2014-53 242-245
pdf
54. Efficient Node Localization in Mobile Wireless Sensor Network

M.Rama Prabha, R.Parvadha Devi
IJARCST-CF-I-2014-54 246-249
pdf
55. Intermediate Data Security and Privacy Preserving in Cloud

P.Raghavan, J.Princess Aanish
IJARCST-CF-I-2014-55 250-253
pdf
56. Reliable Data Delivery for Highly Dynamic MANETs Using Adaptive Demand Driven Multicast Routing Protocol (ADMR)

Durkadevi K, Maragatharajan M, Balakannan S.P
IJARCST-CF-I-2014-56 254-258
pdf
57. A Smart Negotiable Agent Based Cloud System for Multilateral e-market

M.Sindu, S.Dhanasekaran
IJARCST-CF-I-2014-57 259-262
pdf
58. Throughput improvement with Decode-Forward and Compress-Forward Channels

A. Ramani, Dr. P.Marichamy
IJARCST-CF-I-2014-58 263-266
pdf
59. Detection and Prevention of Impersonation Attack in Wireless Networks

Ms.B.Lakshmi, Ms.B.Sanmuga Lakshmi, Mr.R.Karthikeyan
IJARCST-CF-I-2014-59 267-270
pdf
60. Identifying the Misbehavior Nodes Using Trust Management in VANETs

Muthukumar.S, Karthick Selvan.R
IJARCST-CF-I-2014-60 271-276
pdf
61. Improve the Utilization and Responsiveness for Parallel Workloads Based on Priority Consolidation in the Cloud

Sutharsiya J, Sundar Rajan R
IJARCST-CF-I-2014-61 277-280
pdf
62. A Robust Scheme for Energy Aware Data Collection for Wireless Sensor Networks

Ramya.D, Ramar.C.K
IJARCST-CF-I-2014-62 281-283
pdf
63. Intelligent Scheduling System for Dynamic Resource Allocation in Cloud Computing

Saranya.S, Murugan.B.S
IJARCST-CF-I-2014-63 284-288
pdf
64. Performance Analysis for MIMO System with Deletion Based on Turbo Code

S.Kannagi, Mr.C.K.Ramar
IJARCST-CF-I-2014-64 289-291
pdf
65. Implementation of Network Security Algorithm on FPGA

L.Saranya Devi, S.Selvi
IJARCST-CF-I-2014-65 292-294
pdf
66. Cloud Server Storage Security Using TPA

K.Meenakshi, Victo Sudha George
IJARCST-CF-I-2014-66 295-299
pdf
67. Address Generator for High Performance WiMAX Deinterleaver

D.Poornima Devi, A.Nandhini, S.Ellammal
IJARCST-CF-I-2014-67 300-302
pdf
68. An Improved Method for Efficient Data Transmission in Wireless Sensor Networks

Kingsly Stephen R, Anju Sebastian, Dr. P.S.K Patra
IJARCST-CF-I-2014-68 303-305
pdf
69. Mitigating Vampire Attack in Wireless Ad-Hoc Sensor Networks

Gowthami.M, Jessy Nirmal.A.G, P.S.K.Patra
IJARCST-CF-I-2014-69 306-309
pdf
70. Ranking Through Clustering for Webdocument Using Semantic Similarity

K.Vanisri, P.Ponnila
IJARCST-CF-I-2014-70 310-313
pdf
71. Frequency Distribution Mining Framework using OPSM

J.Jeejo Vetharaj, S.Jeevitha
IJARCST-CF-I-2014-71 314-316
pdf
72. Feature Subset Selection Algorithm for Large Volumes of Data Based on Clustering

P.Manimaran, M.Selvan
IJARCST-CF-I-2014-72 317-318
pdf
73. An Efficient Processing of Twig Pattern Queries with Dynamic XML Dissemination

Jetlin.C.P, Mercy.W, Dr. P.S.K.Patra
IJARCST-CF-I-2014-73 319-322
pdf
74. Data Separations for Providing Multilevel Trust in Privacy Preserving Data Mining

S.Saranya, Y.Arockia Jesuraj
IJARCST-CF-I-2014-74 323-326
pdf
75. Contour Point Face Recognized Gmail Accessor with Pattern Based Spam Detector

E.Komathi, A.Mani
IJARCST-CF-I-2014-75 327-330
pdf
76. Survey on Detecting SQL Injection and Cross Site Scripting in Multitier Web Applications

R.Stalinbabu, P. Chellammal
IJARCST-CF-I-2014-76 331-334
pdf
77. Accuracy Enhancement of Mining Association Rules

Sindhujaa.N, Anees.M, Dr. P.S.K.Patra
IJARCST-CF-I-2014-77 335-337
pdf
78. Major Disease Diagnosis and Treatment Suggestion System Using Data Maining Techniques

Mariammal.D, Jayanthi.S, Dr. P.S.K.Patra
IJARCST-CF-I-2014-78 338-341
pdf
79. Brain Activity Observed Special Cluster Notion For Identifying Disorders

Saranya.T, ShanthaKumari.S
IJARCST-CF-I-2014-78 342-345
pdf
80. Ardunio for Differently Abled

K.S.Haleema, M.Naveedh Ahamed
IJARCST-CF-I-2014-80 346-349
pdf
81. Neural Network Based Recognizing Surgically Altered Face Images for Real Time Security Application

E.Sumathi, P.RajaRajeswari, S.Ellammal
IJARCST-CF-I-2014-81 350-355
pdf
82. A Novel Approach to Identify the Presence of Noise in Under Water Sea Images

N.Jayachandra, Dr. A.R.Nadira Banu Kamal
IJARCST-CF-I-2014-82 356-360
pdf
83. Eliminate Sql Injection Using LINQ

V. Vilasini, P. Chellamal
IJARCST-CF-I-2014-83 361-364
pdf
84. SADDs – Self Annihilation and Downloadable Data system in Cloud Storage Service

R.Ramachandran, M.P. Revathi
IJARCST-CF-I-2014-84 365-369
pdf
85. Privacy in Public Auditing for Secure Cloud Storage

P.Nagajothi, Mr. R.Baskar
IJARCST-CF-I-2014-85 370-371
pdf
86. SDRP and SSO Mechanism for Impersonation Attack in Wireless Sensor Networks

Subhaponmani S, Balakrishnan C
IJARCST-CF-I-2014-86 372-375
pdf
87. Load Balancing and Coordination of Web Services in Cloud

Lingajothi V, Umarani Srikanth G
IJARCST-CF-I-2014-87 376-379
pdf
88. Multiple Threshold Based Method With Data Smoothing and Atmospheric Pressure Using Bluetooth on Smartphones

Audline Beena. S. P, Uma Maheswari.V
IJARCST-CF-I-2014-88 380-383
pdf
89. Pagination for Wireless M2M Communications with Encoding and Decoding

Amudhavalli. P, Saranya Shree.S
IJARCST-CF-I-2014-89 384-387
pdf
90. Improving Data Accessibility by Using Selfish Nodes in Mobile Ad-hoc Networks

A.U AabithaNasreen, P.Gnanasekaran
IJARCST-CF-I-2014-90 388-392
pdf
91. An Asymmetric Authentication Protocol for Mobile Hand held Devices using ECC over Point Multiplication Method

Sathish Kumar K, Sukumar R, Karthiyayini M
IJARCST-CF-I-2014-91 393-399
pdf
92. Ensure Security of Data in Storage Nodes in Cloud

Mr.S.Samsudeen, Mr.M.Vadivel
IJARCST-CF-I-2014-92 400-402
pdf
93. Successive Path Selection Using SSP in Multihop Cognitive Radio Network

Mr. A.Peter Soosai Anandaraj, Ms.A.Amali Angel Punitha
IJARCST-CF-I-2014-93 403-407
pdf
94. Preserving Flood Attack on Delay Tolerant Network

R.Saranya, W.Lydia Shinny
IJARCST-CF-I-2014-94 408-411
pdf
95. A Secured Content Unobservable on Demand Routing Protocol For Mobile Ad-hoc Network

Vinothini.V, Yuvaraj.R, Dr. P.S.K.Patra
IJARCST-CF-I-2014-95 412-416
pdf
96. Capacity Optimized Topology Control for MANET with Cooperative Communication

P.Deepa, Dr. P.S.K Patra
IJARCST-CF-I-2014-96 417-419
pdf
97. Defending against Energy Draining attack in Wireless Ad-Hoc Sensor Networks

P.Suthahar, R.Bharathi
IJARCST-CF-I-2014-97 420-425
pdf
98. An Improved Method for Data Gathering in Wireless Sensor Networks Using Mobile Collector

R. Kingsly Stephen, P.C. Sarah Prithvika, P.S.K. Patra
IJARCST-CF-I-2014-98 426-430
pdf
99. This paper is remove due to Plagiarism issue

IJARCST-CF-I-2014-99 431-433
pdf
100. Improved Navigation For Visually Challenged With High Authentication Using a Modified Sift Algorithm

Lakshmana Kumar.A, Dr. R.Ganesan
IJARCST-CF-I-2014-100 434-438
pdf
101. Protection Against Denial of Service (DoS) Attacks in Wireless Sensor Networks

Dines Kumar.V.S, Navaneethan.C
IJARCST-CF-I-2014-101 439-443
pdf
102. Optimized Energy-Delay Scheduling During Critical Event Monitoring in Wireless Sensor Networks

Ravisankar. A, Swetha.G
IJARCST-CF-I-2014-102 444-448
pdf
103. Speed Efficient Adder Using Quantum DOT Cellular Automata

P.Sivaraj, C.Kavin Prakash
IJARCST-CF-I-2014-103 449-454
pdf
104. Performance Analysis of Vehicle Detection and Verification Using Resolution Transform

Nithya.R, Siva Sankar.A
IJARCST-CF-I-2014-104 455-458
pdf

Stay connected with us in your favorite flavor!