Join us Now..! Quality Publication | Full Peer Review | Fast Publication | High Visibility Want to Publish your paper on International Journal of Advanced Research in
Computer Science & Technology (IJARCST)
Email us: editor@ijarcst.com
Call us: +91 - 9779883785

ISSN: 2347 – 8446 (Online)
ISSN: 2347 – 9817 (Print)

1. Last Date of Paper Submission is 15th November 2017.    2. Call for Papers Publishing in IJARCST Vol. 5 Issue 4, (October to December 2017). (Best Quality with Normal Charges and Great Communications).    3. Author Get 15% Discount in our Publication if they Publish upto 10 Papers

Vol. 5 Issue 4, ( October to December 2017) is Online now

Vol. 3 Issue 2, Ver.1 (April - July 2015)  [IJARCST] .........

S.No.

Research Topic

Paper ID

Page No.
1. CHANGE MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES: LEVERAGING INFORMATION TECHNOLOGY

AKOJEDE ESTHER TEMITOPE
IJARCST-32-2015-001 10-16
pdf
2. Farm Automation Using Cloud and Sensor Network : A Survey

Prof.Dipali Gosavi, Prof.Neha Jamdar, Dipak Kamdam, Sachin Khedkar, Rahul Kote, Laxman Thorat
IJARCST-32-2015-002 17-18
pdf
3. Analysis of Aspect Oriented Software Quality (AOSQ) Model

Urvashi Chauhan, Shrddha Sagar
IJARCST-32-2015-003 19-21
pdf
4. Study of Protein Structure Using Data Mining- A Survey

Pankaj Kumar Dwivedi, Sachin Dube
IJARCST-32-2015-004 22-24
pdf
5. Nested Testimony Model to Access Cloud Data

Avinash Kumar, S. Aravinth Kumar, Akhil Kumar Tripathi
IJARCST-32-2015-005 25-27
pdf
6. Managing Big-data over Social Media: A Survey

Priya Sharma, Keshav Gupta
IJARCST-32-2015-006 28-30
pdf
7. Analysis of Crosscutting concern metrics of AOSD

Swheta Gokulia, Shrddha Sagar
IJARCST-32-2015-007 31-34
pdf
8. Challenges with Hadoop

Tushti Naryani
IJARCST-32-2015-008 35-37
pdf
9. GUARDING APPROACH FOR STORING SECRETE DATA OVER CLOUD

Akhil Kumar Tripathi, S. Aravinth Kumar, Avinash Kumar
IJARCST-32-2015-009 38-40
pdf
10. Performance Tuning - Accounts Receivable Process on Hibernate

Tushti Naryani
IJARCST-32-2015-010 41-44
pdf
11. Concealment of Data in Multi-keyword Ranked Search over Encrypted Cloud

S.Nagapadhmapriyaa, S.Aravinth Kumar
IJARCST-32-2015-011 45-47
pdf
12. Energy Audit of University Polytechnic of RGPV & Boys Hostel

Dineshwar Bansod, Dr. Pankaj Jain, Er. Anurag Gour
IJARCST-32-2015-012 48-52
pdf
13. Ultra Wide Band – Boon to the Industry

Krithi Anathakrishna Bekal, Tarik Eltaeib
IJARCST-32-2015-013 53-55
pdf
14. Partial Duplicate Image Retrieval Using Saliency Map

Pansare Poonam Shivaji, Jadhav Shamal Suresh, Borchate Sheetal Bajirao, Gaikwad Komal Ramdas
IJARCST-32-2015-014 56-58
pdf
15. Routing Energy Efficient Protocol For Wireless Sensor Networks

Muhammed Irfan S, Divya A
IJARCST-32-2015-015 59-62
pdf
16. Prediction of Defects in Software Using k-Nearest Neighbor Algorithm for Cost Reduction

Shivangi Govil, Nupur Chugh
IJARCST-32-2015-016 63-65
pdf
17. A Survey of Three Different Data Structures to Manage Mega Datasets in DBMS

Minoo Khosravani Dehkordi, Lawal Adamu, Umapathy Eganathan, Shivakumar Kalimuthu
IJARCST-32-2015-017 66-69
pdf
18. Motion Detection Security Technique in a Smartphone for Visually Impaired Users

Prof. Deepali Gosavi, Sarvesh Athawale, Mohd. Javed Ali, Tejal Birajdar, Dipak Patil
IJARCST-32-2015-018 70-71
pdf
19. Use Of RFID In Library Management System: A Practical Implementation

Rishabh Jain, Sakshi Sharma, Tushar agarwal, Shivanshu Gupta
IJARCST-32-2015-019 72-75
pdf
20. THE IMPACT OF FORMS AND SIZES FOOTINGS ON THE CORNER OF COLLAPSE TRIANGLE IN SANDY SOIL

El-Samny.M.K, Elsideek M. B., Abd Elsamee.W.N
IJARCST-32-2015-020 77-85
pdf
21. Android based health monitoring using an SMS based telemedicine system

Neelambike S, Sushmitha M.P, Uzma Afrin, Shruthi.N, Sindhu K.V
IJARCST-32-2015-021 86-88
pdf
22. Energy Efficient Wireless Sensor Network to Increase Network Lifetime.

Varinder Pal Singh Sandhu, Saurabh Kumar
IJARCST-32-2015-022 89-92
pdf
23. CRYPTOGRAPGHY IN CHAOTIC SYSTEM

Pawan, Shruti Sharma, Salam Glain Thomson Singh
IJARCST-32-2015-023 93-95
pdf
24. SMS ENCRYPTION USING NTRU ALGORITHM

Amanpreet Kaur, Navpreet Singh
IJARCST-32-2015-024 96-100
pdf
25. Security issues in WSN and Enhancing Base station

Shivani Jindal, Dr. Rajesh Gargi
IJARCST-32-2015-025 101-103
pdf
26. Entire Edge Dominating Transformation Graphs

V. R. KULLI
IJARCST-32-2015-026 104-106
pdf
27. A Cryptography Technique to Secure the Network Using Improved Spread Spectrum Approach

Er. Heena garg, Er. Seema mehla
IJARCST-32-2015-027 107-110
pdf
28. Protein Function Prediction Using Support Vector Machine (SVM) and Radial Basis Function (RBF) Kernel function

Pankaj kumar dwivedi, Priya Sharma
IJARCST-32-2015-028 111-113
pdf
29. Fuzzy Swarm intelligence approach to improve QOS(quality of service) in MANET

Sonal Khurana, Garima Chaudhary
IJARCST-32-2015-029 114-117
pdf
30. Big-Data Analytics To Predict Election Results

Priya Sharma, Pankaj Kumar Dwivedi
IJARCST-32-2015-030 118-120
pdf
31. Genetic Improved Morphological Operators for IMAGE ENHANCEMNET of Aerial Images

Er Aastha Pathak, Matish garg
IJARCST-32-2015-031 121-125
pdf

Stay connected with us in your favorite flavor!