Join us Now..! Quality Publication | Full Peer Review | Fast Publication | High Visibility Want to Publish your paper on International Journal of Advanced Research in
Computer Science & Technology (IJARCST)
Email us: editor@ijarcst.com
Call us: +91 - 9779883785

ISSN: 2347 – 8446 (Online)
ISSN: 2347 – 9817 (Print)

1. Last Date of Paper Submission is 30th May 2017.    2. Call for Papers Publishing in IJARCST Vol. 5 Issue 2, (April to June 2017). (Best Quality with Normal Charges and Great Communications).    3. Author Get 15% Discount in our Publication if they Publish upto 10 Papers

Vol. 5 Issue 2, (April to June 2017) is Online Now

Vol. 4 Issue 2 (April to June 2016)  [IJARCST] .........

S.No.

Research Topic

Paper ID

Page No.
1. IOT Platforms: A Brief Study

Chaitra Acharya
IJARCST-42-2016-101 10-13
pdf
2. Prevention from Black Hole Attack Using RSA Algorithm

Gaurav Dwivedi, Manveer Kaur
IJARCST-42-2016-102 14-17
pdf
3. Providing new architecture for self- compatible software

Vahid Rezaei
IJARCST-42-2016-103 18-21
pdf
4. Breast Abnormalities Dectection in Digital mammogram using fuzzy C-MEANS clustering and support vector machnine-matlab implementation.

Dr. (Mrs.).D.Pugazhenthi
IJARCST-42-2016-104 22-25
pdf
5. Discover and Prevent the Sinkhole Attacks in Wireless Sensor Network using clustering protocol

Vishwas D B, Chinnaswamy C.N, Dr.T.H.Sreenivas
IJARCST-42-2016-105 26-28
pdf
6. A Black Hole Attack in MANET: A Review

Manu Garg, Er. Pranab Garg
IJARCST-42-2016-106 29-30
pdf
7. AOMDV Protocols in MANETS : A Review

Preeti Aggarwal, Er. Pranab Garg
IJARCST-42-2016-107 32-34
pdf
8. AVOIDING BLACK HOLE ATTACK USING TRUST BASED AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK

Muralidhar B.M,Yuvaraju B.N
IJARCST-42-2016-108 35-37
pdf
9. The Approaches for Availability of Parking Spots on On- Street and Off- Streets

Mahadeva darshan R, Rajesh N
IJARCST-42-2016-109 38-43
pdf
10. Pipelined Flow Optimization and Reduce Conjunction by Using Cross-Layer MAC Protocol in Wireless Sensor Networks

Kavyasri R, Mr.Kiran B N
IJARCST-42-2016-110 40-41
pdf
11. Providing Source Location Privacy in WSN using Random Route Adoption Method

Abhilash N
IJARCST-42-2016-111 42-44
pdf
12. Cost-Effective User Priority based Task Scheduling in Cloud

Dharmendra D P, Rampur Srinath
IJARCST-42-2016-112 45-48
pdf
13. Providing Security Against Attacks & Efficient Data Aggregation by Selection of Uncompromised Leader in WSN

Sonali Joyce Lobo, Dr. H.D Phaneendra
IJARCST-42-2016-113 44-46
pdf
14. Electing a Cluster Head using Distance-Energy Clustering with BEE Optimization in WSN

Priyanka P, R Anitha
IJARCST-42-2016-114 47-49
pdf
15. Congestion Free Priority Based Resource Reservation Mechanism in WSN

Nagarjuna M, Bhat Geetalaxmi Jayram
IJARCST-42-2016-115 50-61
pdf
16. Efficient Localized Multihop Routing in Wireless Sensor Network

RashmiM, Rampur Srinath
IJARCST-42-2016-116 62-65
pdf
17. Energy Opportunities theory used For Relay Node in Wireless Sensor Networks

Rashmi GR, Vanamala C K
IJARCST-42-2016-117 66-69
pdf
18. Enforcing Security for Smartphone user by crowdsourcing model using Internet of things

Pallavi A R, Annapurna V K
IJARCST-42-2016-118 70-72
pdf
19. Methods for Secure Public Auditing in Cloud Storage

Tejashwini K, Sanjay Kumar C K
IJARCST-42-2016-119 73-76
pdf
20. Parallel Computing for Continuous Regression Automation Framework

Omkar P, Rampur Srinath
IJARCST-42-2016-120 77-80
pdf
21. Encryption Algorithms: A Survey

Swathi S V, Lahari P M, Bindu A Thomas
IJARCST-42-2016-121 81-88
pdf
22. Load Balanced Data Delivery Using Mobile Sink in Wireless Sensor Network

Anisha P A, Dr. K Raghuveer
IJARCST-42-2016-122 89-91
pdf
23. Secure Hash Design & Implementation Based On Md5 & Sha-1 Using Merkle – Damgard Construction

Shaik.Mohammed Sharief
IJARCST-42-2016-123 92-94
pdf

Stay connected with us in your favorite flavor!