1. |
A Hybrid Intrusion Detection System for WSN
Alaa Eissa, Hazem M. El Bakry, Samir Zied
|
IJARCST-34-2015-075 |
10-15
|
2. |
Analysis of Phytochemical and Antioxidant activities of the aqueous extract of some Medicinal Plant
Dr. Syeda Jeelani Basri T, Nagaraja Setty K
|
IJARCST-34-2015-076 |
16-19
|
3. |
The Design Issues in Web Services and Security with Service-Oriented Architecture
Dr. R. Selvam, Dr. R. Prabakaran, R. Kamal Krishnan
|
IJARCST-34-2015-077 |
20-24
|
4. |
Noisy Character Recognition Using Artificial Neural Network
Anand Kumar Sharma, Bhaskar Gupta
|
IJARCST-34-2015-078 |
25-28
|
5. |
Detection and Prevention of DOS on Mobile Adhoc Networks
Guljar Singh, Jasbir Singh Saini, Gurdeep
|
IJARCST-34-2015-079 |
29-31
|
6. |
Data Hiding MPEG-4/AVC Video Streams
T.R Pavan kumar, S.Narasimhulu, C.H.Lawrence Dheeraj
|
IJARCST-34-2015-080 |
32-35
|
7. |
Person Identification with Biometrics Palmprint using Harris Features
Ravindra A. Nikam, Swapnali G. Garud
|
IJARCST-34-2015-081 |
37-39
|
8. |
Overview of ISO Standards and their Impact on ICT and Engineering Practices
Fahad Alturise, Paul Clder
|
IJARCST-34-2015-082 |
40-45
|
9. |
Development o f a Pixel Extractor System for Tiv Character Recognition
Gabriel ShimasaanIorundu, Michael BukohwoEsiefarienrhe
|
IJARCST-34-2015-083 |
46-49
|
10. |
Time Delay Neural Network for Bengali Speech Recognition
Rubya Shaharin, Uzzal Kumar Prodhan, Dr. Md. Mijanur Rahman
|
IJARCST-34-2015-084 |
50-53
|
11. |
A proposed Decision Support System for Managing Educational Human Resources Based on GIS
Nisreen M. Alrawi, Bahaa Shabana, Hazem M. El-bakry, Ahmed A. Saleh
|
IJARCST-34-2015-085 |
54-59
|
12. |
A Survey on Secure Data Self-Destructing Scheme in Cloud Computing
Shivam Mattoo, Anmol Mattoo, Rohan Raygade, Yash Singi, Deepali B. Gothawal, Vishakha A. Metre
|
IJARCST-34-2015-086 |
60-62
|
13. |
Survey Paper on 2D-to-3D Image Conversion Techniques for Multipurpose Imagery
Shubhangi Munde, Tushar A Wagh, Tushar Bangar, Tushar K Wagh, Akash More, Deepali Gothwal
|
IJARCST-34-2015-087 |
63-64
|
14. |
Cloud Operating System
Sami Alshmrany
|
IJARCST-34-2015-088 |
65-68
|
15. |
A Study of Intelligent Text Miner Using GPU
Kanchan Pawar, Prof. A. D. Thakare, Pratiksha Patil, Poonam Kshirsagar, Rupa Solapure
|
IJARCST-34-2015-089 |
69-71
|
16. |
Evolution of Cloud Computing, Comparing Cloud with Grid Computing
Shashank Krishna
|
IJARCST-34-2015-090 |
72-74
|
17. |
3-D Security Checkpoints Imaging Using W-K Algorithm
Feng He, Yi Chen, Qingliang Cao, Yi Ren
|
IJARCST-34-2015-091 |
75-78
|
18. |
Privacy Preserving with Data Freshness by Accomplishing Traceability Over Oruta
J Yadaiah, V Ramesh
|
IJARCST-34-2015-092 |
79-83
|
19. |
GPU Accelerate RD Algorithm Based On MATLAB
Feng He, Yi Ren, Yi Chen, Qingliang Cao
|
IJARCST-34-2015-093 |
84-86
|
20. |
LIGO and Grid Computing-Final Results
Ravikant Dewangan
|
IJARCST-34-2015-094 |
87-90
|
21. |
MPPT Using Improved Variable Step Size INC
GuoPing Chen, TianFu Liu,YiKun Luo
|
IJARCST-34-2015-095 |
91-95
|
22. |
Software Testing With NFR Using Formal Specification And Model Based Technique - A Step Ahead To Produce High Quality Software
L. AMUDHA, T.M. NITHYA, I. INFANT RAJ |
IJARCST-34-2015-096 |
96-99
|
23. |
Identity Based EncryptionUsing Semi- Functional Keys
Yamini.E.J, Ram Lal
|
IJARCST-34-2015-097 |
100-103
|
24. |
A Survey on Enhanced Wireless Systems for Enterprise Automation
Subrata Roy, Kamal Kumar Sharma, Sharad Chauhan
|
IJARCST-34-2015-098 |
104-107
|