1. |
Mobile Devices and Platform Security: A review on Mobile Device Malware and Botnets
Erick K. Rotich, Metto S. Kimutai, Kittur Philemon K, Ikhoa P. Anselmo
|
IJARCST-33-2015-055 |
10-15
 |
2. |
A Survey on Spectrum Utilization: Measurement and Prediction
Jie Chang, Feng He
|
IJARCST-33-2015-056 |
16-17
 |
3. |
BRAIN FINGER PRINTING
Dr.Lakshmi. R, Dr. K. K. Jayavardhanan
|
IJARCST-33-2015-057 |
18-24
 |
4. |
Hop-by-Hop Message Authentication Based on Block Cipher Approach in Wireless Sensor Networks
Srishaila Patil.B, Manjunath.C.R
|
IJARCST-33-2015-058 |
25-27
 |
5. |
Design of Access for I/O Operation for LXI Based DAQ Device
Jaganath G M, Panchaksharayya S Hiremath, Madhu B R
|
IJARCST-33-2015-059 |
28-32
 |
6. |
An Approach for Data Processing in Big Data Application Using Distributed and Centralized Cache (D-Cache)
LAKESH, A.K.P.Kumar
|
IJARCST-33-2015-060 |
33-36
 |
7. |
Measurement of velocity and Acceleration of human Movement for Analysis of Body Dynamics
Manoj S Nadig, Satish kumar N
|
IJARCST-33-2015-061 |
37-40
 |
8. |
Social Based Q&A System in Cloud Environment
G.Taruni, A.P.Siva Kumar
|
IJARCST-33-2015-062 |
41-43
 |
9. |
A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks
B.Tharika, A.R.Jothimani
|
IJARCST-33-2015-063 |
44-46
 |
10. |
Effective Prototype Algorithm for Noise Removal Through Gain and Range Change
Sachin M. Narangale, G. N. Shinde
|
IJARCST-33-2015-064 |
47-50
 |
11. |
Construction Cost Overturn Prediction Using Porter on Text and Numerical Data
Payal Singla, Er. Mohit Kakkar
|
IJARCST-33-2015-065 |
51-52
 |
12. |
Review of Multilingual Detection System
YugeshSharma, Vandana Pushe
|
IJARCST-33-2015-066 |
53-54
 |
13. |
Recovery of Coordinator Device using Adoption Technique in ZigBee Network
Shifa, Prof. Darshan S. Sidhu, Prof. (Dr.) Jyoti Saxena
|
IJARCST-33-2015-067 |
55-58
 |
14. |
Assessment of Handoff Effect and Various Response Time in HOT SPOT Environment
Karanvir Singh Mander, Jaspreet Kaur
|
IJARCST-33-2015-068 |
59-61
 |
15. |
Ways in which mobile devices can be infected with malware and proposed counter measures
Erick K. Rotich, Shadrack K. Metto, Ikhoa P. Anselmo
|
IJARCST-33-2015-069 |
62-66
 |
16. |
Controller Tuning for Disturbance Rejection Associated with Delayed Double Integrating processes, Part IV: PID Plus First-Order Lag Controller
Galal Ali Hassaan
|
IJARCST-33-2015-070 |
67-71
 |
17. |
A flexible Dynamic Load Balancing Model for Independent Tasks In Grid Computing
Seyed Mohsen HashemiGhiri, Abbas Akkasi, Amin Shamohammadi, Mohammadnabi Omidvar
|
IJARCST-33-2015-071 |
72-78
 |
18. |
A Proposed Seat Allocation Model for Future Bullet Trains in India
Devesh Sapkale, Pravin Ahirwar, Vikas Singh, Prof. R. A. Agrawal, Prof. D. D. Patil
|
IJARCST-33-2015-072 |
79-80
 |
19. |
Paper remove
Paper remove
|
Paper remove |
81-86
 |
20. |
Best Plan for System Security
Gaurav Kumar
|
IJARCST-33-2015-074 |
87-89
 |