Issue | Title | |
Vol 5, No 1 (2018) | A combined concept of K-means clustering and DES technique accomplishing Anonymization method for Privacy Preservation | Abstract |
Priyanka Pachauri, Unmukh Datta | ||
Vol 5, No 1 (2018) | A Comparative Study of Different Software Testing Techniques | Abstract |
Seema Rani | ||
Vol 5, No 3 (2018) | A Comparative Study of Various CPU Scheduling Algorithms using MOOS Simulator | Abstract |
Nilam Choudhary, Geetika Gautam, Yukti Goswami, Soumil Khandelwal | ||
Vol 6, No 2 (2019) | A General Survey on Internet of Things based Smart Cities | Abstract |
Himanshu Patel | ||
Vol 6, No 2 (2019) | A GUI Based Application for Image Enhancement and Character Recognition using MATLAB | Abstract |
Pravin Wararkar, Shashikant Patil | ||
Vol 3, No 3 (2016) | A Life of Networking TCP/IP | Abstract |
Nitish Kumar, Sagarika Mohan | ||
Vol 6, No 1 (2019) | A Novel Approach for Performance Analysis of Dynamic Information Integration | Abstract |
Vikash Kumar Garg, Ashish Oberoi, Manish Arora | ||
Vol 6, No 2 (2019) | A Review on Advancement in Automobile Industry: Survey on Driverless Car Technology | Abstract |
Manjari ., Rahul Gupta | ||
Vol 2, No 3 (2015) | A Review on Routing in Delay Tolerant Network | Abstract |
Sandeep Gupta, Abishek Mathur | ||
Vol 4, No 1 (2017) | A Review on UNIX | Abstract |
Megha Agarwal, Yash Gupta | ||
Vol 6, No 3 (2019) | A Review Paper on Las Vegas and Monte Carlo Algorithms | Abstract |
Shivani Bansal, Krutibash Nayak | ||
Vol 5, No 3 (2018) | A Review Paper on Privacy and Security problem at different Levels in IOT with Their Solution | Abstract |
Deepti Tak, Baldev Singh | ||
Vol 7, No 1 (2020) | A Similarity Analysis between Linear Multiracial Feature and Non-linear Multiscale Texture in Detection and Segmentation at Brain Tumor | Abstract |
Anoop Sreekumar R.S., Albin Jose S. | ||
Vol 3, No 3 (2016) | A Study of I/O Redirection in Shell Scripting | Abstract |
Rajan Kumar Sharma, Megha Jindal | ||
Vol 4, No 1 (2017) | A Survey on Congestion Scenario in Adaptive Routing Protocol for Wireless Network | Abstract |
Anjali Rajput, U. Datta | ||
Vol 2, No 2 (2015) | A Survey on Various Security Issues in Delay Tolerant Networks | Abstract |
Priya Pathak, Akansha Shrivastava, Sandeep Gupta | ||
Vol 1, No 1 (2014) | An Approach to Design a Compiler in Context of Lexical Analyzer (Scanner) and Parser Generation (Parser) Followed by Non-optimized Intermediate Code Generation using Compiler Construction Tools | Abstract PDF |
partha ghosh | ||
Vol 4, No 2 (2017) | An Eccentric Approach For Spoofing Bother Detection | Abstract |
C. A. Kannadasan, R. Jayakumar | ||
Vol 1, No 1 (2014) | An Implementation of Extracting Data and Mining Extracted Data from Web Pages | Abstract PDF |
Dhanashri Sandbhor, Archana Jadhav, Govind Kumar Dubey, Sonali Pawade, Rupesh Dhole | ||
Vol 3, No 1 (2016) | An Improved Biometric Authentication with Scleral Patterns | Abstract |
T. Priyadharshini | ||
Vol 6, No 1 (2019) | An Intelligent Fuzzy Based Framework for Prediction of Heart Diseases | Abstract |
Mahwash Bukhari, Sheeba Farooq, Hilal Ahmad Khanday, Zahid Hussain Wani | ||
Vol 1, No 3 (2014) | An Introduction of Smart Self-learning Shell Programming Interface | Abstract |
Ankush Rai | ||
Vol 3, No 3 (2016) | An Introduction to Shell Programming | Abstract |
Sujoy Kumar | ||
Vol 4, No 2 (2017) | Analogous Multichannel Communication Recatenation Scrutiny Using ARQ Technique | Abstract |
G SELVAKUMAR, N. Siranjeevi, N. Alaguraj | ||
Vol 7, No 3 (2020) | Analysis of Linux Shell Script and Shell Programming | Abstract |
Satish Kumar Alaria, Ashish Raj | ||
1 - 25 of 105 Items | 1 2 3 4 5 > >> |
This site has been shifted to https://stmcomputers.stmjournals.com/