Open Access
Subscription or Fee Access
Table of Contents
Research Articles
Data Hiding Techniques Using Steganography Algorithms | |
Ashi Tyagi, Rahul Veer Singh, Srishti Sharma | 12-14 |
Fraudulent Data Detection of Credit Card by Using Random Forest Method to Calculate ROC and Confusion Matrix | |
A. Viswanathan, Sara Chandana, S. Kavya, T. Siddharth Reddy | 15-22 |
Unique Approach towards Data Certainty for Data Hiding | |
Kritika Jain, Puneet Aggarwal | 27-31 |
Review Articles
A Review on Bus Protocols and Conversion/Translator between Different Protocols | |
Naorem Akshay Kumar, Shuma Adhikari, Loitongbam Surajkumar Singh | 1-11 |
Recent Strategies for Bug Triaging Techniques | |
Pranoti Prashant Shende, Vaishali Bhujade, Prashant Shende | 23-26 |
This site has been shifted to https://stmcomputers.stmjournals.com/