Issue | Title | |
Vol 5, No 1 (2018) | Performance evaluation of a hybrid dispersion compensation technique (DCF + FBG) for the deployment of WDM optical systems | Abstract |
Riya Sinha, Dr. Amit Kumar Garg, Swati Tyagi | ||
Vol 5, No 1 (2018) | Performance Investigation of Hybrid Raman- EDFA amplifier in WDM network | Abstract |
Swati Tyagi, Dr. Amit Kumar Garg, Riya Sinha | ||
Vol 2, No 2 (2015) | Personal Computer Wireless Network Data Transmission Using Pens | Abstract |
K. Venkadanathan | ||
Vol 6, No 2 (2019) | Phased Array Radar | Abstract |
Paramveer Singh, Dr. Anila Dhingra, Dr. Garima Mathur | ||
Vol 7, No 2 (2020) | Phishing Website Detection | Abstract |
Kaustubh Jadhav, Vaibhav Dingankar, Praveen Shinde | ||
Vol 6, No 3 (2019) | Query Optimization | Abstract |
Sourav Choudhary, Ajay Maurya | ||
Vol 3, No 2 (2016) | Real-Time OS Based Upon Linux | Abstract |
Ankit Sharma | ||
Vol 5, No 2 (2018) | Reinforcement Learning & Its Supervised View | Abstract |
Rumaan Bashir | ||
Vol 7, No 2 (2020) | Remote Disk Booting | Abstract |
Prasad Vijay Jogale, Siddarth Rao, Ketan Tandel, Diksha Gautam Kumar | ||
Vol 3, No 3 (2016) | Research and Industrial Insight: Shell Programming | Abstract |
Sugandha Mishra | ||
Vol 4, No 1 (2017) | Researches on Linux Memory Management: A Review | Abstract |
Sujoy Kumar | ||
Vol 3, No 3 (2016) | Review of SHA-1 Encryption Algorithm | Abstract |
Poonam Dabas, Sonam Bhardwaj, Preeti Malik | ||
Vol 3, No 2 (2016) | Review on Security Threats in MANET | Abstract |
Himangri singhal | ||
Vol 4, No 1 (2017) | Review on Separate Memory for LINUX | Abstract |
Salman Sheikh | ||
Vol 7, No 1 (2020) | Role of Information Technology in Solving Environmental Problems in Kabul, Afghanistan | Abstract |
Mohammad Salem Hamidi | ||
Vol 8, No 1 (2021) | Secure File Storage over Inter Planetary File System (IPFS) | Abstract |
Mitesh Metha, Dnyanesh Waghulde, Monali Deshmukh | ||
Vol 1, No 3 (2014) | Secure Two Party Computation | Abstract |
Ankush Rai | ||
Vol 7, No 1 (2020) | Secured Mail Server with (3FA) Three Factor Authentication for Web-based Cloud Services | Abstract |
T. Velumani | ||
Vol 3, No 1 (2016) | Shell Script of Shell Programming | Abstract |
Aditya Singh | ||
Vol 7, No 3 (2020) | Simulation of Image Processing using Linux Operating Systems | Abstract |
Abhijeet Sinha, Ankita Sharma | ||
Vol 4, No 2 (2017) | Stock Market Prediction Based on News Sentiments | Abstract |
S. Arun Joe Babulo, J. Mary Dallfin Bruxella, J. K. Kanimozhi | ||
Vol 7, No 2 (2020) | Storage Management in Shell Programming | Abstract |
T. Velumani | ||
Vol 7, No 3 (2020) | Study of Smart Device Based on Client–Server Communication on Linux using Socket Programming in ‘C’ | Abstract |
Vinay Bhatt, Amit Bindal | ||
Vol 2, No 1 (2015) | Survey on Item Set Mining Algorithms | Abstract |
Aakash Sahu | ||
Vol 3, No 1 (2016) | System Learning Method Using Spam Filter | Abstract |
C.A. Kannadasan, R. Jayakumar | ||
76 - 100 of 105 Items | << < 1 2 3 4 5 > >> |
This site has been shifted to https://stmcomputers.stmjournals.com/