Issue | Title | |
Vol 3, No 2 (2016) | 3D-IC Partitioning and TSV Sharing Optimization Algorithm | Abstract |
M. Sarojini, D. Gracia Nirmala Rani | ||
Vol 1, No 2 (2014) | A Comorbid Algorithm to Significantly Compress Text Contents of Several Web Pages in Conformational Dynamics | Abstract |
Ankush Rai | ||
Vol 4, No 2 (2017) | A Comprehensive Method for Sentiment Analysis on Twitter Posts | Abstract |
Kanan Joshi, Mr. Dhaval Patel | ||
Vol 3, No 2 (2016) | A Digital 3D Classroom Using Sixth Sense and Holography Technology | Abstract |
Arya Manoj, Anu Salim | ||
Vol 5, No 2 (2018) | A New Method to Optimize Initial Cluster Number and Then Apply K-Means Algorithm to Perform Image Segmentation | Abstract |
Sumaiya Dabeer, Maha Mohammed Khan | ||
Vol 3, No 3 (2016) | A Review of WIMAX and Various Technology | Abstract |
Parul Rathore, Neetu Sharma, Neelesh Gupta | ||
Vol 1, No 3 (2014) | A Review on Brain Tumor Detection Techniques | Abstract |
Chandarana Dimpee, Ashish M Kothari | ||
Vol 4, No 1 (2017) | A Review on Mobile Application Development Using IDE | Abstract |
Ishan Pandita | ||
Vol 3, No 3 (2016) | A Review on Multimedia Classrooms | Abstract |
Ishan Pandita | ||
Vol 4, No 1 (2017) | A Review on Privacy and Security in Multimedia | Abstract |
Priyanshi Agarwal, Arpita Srivastava | ||
Vol 2, No 3 (2015) | A Review on Sinkhole Attack in Ad hoc Network | Abstract |
Rupali Prajapati, Priya Pathak, Sandeep Gupta | ||
Vol 3, No 2 (2016) | A Review on Sybil Attack in Wireless Sensor Network Using Different | Abstract |
Priya Pathak, Sandeep Gupta | ||
Vol 4, No 3 (2017) | A Review on Web Application with Vulnerabilities Protection | Abstract |
Narendra M Kandoi, Dr. Vilas M Thakare | ||
Vol 4, No 3 (2017) | A Review on Web Application with Vulnerabilities Protection | Abstract |
Narendra M Kandoi, Dr. Vilas M Thakare | ||
Vol 3, No 2 (2016) | A Review Paper on Clustering Technique in MANET | Abstract |
Shikha Sharma, Nitin Manjhi | ||
Vol 6, No 3 (2019) | A Study on Current Scenario of Ethical Hacking | Abstract |
Anurika Mehta, Mayank Agrawal, Harsh Agarwal | ||
Vol 4, No 2 (2017) | A Survey of Jellyfish Attack in Mobile Ad Hoc Network | Abstract |
Annu Kumari, K. K. Joshi | ||
Vol 2, No 1 (2015) | A Survey of Wireless Network Simulators | Abstract |
Ajay Roy, A. K. Jain | ||
Vol 5, No 1 (2018) | A Survey on Security and Layered View in Vehicular Ad Hoc Network | Abstract |
Hritu Jain, Vikash Sezwar | ||
Vol 5, No 1 (2018) | A Technical Review on Intrusion Detection System with Various Machine Learning Algorithms in Data Mining | Abstract |
Arvind Kumar | ||
Vol 8, No 1 (2021) | Abnormal Crowd Behavior Detection System | Abstract |
Pratiksha Bhosale, Omkar Jadhav, Pratiksha Mote, Praveen Shinde | ||
Vol 7, No 3 (2020) | Age Invariant Face Recognition Techniques: A Review | Abstract |
Deepak Mittan | ||
Vol 5, No 1 (2018) | Ameliorated perceptive approach to MSRCR algorithm for image augmentation | Abstract |
ASMA E | ||
Vol 1, No 1 (2014) | An Application Development on Video as a Service in Cloud Computing | Abstract PDF |
Amruta Balapure, Rupali Patil, Anuja Zade, Janhavi Patil, Siddhant Tanpure | ||
Vol 2, No 2 (2015) | An Approach of Multi-modal Biometric Iris and Speech based Person Recognition System with Decision Fusion Technique | Abstract |
Md. Rabiul Islam, Md. Fayzur Rahman | ||
1 - 25 of 106 Items | 1 2 3 4 5 > >> |
This site has been shifted to https://stmcomputers.stmjournals.com/