Issue | Title | |
Vol 6, No 2 (2019) | An Enhanced MPPT Technique by Using Fuzzy Logic Controller | Abstract |
Naba Mahmood, Shekhar Yadav | ||
Vol 3, No 2 (2016) | Analysis and Design of Multi level Inverter | Abstract |
Anand Kumar Joshi | ||
Vol 5, No 3 (2018) | Analysis and Development of Data Hiding Technique for Multimedia Content | Abstract |
Monika Patel, Jigar M Patel | ||
Vol 7, No 1 (2020) | Analysis of Disease and Risk Prediction using ML | Abstract |
Megha Gupta, Ruchika Gupta | ||
Vol 4, No 1 (2017) | Android Based Mobile Control Room Environment Implementation for Industrial Applications | Abstract |
Mukesh. G, K. Santhosh Kumar, Y. Priya | ||
Vol 4, No 3 (2017) | Android Based Short Messaging Service for Security Using NTRU Encryption | Abstract |
Shobha Jha, Unmukh Datta | ||
Vol 5, No 3 (2018) | Application Program Interface on Raster and Vector Data | Abstract |
P.S.S. Nagalakshmi | ||
Vol 1, No 1 (2014) | Authenticity by using Digital Certificate and Secure Communication through Key Agreement Protocol | Abstract PDF |
Mamatha vayelapelli, P.S. Avadhani | ||
Vol 1, No 2 (2014) | Automated Scene Surveillance using Frame Propagation from Massive Sequencization Fusion of Frame Imaging | Abstract |
Ankush Rai | ||
Vol 6, No 3 (2019) | Automated Sorting of Municipal Solid Waste Using Robotic Arm | Abstract |
Rishabh Sharma, Prince Gupta | ||
Vol 5, No 2 (2018) | Automatic Detection and Classification of Brain Tumor in Magnetic Resonance Images | Abstract |
Reza Hassanpour, Anwar A. Abufares, Gul Tokdemir | ||
Vol 6, No 2 (2019) | Balanced Truncation Based Reduction of Large-Scale System | Abstract |
Girijendra Tripathi, Awadhesh Kumar | ||
Vol 3, No 1 (2016) | Base Station Based Clone Attack Detection & Prevention Technique in MANET | Abstract |
Punnu singh, Rajesh Singh | ||
Vol 2, No 3 (2015) | Black Hole and Gray Hole Detection and Prevention by Using Table Driven Knowledge Based Approach | Abstract |
Sweta Dixit, Priya Pathak, Sandeep Gupta | ||
Vol 7, No 2 (2020) | Blockchain-The Consensus | Abstract |
Shefali Kadam, Komal Patra, Apoorva Rasal, Shraddha Subhedar | ||
Vol 2, No 1 (2015) | Bluetooth Technology: A Survey | Abstract |
Amanjot Singh Toor, A. K. Jain | ||
Vol 2, No 3 (2015) | Boundry Based Detection and Prevantion of Sink Hole Attacks in MANET | Abstract |
Surabhi Tiwari, Deven Shah | ||
Vol 6, No 2 (2019) | Cloud Computing with Load Balancing Approach: A Systematic Survey | Abstract |
Namrata Raj, Vishal Kumar Verma | ||
Vol 6, No 1 (2019) | Collision Avoidance Vehicle Using ATMEGA328P | Abstract |
S. P. Jagtap, Rutuja Kadam, Snehal Raut | ||
Vol 5, No 1 (2018) | COLOUR IMAGE ENCRYPTION AND COMPRESSION USING HYPER-CHAOTIC SYSTEM AND DCT DICTIONARY | Abstract |
Varsha Sreedharan, Annie George | ||
Vol 4, No 2 (2017) | Committed Squat Series Communication an Emerging Wireless Communication System | Abstract |
P Priya | ||
Vol 1, No 3 (2014) | Comparative Review on Image Fusion Techniques | Abstract |
Dayagauri R. Padmani, K. R. Borisagar | ||
Vol 7, No 2 (2020) | Computer based Automated Detection of Diabetic Retinopathy Stages using Neural Network | Abstract |
Malay Hitendra Patel, Sayali Sharad Manjrekar, Ashish Dnyaneshwar Parulekar Dnyaneshwar Parulekar, Rina Bora | ||
Vol 6, No 2 (2019) | Data Security: An Analysis in Cloud Computing | Abstract |
Anamika Chaudhary, Aravendra Kr Sharma, Sushil Kr Saroj | ||
Vol 6, No 1 (2019) | Design a Framework for Cybersecurity Using Steganography | Abstract |
Pinky Ramchandra Shinde, Dhanraj Verma | ||
26 - 50 of 106 Items | << < 1 2 3 4 5 > >> |
This site has been shifted to https://stmcomputers.stmjournals.com/