Issue | Title | |
Vol 1, No 1 (2014) | Development of an Android Application for Efficient Handling of Corporate Data | Abstract PDF |
Shubhashree Kokate, S. V. Kedar, Trupti Shivsharan | ||
Vol 4, No 1 (2017) | Digital Watermark Image Perform on Arnold-DWT-SVD Scheme Has Proved a High Degree of Robustness: A Review | Abstract |
Saira Baghel, Abhilash Mishra | ||
Vol 7, No 2 (2020) | Discrete Logarithm and Cryptosystem | Abstract |
Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee | ||
Vol 4, No 3 (2017) | Driver Drowsiness Detection Using Canny Edge Detection and Hough Transformation | Abstract |
Ankit Sureshbhai Jayswal, Prof. Rachana V. Modi | ||
Vol 6, No 3 (2019) | Electronic Eye for Security Systems | Abstract |
Rohit Jangid | ||
Vol 5, No 3 (2018) | Electronic Safety Locker with SMS Alert | Abstract |
Anita Bhatt, Palak Patel, Ripal Patel, Alpita . | ||
Vol 6, No 1 (2019) | Facial Expression Recognition Using Convolutional Neural Network | Abstract |
Kajal Parmar, Heena Kher, Mikita Gandhi | ||
Vol 8, No 1 (2021) | Fathoming Open Source Softwares | Abstract |
Tanvi Chavan, Ashish Jaiswal | ||
Vol 7, No 2 (2020) | Finite Field Extension and Public Key Cryptosystem | Abstract |
Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee | ||
Vol 4, No 2 (2017) | Gold Price Prediction Using Naïve Bayes Regression Algorithm and ANN | Abstract |
Krishna Gandhi, Miss. Niti Shah | ||
Vol 8, No 1 (2021) | Google Play Store Analysis | Abstract |
Kaushal Gadaria, Prathamesh Chavan, Dheeraj Deore, Manasee Deore, Supriya Joshi | ||
Vol 1, No 2 (2014) | Implementation of Audio Watermarking Technique by Spreaded Echo in Time Domain | Abstract |
Mahendra Pandy, Shivajyoti Kumari | ||
Vol 5, No 1 (2018) | Implementing LEACH | Abstract |
Abhilash Shokeen, Saurabh Allawadhi | ||
Vol 2, No 1 (2015) | Improvement of an Android Application for Corporate Data | Abstract |
Himanshu verma | ||
Vol 6, No 3 (2019) | Industrial IoT: Advancement in IoT | Abstract |
Shubham Khandelwal, Abhishek Dadhich | ||
Vol 6, No 3 (2019) | Internet of Things Security | Abstract |
Krati Hansrajani, Akshita Gupta, Alka Rani | ||
Vol 3, No 3 (2016) | Introduction to an Open Source Development | Abstract |
Trinaini Zalpuri | ||
Vol 2, No 3 (2015) | Invisible Watermarking on RGB Image with the Combination of 7-DWT and SVD | Abstract |
Sandeep Gupta, Neha Agrawal | ||
Vol 6, No 2 (2019) | IoT Based Smart Home Security System Using Arduino Uno | Abstract |
S. P. Kesavan, S. Sangeetha, K. S. Saranya, C. Sasikumar | ||
Vol 5, No 1 (2018) | Leveraging Of Artificial Intelligence For Accident Mitigation :Amethi District Case Study | Abstract |
Anubhava Srivastava | ||
Vol 5, No 2 (2018) | MemOS for Performance Analysis of Future Memristive Memory-Based Computer Architectures and Simulation | Abstract |
Nicholas Felker | ||
Vol 2, No 1 (2015) | Network Intrusion Detection Mistreatment Soft Computing Technique | Abstract |
P C Shende, D. Mude | ||
Vol 3, No 1 (2016) | Open Source Technology | Abstract |
Mr. Rachit | ||
Vol 2, No 2 (2015) | Opportunistic Network Environment: A Multipurpose Simulation Tool for Wireless Networks | Abstract |
Atul Sharma | ||
Vol 5, No 3 (2018) | Paper on Gesture Based Appliance Control Device | Abstract |
Punit S. Suthar, Parul H. Panchal, Karan N. Shah, Ankur Varma | ||
51 - 75 of 104 Items | << < 1 2 3 4 5 > >> |
This site has been shifted to https://stmcomputers.stmjournals.com/