

Table of Contents
Research Articles
Comparative Study on Various Security Algorithms in Cloud Computing |
PDF
![]() |
K. Santhisri, P.R.S.M Lakshmi | 1-6 |
Fuzzy Programming Technique and Proposed Application |
PDF
![]() |
Sachin garg, Prashant Kumar | 7-11 |
Review on Variants of Security Protocol |
PDF
![]() |
Hema priya, Satya Sree | 12-18 |
Programming Development Life Cycle: A Comparative Study |
PDF
![]() |
Satya Sree, Hema Priya | 19-22 |
A Proposed Hybrid Spatial Indexing: QX Tree |
PDF
![]() |
Jnyanaranjan Dash, Dipa Patra, Chittaranjan Pradhan | 23-27 |
This site has been shifted to https://stmcomputers.stmjournals.com/