| Issue | Title | |
| Vol 3, No 2 (2016) | 3D-IC Partitioning and TSV Sharing Optimization Algorithm | Abstract |
| M. Sarojini, D. Gracia Nirmala Rani | ||
| Vol 1, No 2 (2014) | A Comorbid Algorithm to Significantly Compress Text Contents of Several Web Pages in Conformational Dynamics | Abstract |
| Ankush Rai | ||
| Vol 4, No 2 (2017) | A Comprehensive Method for Sentiment Analysis on Twitter Posts | Abstract |
| Kanan Joshi, Mr. Dhaval Patel | ||
| Vol 3, No 2 (2016) | A Digital 3D Classroom Using Sixth Sense and Holography Technology | Abstract |
| Arya Manoj, Anu Salim | ||
| Vol 5, No 2 (2018) | A New Method to Optimize Initial Cluster Number and Then Apply K-Means Algorithm to Perform Image Segmentation | Abstract |
| Sumaiya Dabeer, Maha Mohammed Khan | ||
| Vol 3, No 3 (2016) | A Review of WIMAX and Various Technology | Abstract |
| Parul Rathore, Neetu Sharma, Neelesh Gupta | ||
| Vol 1, No 3 (2014) | A Review on Brain Tumor Detection Techniques | Abstract |
| Chandarana Dimpee, Ashish M Kothari | ||
| Vol 4, No 1 (2017) | A Review on Mobile Application Development Using IDE | Abstract |
| Ishan Pandita | ||
| Vol 3, No 3 (2016) | A Review on Multimedia Classrooms | Abstract |
| Ishan Pandita | ||
| Vol 4, No 1 (2017) | A Review on Privacy and Security in Multimedia | Abstract |
| Priyanshi Agarwal, Arpita Srivastava | ||
| Vol 2, No 3 (2015) | A Review on Sinkhole Attack in Ad hoc Network | Abstract |
| Rupali Prajapati, Priya Pathak, Sandeep Gupta | ||
| Vol 3, No 2 (2016) | A Review on Sybil Attack in Wireless Sensor Network Using Different | Abstract |
| Priya Pathak, Sandeep Gupta | ||
| Vol 4, No 3 (2017) | A Review on Web Application with Vulnerabilities Protection | Abstract |
| Narendra M Kandoi, Dr. Vilas M Thakare | ||
| Vol 4, No 3 (2017) | A Review on Web Application with Vulnerabilities Protection | Abstract |
| Narendra M Kandoi, Dr. Vilas M Thakare | ||
| Vol 3, No 2 (2016) | A Review Paper on Clustering Technique in MANET | Abstract |
| Shikha Sharma, Nitin Manjhi | ||
| Vol 6, No 3 (2019) | A Study on Current Scenario of Ethical Hacking | Abstract |
| Anurika Mehta, Mayank Agrawal, Harsh Agarwal | ||
| Vol 4, No 2 (2017) | A Survey of Jellyfish Attack in Mobile Ad Hoc Network | Abstract |
| Annu Kumari, K. K. Joshi | ||
| Vol 2, No 1 (2015) | A Survey of Wireless Network Simulators | Abstract |
| Ajay Roy, A. K. Jain | ||
| Vol 5, No 1 (2018) | A Survey on Security and Layered View in Vehicular Ad Hoc Network | Abstract |
| Hritu Jain, Vikash Sezwar | ||
| Vol 5, No 1 (2018) | A Technical Review on Intrusion Detection System with Various Machine Learning Algorithms in Data Mining | Abstract |
| Arvind Kumar | ||
| Vol 8, No 1 (2021) | Abnormal Crowd Behavior Detection System | Abstract |
| Pratiksha Bhosale, Omkar Jadhav, Pratiksha Mote, Praveen Shinde | ||
| Vol 7, No 3 (2020) | Age Invariant Face Recognition Techniques: A Review | Abstract |
| Deepak Mittan | ||
| Vol 5, No 1 (2018) | Ameliorated perceptive approach to MSRCR algorithm for image augmentation | Abstract |
| ASMA E | ||
| Vol 1, No 1 (2014) | An Application Development on Video as a Service in Cloud Computing | Abstract PDF |
| Amruta Balapure, Rupali Patil, Anuja Zade, Janhavi Patil, Siddhant Tanpure | ||
| Vol 2, No 2 (2015) | An Approach of Multi-modal Biometric Iris and Speech based Person Recognition System with Decision Fusion Technique | Abstract |
| Md. Rabiul Islam, Md. Fayzur Rahman | ||
| 1 - 25 of 106 Items | 1 2 3 4 5 > >> | |
This site has been shifted to https://stmcomputers.stmjournals.com/


