| Issue | Title | |
| Vol 2, No 1 (2019) | Effective RDH Based on Histogram Shifting Using Visual Cryptography | Abstract |
| Archana A Nikose, Shrunkhala S Wankhede, Dipak B. Khadse | ||
| Vol 1, No 2 (2018) | Efficient Method to Secure the Information Contents of an Image – A Parallel Approach | Abstract |
| Jalesh Kumar | ||
| Vol 2, No 2 (2019) | Electronic Cash System | Abstract |
| Ridhdhina Naik | ||
| Vol 7, No 3 (2024) | EMPLOYEE LEAVE MANAGEMENT SYSTEM | Abstract |
| P. Firoz Khan, Sk. Zohra Zaheen, Dr. K. Sreekala, Mrs. N. Musrat Sultana | ||
| Vol 2, No 2 (2019) | Engineering College Decision Making Assistant | Abstract |
| Cleon Ozzie Rodrigues | ||
| Vol 8, No 2 (2025) | Enhancements in CSMA/CD and CSMA/CA for Collision Handling in Ethernet and Wi-Fi Networks | Abstract |
| Pawan Sahu, Sushma Kore | ||
| Vol 8, No 1 (2025) | Enhancing Group Learning with Real-Time Collaborative Learning Analytics | Abstract |
| Dr. Chandra Sekar P, Dr. S. Sridevi, Dr. Arthy P S | ||
| Vol 2, No 1 (2019) | e-Voting over Blockchain Platforms: A Survey | Abstract |
| Mohammad Hossein Rezvani, Hadi Khani | ||
| Vol 2, No 3 (2019) | Examination of Nature of Administration in WiMAX and WLAN Organizations utilizing Vertical Handoff Plan | Abstract |
| R. Rathiya | ||
| Vol 2, No 3 (2019) | Expectation and Proposal Framework | Abstract |
| Manasvi . | ||
| Vol 8, No 3 (2025) | Fraud Aware Banking Platform | Abstract |
| Myaka Manisha, Chakali Anusha, Mr. G. Nagi Reddy, K. Sunitha, N. Musrat Sulthana | ||
| Vol 3, No 2 (2020) | Fraud Detection in Online Transaction | Abstract |
| Gunjan Sahoo, Dr Manjula V, K Anuradha Bhakta, Poojashree S A, Divya D Shenoy | ||
| Vol 7, No 2 (2024) | From Leading Roles to Supporting Cast: Exploring Authorship Dynamics in Research Teams | Abstract |
| T. Aditya Sai Srinivas, M. Bharathi, K. Teja Sri | ||
| Vol 3, No 3 (2020) | GAS LEAKAGE DETECTION | Abstract |
| Rina Naik | ||
| Vol 5, No 2 (2022) | Gas Spillage Location Utilizing MQ6 Sensor | Abstract |
| Rohit G | ||
| Vol 4, No 3 (2021) | Home Automation System | Abstract |
| Robin KM | ||
| Vol 5, No 3 (2022) | Implications of Data Privacy among Business and Customers | Abstract |
| Thirumurugan G, Jayasree M | ||
| Vol 5, No 3 (2022) | Improving Data and Identity Privacy in Online Social Networks | Abstract |
| S. Meera, R. Sharmikha Sree | ||
| Vol 6, No 2 (2023) | IMPROVING NETWORK SECURITY IN SMALL AND MEDIUM-SIZED BUSINESSES THROUGH LOG ANALYSIS USING ELK | Abstract |
| A.M. A.P Amarasinghe | ||
| Vol 3, No 3 (2020) | In MANET, talk about the ways in which AODV. | Abstract |
| Aditi Dastkar | ||
| Vol 7, No 3 (2024) | Influence Quotient: FWCI Unveiled | Abstract |
| M Bharathi, T. Aditya Sai Srinivas | ||
| Vol 3, No 2 (2020) | Introduction to Big Data and Hadoop Technology | Abstract |
| Shreya Rajiv Kulkarni, Sangram A. Patil, Ajinkya S. Shewale | ||
| Vol 8, No 3 (2025) | IOT-DRIVEN SMART HOME AUTOMATION FOR FUTURE | Abstract |
| Vaishnavi S, Vishanth V, Syed Muhammed Mehdi S, Athul Suresh S, G. Venifa Mini | ||
| Vol 7, No 1 (2024) | IP Address Validation between IPV4 & IPV6 | Abstract |
| Sudipta Saha, Kazi Muntashir Fahad, Jannatuil Ferdouse Jannat, Effat Ara Tanzin, Ajoy Roy | ||
| Vol 6, No 3 (2023) | Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data | Abstract |
| Anupama T A, Megha M A | ||
| 51 - 75 of 135 Items | << < 1 2 3 4 5 6 > >> | |