| Issue | Title | |
| Vol 2, No 2 (2019) | Biometric Authentication Based Security System | Abstract |
| Hardik Kumar, Kshitij Nim | ||
| Vol 8, No 1 (2025) | Bite-Sized Innovations: An In-Depth Review of Deep Learning Approaches to Food Recognition | Abstract |
| R. Sanjana, J. Umesh Chandra, M. Nikesh, M. Bharathi | ||
| Vol 6, No 3 (2023) | Block-Bazaar Blockchain enabled E-commerce | Abstract |
| Shivam Gupta, Shatakshi Singh, Shreya Maheshwari, Sonam Gupta, Dr.Anupama Sharma | ||
| Vol 8, No 2 (2025) | BLOOD COMMUNITY WEB APPLICATION | Abstract |
| K. Dhivya, J. Asvica | ||
| Vol 8, No 1 (2025) | Breast Cancer: Innovations, Clinical Course, Nanomedicine, Relapse and Optimal Management of Breast Cancer Using Sodium MRI-PET imaging, Artificial Intelligence and Virtual Reality Methods. | Abstract |
| Rakesh Sharma | ||
| Vol 7, No 2 (2024) | Byte Battle: A Swift Overview of Security Challenges of Blockchain Technology | Abstract |
| M. Bhuvaneswari | ||
| Vol 8, No 3 (2025) | Carbon Emission and Engine Cleaning Forecast | Abstract |
| K. Sabitha, S. Lavanya | ||
| Vol 5, No 2 (2022) | Character and Animosity as Mental Determinants of Digital Exploitation | Abstract |
| Sudha P | ||
| Vol 8, No 2 (2025) | Classification approach for analysis of weather dataset with different training strategies | Abstract |
| Dr Ali Mirza Mahmood, Faheem Ali Mirza | ||
| Vol 8, No 2 (2025) | Clearer Voices, Softer Struggles: Addressing Speech and Pain Challenges in Cerebral Palsy | Abstract |
| M. Nikesh, D. Rohini, Y. Sri Navya, Syeda Hifsa Naaz | ||
| Vol 7, No 3 (2024) | COLLEGE CLUB MANAGEMENT SYSTEM | Abstract |
| Mannari Revanth, Thota Sravanthi, Dr. K. Sreekala, Ms .Musrat Sultana | ||
| Vol 6, No 2 (2023) | Computer Architecture: Memory Organization and System Design | Abstract |
| Deepak Prajapat, Saurabh Mittal | ||
| Vol 5, No 3 (2022) | Computer Science Students’ Attitude and Performance in a Management Course | Abstract |
| O. Osunade, A. A. Omilabu, O. F. Phillips | ||
| Vol 5, No 3 (2022) | Content based Detection and Blocking of Spam/Phishing Emails using Machine Learning | Abstract |
| Akalya Devi C, Karthika Renuka D, Sarvesh S | ||
| Vol 6, No 2 (2023) | Covid-19 Test Administration System | Abstract |
| Kambale K. S, Nichal D. S | ||
| Vol 5, No 1 (2022) | Current Methods for Evaluating Performance of Computer Systems | Abstract |
| Agbaje M.O, Atansuyi N., Oyelakun T. | ||
| Vol 3, No 1 (2020) | Customized Software Development for Stock Maintenance and Billing System | Abstract |
| Kunal Hedaoo, Himanshu Bhoyar, Subodh Gaikwad, Dipak Khadse | ||
| Vol 8, No 2 (2025) | CYBER SENTINEL: SECURE LOGIN WITH VULNERABILITY SCAN | Abstract |
| K. Sabitha, S. Lavanya | ||
| Vol 1, No 3 (2018) | Data Center Workload Management of Scheduling, Resource Processing | Abstract |
| KOVENDAN V, S. Karthik | ||
| Vol 1, No 1 (2018) | Data Recovery in Cloud with Security and Protection Confirmation | Abstract |
| Aafiya Thahaseen, A, Mohamed Ismail. S, Sharuk .P | ||
| Vol 2, No 3 (2019) | Data Security: Data Breach by Free Websites and Applications | Abstract |
| Oseni Rayhanat Olatundun, Oseni Abdul-Quadri Olayinka | ||
| Vol 7, No 1 (2024) | Decoding CiteScore: A Brief Expedition into Research Impact | Abstract |
| T. Aditya Sai Srinivas, M. Bharathi | ||
| Vol 8, No 3 (2025) | Deepfake Video Face Detection using Deep Learning | Abstract |
| Prayas Chaudhary, Prasuk Jain, Rajnish Kumar Bhardwaj, Vasu Tyagi, Sonika Jalhotra | ||
| Vol 7, No 2 (2024) | Design and Construction of Contactless IoT Doorbell and Security System | Abstract |
| Luckyn Boma Josiah, O.J. Abam, ANYANWU Ogochukwu Adrian | ||
| Vol 6, No 1 (2023) | Detection of Human Trafficking on Social Media Platforms using Natural Language Processing | Abstract |
| Veeresh K.M., Sushmitha D., Uzma Anwer, Syeda Hiba Hussainy, Tarique Ahmad | ||
| 26 - 50 of 142 Items | << < 1 2 3 4 5 6 > >> | |