

Table of Contents
Articles
Enhanced Access Control for Sharing of Personal Health Record in the Cloud Computing Using Attribute Based Encryption |
PDF
![]() |
M. Kavitha Margret | 93-97 |
Bayesian Approach for Terrain Reference Navigation |
PDF
![]() |
M. Sunita, Deepti J. Anand | 98-102 |
Sensor Matrix based Patient Monitoring |
PDF
![]() |
L. Balaji, R. Vikram | 103-107 |
Classification of Education Videos from You Tube using User Generated Data |
PDF
![]() |
M. Induja, C. Vijayalakshmi, G. Sivapriya | 108-113 |
Indian Coin Identification and Worth Calculation System by High Intensity Point Detection |
PDF
![]() |
A. Dalip joe, M. Meenakumari | 114-117 |
RF Torrent: A Peer to Peer Live Distribution Algorithm |
PDF
![]() |
S. Nagarajan, G. Amudha | 118-121 |
Detecting Masqueraders using user Behavior Profiles |
PDF
![]() |
V. Nandakumar, S. Muthusundari | 122-125 |
Discrimination of Magnetic Inrush and Phase to Phase Fault in Transformer using Probabilistic Neural Network |
PDF
![]() |
S. Arun Prakash, M. Geetha | 126-131 |
Retrieval of Keyphrase Automatically from Video Lectures using Semi Supervised Machine Learning Algorithm |
PDF
![]() |
P. Saranya, U.K. Balamurali | 132-134 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9551