Issue | Title | |
Vol 2, No 2 (2010) | Result Analysis to Compute the Entropy of Voice Signal and SNR Using MatLab | Abstract |
Shiv Kumar, Vijay K. Chaudhari, R.K. Singh, Dinesh Varshney, Dr. C. L. Saxena | ||
Vol 3, No 3 (2011) | Review of Fingerprint Image Enhancement Methods | Abstract |
Sushama S. Patil, Surendra Mishra | ||
Vol 6, No 8 (2014) | Review On Handwritten English Capital Letters Recognition Using Artificial Neural Network | Abstract |
H.E. Khodke, Dr. S. Lomte, R. Auti, Neha- KhatriValmik, Seema Singh | ||
Vol 12, No 3 (2020) | Review on Microbial Metal Corrosion in Fresh Water Environment and Destructor Strains | Abstract |
Gang Wang, Liz K. Herrera | ||
Vol 7, No 3 (2015) | RF Based Trains Accident Security | Abstract |
A. Sakthipriya, M. Sobika, D. Sindhu | ||
Vol 7, No 5 (2015) | Robust & Secured Image Authentication System by Watermarking & Iris Biometric | Abstract |
S. Priyalakshmi, Sumathy Eswaran | ||
Vol 3, No 8 (2011) | Robust Face Recognition under Pose, Illumination and Expression Variations using L1 Graph Method | Abstract |
J. Dhamayandhi, K.S. Jeen Marseline | ||
Vol 5, No 1 (2013) | Robust Facial Data Recognition using Multimodal Fusion Features in Multi-Variant Face Acquisition | Abstract |
A. Manchula, Dr.S. Arumugam | ||
Vol 8, No 7 (2016) | Robust Palm Vein Pattern Recognition System based on Hybrid Texture Descriptors | Abstract |
A. Paula, E. Rajeswari, S. Sree Lakshmi, Dr.R. Josephine Leela | ||
Vol 7, No 3 (2015) | Safety Monitoring System for Coal Mine Workers using Different Sensors | Abstract |
M. Lavanya, S. Chellaganesghavalli | ||
Vol 6, No 2 (2014) | SDS Technique for Secret Image Encryption | Abstract |
M.B. Suresh, H.N. Veena | ||
Vol 8, No 7 (2016) | Secure Transaction on ATM Using OTP, FingerPrint and Reverse Pin Model | Abstract |
C.P. Jetlin, S.H. Shalma Shain, R. Srija, P. Sri Priyanka | ||
Vol 1, No 8 (2009) | Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris | Abstract |
A. Jagadeesan, T. Thillaikkarasi, Dr. K. Duraiswamy | ||
Vol 7, No 6 (2015) | Securing IWR in Cloud Using Various Trait Based Encryption Methods | Abstract |
F. Antony Xavier Bronson, S.P. Rajagopalan | ||
Vol 3, No 3 (2011) | Securing Multi-Application Smart Cards with Remote User Authentication and Biometric Identification in Banking Solutions | Abstract |
M. Latha Karthigaa, R.S. Milton | ||
Vol 2, No 3 (2010) | Security Analysis of Multimodal Biometric Fuzzy Vault | Abstract |
V.S. Meenakshi, Dr. G. Padmavathi | ||
Vol 1, No 1 (2009) | Security Analysis of Multimodal Biometric Fuzzy Vault | Abstract |
V. S. Meenakshi, Dr. G. Padmavathi | ||
Vol 3, No 5 (2011) | Security by E-Fabricating System | Abstract |
Dr. Bhupathiraju Venkataramaraju, Narayanasamy Rajendran | ||
Vol 9, No 4 (2017) | Security Management for Controlling Theft Using Arduino UNO | Abstract |
S. Deepika, M. Nisha Angeline | ||
Vol 8, No 10 (2016) | Sensitive Data Leakage Detection using Fuzzy Fingerprint Technique in Host-Assisted Mechanism | Abstract |
Patil Deepali Eknath, Ghatage Trupti Babasaheb, B. Takmare Sachin | ||
Vol 5, No 6 (2013) | Seven State HMM-Based Face Recognition System along with SVD Coefficients | Abstract |
C. Anand, R. Lawrance | ||
Vol 8, No 5 (2016) | Shape Matching and Alphanumeric Recogination for Vehicle Identification | Abstract |
K. Senthil Kumar, G. Ramya, S.M. Devasugan | ||
Vol 9, No 6 (2017) | Shape Matching and Hand Written Digit Identification Using Minkowski Distance | Abstract |
K. Senthil Kumar, S. Elavarasan | ||
Vol 9, No 9 (2017) | Simple Single Neural Net in Pattern Classification Hebbian and Perceptron Rule - A Review | Abstract |
Dr. P. Radha, T. Shanthi | ||
Vol 7, No 3 (2015) | Simulation of Nanoscale INSB Based HEMT Device for Low Power and High Frequency Applications | Abstract |
A. Ashok Kumar, Dr. S. Baskaran | ||
401 - 425 of 477 Items | << < 12 13 14 15 16 17 18 19 20 > >> |
ISSN: 0974 – 956X