

Table of Contents
Articles
Machine Learning Algorithm Used for Detecting Malicious PDF Document |
PDF
![]() |
Manju Dudy, Yogita Gigras, Anuradha Anuradha | 61-65 |
Assorted Database Query Methodology in DB2 Universal Data Joiner |
PDF
![]() |
L. Kathirvelkumaran, Dr. R. Muralidharan | 66-68 |
Emotion Classification of Twitter Data using Lexicon based Approach |
PDF
![]() |
M. Reka, Dr. V. Srividhya | 69-71 |
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model |
PDF
![]() |
N. Krishnan, S. Sathyapriya, Dr. D. Anitha | 72-74 |
A Study on Prioritization of Test Cases during Software Execution based on the Dependency |
PDF
![]() |
R. Anitha, Dr. B. Shanmugapriya | 75-77 |
Smartphone Based Applications for Measuring Vital Signs: A Survey |
PDF
![]() |
M. Thangamani, R. Rajeswari | 78-80 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632