Table of Contents
Articles
| Enhanced Access Control for Sharing of Personal Health Record in the Cloud Computing Using Attribute Based Encryption |
PDF
|
| M. Kavitha Margret | 93-97 |
| Bayesian Approach for Terrain Reference Navigation |
PDF
|
| M. Sunita, Deepti J. Anand | 98-102 |
| Sensor Matrix based Patient Monitoring |
PDF
|
| L. Balaji, R. Vikram | 103-107 |
| Classification of Education Videos from You Tube using User Generated Data |
PDF
|
| M. Induja, C. Vijayalakshmi, G. Sivapriya | 108-113 |
| Indian Coin Identification and Worth Calculation System by High Intensity Point Detection |
PDF
|
| A. Dalip joe, M. Meenakumari | 114-117 |
| RF Torrent: A Peer to Peer Live Distribution Algorithm |
PDF
|
| S. Nagarajan, G. Amudha | 118-121 |
| Detecting Masqueraders using user Behavior Profiles |
PDF
|
| V. Nandakumar, S. Muthusundari | 122-125 |
| Discrimination of Magnetic Inrush and Phase to Phase Fault in Transformer using Probabilistic Neural Network |
PDF
|
| S. Arun Prakash, M. Geetha | 126-131 |
| Retrieval of Keyphrase Automatically from Video Lectures using Semi Supervised Machine Learning Algorithm |
PDF
|
| P. Saranya, U.K. Balamurali | 132-134 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9551