

Table of Contents
Articles
A Robust Elliptical Based Security using Cryptography Technique |
PDF
![]() |
S. Suriya, S. Sivachandrian, D. JayaKumar | 53-57 |
Study on Protecting Privacy in Personalized Web Search |
PDF
![]() |
Najneen Tamboli, Sathish Kumar Penchala | 58-61 |
Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps |
PDF
![]() |
F. Jasminesoundarya, R. Aktharunisa Begum, S. Sivachandrian | 62-65 |
A Novel Approach for Bimodal Human Emotion Recognition |
PDF
![]() |
Swagata Sarkar, H. Ranganathan | 66-69 |
A Self-Motivated Approach for Detecting Smartphone Vulnerabilities |
PDF
![]() |
P. Sathyabama, Dr. G. Kirubhakar | 70-76 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X