Table of Contents
Articles
| A Robust Elliptical Based Security using Cryptography Technique |
PDF
|
| S. Suriya, S. Sivachandrian, D. JayaKumar | 53-57 |
| Study on Protecting Privacy in Personalized Web Search |
PDF
|
| Najneen Tamboli, Sathish Kumar Penchala | 58-61 |
| Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps |
PDF
|
| F. Jasminesoundarya, R. Aktharunisa Begum, S. Sivachandrian | 62-65 |
| A Novel Approach for Bimodal Human Emotion Recognition |
PDF
|
| Swagata Sarkar, H. Ranganathan | 66-69 |
| A Self-Motivated Approach for Detecting Smartphone Vulnerabilities |
PDF
|
| P. Sathyabama, Dr. G. Kirubhakar | 70-76 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X