

Table of Contents
Articles
Multi Party Key Authentication and Steganography for Secured Data Transaction in Cloud |
PDF
![]() |
P. Amudhavalli, N. Uma Maheswari | 175-179 |
Secure Transaction on ATM Using OTP, FingerPrint and Reverse Pin Model |
PDF
![]() |
C.P. Jetlin, S.H. Shalma Shain, R. Srija, P. Sri Priyanka | 180-185 |
Robust Palm Vein Pattern Recognition System based on Hybrid Texture Descriptors |
PDF
![]() |
A. Paula, E. Rajeswari, S. Sree Lakshmi, Dr.R. Josephine Leela | 186-189 |
An Approach for Segmentation of Handwritten Documents Using ICA Algorithm |
PDF
![]() |
T. Dhanalakshmi, R. Malar | 190-193 |
Blood Leakage Monitoring System for the Applications in Haemodialysis Therapy by using IEEE 802.15.4 Standard |
PDF
![]() |
N. Kavitha, S. Kopperundevi, K. Manju, S. Keerthana | 194-196 |
Acoustic Analysis for Diagnosis of Motor Faults Using Speech Recognition Algorithm |
PDF
![]() |
S. Anitha, A. Padmanathan | 197-201 |
Cardiovascular Disorder Detection Using IOT |
PDF
![]() |
K. Sivagamasundari, D.K. Suruthi | 202-205 |
Online Voting System Using Cloud Computing |
PDF
![]() |
R. Pitchai, A. Hussain, S. Bharathchandran | 206-209 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X