Table of Contents
Articles
| Multi Party Key Authentication and Steganography for Secured Data Transaction in Cloud |
PDF
|
| P. Amudhavalli, N. Uma Maheswari | 175-179 |
| Secure Transaction on ATM Using OTP, FingerPrint and Reverse Pin Model |
PDF
|
| C.P. Jetlin, S.H. Shalma Shain, R. Srija, P. Sri Priyanka | 180-185 |
| Robust Palm Vein Pattern Recognition System based on Hybrid Texture Descriptors |
PDF
|
| A. Paula, E. Rajeswari, S. Sree Lakshmi, Dr.R. Josephine Leela | 186-189 |
| An Approach for Segmentation of Handwritten Documents Using ICA Algorithm |
PDF
|
| T. Dhanalakshmi, R. Malar | 190-193 |
| Blood Leakage Monitoring System for the Applications in Haemodialysis Therapy by using IEEE 802.15.4 Standard |
PDF
|
| N. Kavitha, S. Kopperundevi, K. Manju, S. Keerthana | 194-196 |
| Acoustic Analysis for Diagnosis of Motor Faults Using Speech Recognition Algorithm |
PDF
|
| S. Anitha, A. Padmanathan | 197-201 |
| Cardiovascular Disorder Detection Using IOT |
PDF
|
| K. Sivagamasundari, D.K. Suruthi | 202-205 |
| Online Voting System Using Cloud Computing |
PDF
|
| R. Pitchai, A. Hussain, S. Bharathchandran | 206-209 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 956X