Table of Contents
Vol 8, No 3 (2016)


Articles
A Robust Elliptical Based Security using Cryptography Technique | ||
S. Suriya, S. Sivachandrian, D. JayaKumar | ||
Vol 8, No 3 (2016), Pagination: 53-57 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 350 | PDF Views: 3 |
Study on Protecting Privacy in Personalized Web Search | ||
Najneen Tamboli, Sathish Kumar Penchala | ||
Vol 8, No 3 (2016), Pagination: 58-61 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 332 | PDF Views: 3 |
Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps | ||
F. Jasminesoundarya, R. Aktharunisa Begum, S. Sivachandrian | ||
Vol 8, No 3 (2016), Pagination: 62-65 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 354 | PDF Views: 5 |
A Novel Approach for Bimodal Human Emotion Recognition | ||
Swagata Sarkar, H. Ranganathan | ||
Vol 8, No 3 (2016), Pagination: 66-69 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 367 | PDF Views: 3 |
A Self-Motivated Approach for Detecting Smartphone Vulnerabilities | ||
P. Sathyabama, G. Kirubhakar | ||
Vol 8, No 3 (2016), Pagination: 70-76 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 346 | PDF Views: 3 |