Table of Contents
Vol 8, No 3 (2016)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
A Robust Elliptical Based Security using Cryptography Technique | ||
S. Suriya, S. Sivachandrian, D. JayaKumar | ||
Vol 8, No 3 (2016), Pagination: 53-57 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 178 | PDF Views: 3 |
Study on Protecting Privacy in Personalized Web Search | ||
Najneen Tamboli, Sathish Kumar Penchala | ||
Vol 8, No 3 (2016), Pagination: 58-61 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 175 | PDF Views: 3 |
Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps | ||
F. Jasminesoundarya, R. Aktharunisa Begum, S. Sivachandrian | ||
Vol 8, No 3 (2016), Pagination: 62-65 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 192 | PDF Views: 5 |
A Novel Approach for Bimodal Human Emotion Recognition | ||
Swagata Sarkar, H. Ranganathan | ||
Vol 8, No 3 (2016), Pagination: 66-69 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 198 | PDF Views: 3 |
A Self-Motivated Approach for Detecting Smartphone Vulnerabilities | ||
P. Sathyabama, G. Kirubhakar | ||
Vol 8, No 3 (2016), Pagination: 70-76 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 183 | PDF Views: 3 |