Issue | Title | |
Vol 2, No 2 (2010) | A Novel and Efficient Mobile Device Authentication Architecture | Abstract |
M. Suresh Thangakrishnan, M. Prabukumar | ||
Vol 8, No 3 (2016) | A Novel Approach for Bimodal Human Emotion Recognition | Abstract |
Swagata Sarkar, H. Ranganathan | ||
Vol 4, No 4 (2012) | A Novel Approach for Biometric Identification through Palm and Hand Geometry | Abstract |
C. T. Subash, V. Sujitha | ||
Vol 3, No 10 (2011) | A Novel Approach Providing Image Security for a Digital Camera Incorporating Watermarking and Encryption Algorithm | Abstract |
V. Manikandan, V. Prabhu | ||
Vol 2, No 7 (2010) | A Novel Computational Approach for Embedding Patient Information Retrieved From Biomedical Images | Abstract |
J. A. Alex Rajju Balan, S. Edward Rajan, S. Wilfred Franklin | ||
Vol 4, No 5 (2012) | A Novel Fingerprint Reconstruction by Using Four Concrete Schemes of Pattern Matching to Enhance Accuracy Fields | Abstract |
N. Kannaiya Raja, R. Somasundaram, K. Arulanandam | ||
Vol 2, No 5 (2010) | A Novel Method for Fingerprint Feature Extraction | Abstract |
Ramandeep Kaur, Amit Kamra, Vijay Dhir | ||
Vol 9, No 7 (2017) | A Novel Secure Routing Protocol based on Retina Biometric Authentication | Abstract |
R. Sudha, M. Devapriya | ||
Vol 3, No 7 (2011) | A Probabilistic Smoothing Approach for Language Models Applied to Protein Sequence Data | Abstract |
Gopal Suresh, Chellapa Vijayalakshmi | ||
Vol 8, No 6 (2016) | A Real-Time Recognition Non-Intrusive Electrical Appliance Monitoring Algorithm for Home Energy Management System | Abstract |
P. Loganayagee, J. Ashok Kumar, D. Sivabalan, V. Vijay Kiran | ||
Vol 8, No 6 (2016) | A Resilient Watermarking Scheme for Compressed Images Using Iris Recognition | Abstract |
S. Sangeetha, R. Sripreethy, G. Suthandrarajasri | ||
Vol 10, No 7 (2018) | A Review on Biometric Authentication System | Abstract |
M. Gowtham | ||
Vol 2, No 5 (2010) | A Review on Biometrics Security Breaches and Remedies | Abstract |
Manvjeet Kaur, Sanjeev Sofat | ||
Vol 1, No 8 (2009) | A Review on Biometrics Security Breaches and Remedies | Abstract |
Manvjeet Kaur, Sanjeev Sofat | ||
Vol 1, No 3 (2009) | A Review on Biometrics Security Breaches and Remedies | Abstract |
Manvjeet Kaur, Sanjeev Sofat | ||
Vol 8, No 3 (2016) | A Robust Elliptical Based Security using Cryptography Technique | Abstract |
S. Suriya, S. Sivachandrian, D. JayaKumar | ||
Vol 8, No 3 (2016) | A Self-Motivated Approach for Detecting Smartphone Vulnerabilities | Abstract |
P. Sathyabama, G. Kirubhakar | ||
Vol 8, No 6 (2016) | A Semi Blind Reversible Watermarking On Numerical Relational Database | Abstract |
M. Pooja, M. Poornima, T. Priyanka, K.L. Shanthi Priya | ||
Vol 4, No 1 (2012) | A Smart Approach for Bimodal Biometric Authentication in Home-Exams (SABBAH Model) | Abstract |
Yousef W. Sabbah, Imane A. Saroit, Amira M. Kotb | ||
Vol 7, No 3 (2015) | A Speech Recognition Based Industrial Device Control Using ZIGBEE | Abstract |
D. Jensi Dhanakiruba, M. Marudhupandian | ||
Vol 7, No 7 (2015) | A Statistical Method for Analyzing Low Quality Scores in DNA Sequencing Reads | Abstract |
Sangharsh Saini | ||
Vol 3, No 5 (2011) | A Study of Biometric Techniques and its Implication in Educational Sector | Abstract |
Madhu Chauhan, Nidhi Jain, Arti Gupta | ||
Vol 12, No 4 (2020) | A Study on Artificial Intelligence for Health Care System | Abstract |
Q. Le Xuan, J. Wu | ||
Vol 9, No 3 (2017) | A Study on Automatic Hookworm Detection in Wireless Capsule Endoscopy Images | Abstract |
C. Jaikkumar, J. Jaison Velanganni, R. Vijay Prasath | ||
Vol 6, No 6 (2014) | A Study on Cloud Forensics:Challenges, Tools and CSP Features | Abstract |
Jyoti Shetty, M. R. Anala, G. Shobha | ||
26 - 50 of 460 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll