Original article article list


Biometrics Authentication using Electrocardiogram Approach

Author details : P.Preetha , R.Sankar

Fingerprint Enhancement using Gabor Filter Algorithm

Author details : Selvi.M ,Sridhar.S

Mobile-to-Mobile Communication using Secured Shared Key

Author details : G.S. Gopakumar ,R. Anitha

Secured Smart Card System using PostGreSQL Database

Author details : N.V. Jaswanth Raj ,R. Anitha

Fraud Detection Using Data Mining Techniques

Author details : E. Henrik , R. Anitha

Status of Ground water Quality in Identified Areas of Karwi City, Utter Pradesh, India

Author details : Dr. Arvind Prasad Dwived ,Vijay Pratap Yadav

Internet of Things a Vision of Future and the Technological Growth

Author details : Udhaya Suirya.U ,Sridhar.S

Predicting the Risk Factors of Endometrial Cancer using Data Mining

Author details : A. Hency Juliet , Dr.R. Padmajavalli

Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module

Author details : M.Vidhya ,A.Irudaya paul raj Vinod

Numerical Analysis of a Nonlinear Vibrating Two-Degrees-of-Freedom System with Various Friction Models

Author details : Kanita Lemes ,Dzanko Hajradinovic ,Marin Petrovic

Optimizing RDF Clusters using ACO

Author details : 1Rasha A. Bin-Thalab ,2Seham A. Bamatraf

Finite Element Analysis of Reinforced Glass Beams using ABAQUS Software

Author details : S.Selva Sajitha ,D. Thanagar



‹ First  < 816 817 818 819 820 >  Last ›