Vol 8, No 3 (2016)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

A Robust Elliptical Based Security using Cryptography Technique PDF
S. Suriya, S. Sivachandrian, D. JayaKumar 53-57
Study on Protecting Privacy in Personalized Web Search PDF
Najneen Tamboli, Sathish Kumar Penchala 58-61
Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps PDF
F. Jasminesoundarya, R. Aktharunisa Begum, S. Sivachandrian 62-65
A Novel Approach for Bimodal Human Emotion Recognition PDF
Swagata Sarkar, H. Ranganathan 66-69
A Self-Motivated Approach for Detecting Smartphone Vulnerabilities PDF
P. Sathyabama, Dr. G. Kirubhakar 70-76


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 956X