Table of Contents
Articles
| Machine Learning Algorithm Used for Detecting Malicious PDF Document |
PDF
|
| Manju Dudy, Yogita Gigras, Anuradha Anuradha | 61-65 |
| Assorted Database Query Methodology in DB2 Universal Data Joiner |
PDF
|
| L. Kathirvelkumaran, Dr. R. Muralidharan | 66-68 |
| Emotion Classification of Twitter Data using Lexicon based Approach |
PDF
|
| M. Reka, Dr. V. Srividhya | 69-71 |
| Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based On the Word Alignment Model |
PDF
|
| N. Krishnan, S. Sathyapriya, Dr. D. Anitha | 72-74 |
| A Study on Prioritization of Test Cases during Software Execution based on the Dependency |
PDF
|
| R. Anitha, Dr. B. Shanmugapriya | 75-77 |
| Smartphone Based Applications for Measuring Vital Signs: A Survey |
PDF
|
| M. Thangamani, R. Rajeswari | 78-80 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632