NCICN - 2015 (Volume 3 - Issue 13)

DPaaS with Secure Data Forwarding
| Total Downloads : 5
Authors : Sajna.S
Design and Development of New Generartion 3D Holographic Stamp for firm Authentication
| Total Downloads : 4
Authors : Sreelekshmi R C
Data Mining with Big Data
| Total Downloads : 3
Authors : Greeshma G S, Mr. Arun Raj S
Data Duplication Detection and Avoidance in Data Collection Applications
| Total Downloads : 4
Authors : Sanooja M, Chinnu Ravi
Genetic Algorithm Based Method for Identification of Cybercriminal Networks from Online Social Media
| Total Downloads : 3
Authors : Neeraja Bhaskar, Revathy N
COALA-System for Visual Representation of Cryptography Algorithms
| Total Downloads : 3
Authors : Remya V, Rageena. M
Cancer Therapeutics Based on Gene Expression Data: A Distributed Approach
| Total Downloads : 3
Authors : Thushara S, Chinnu Ravi
Cancer Mass Detection from Mammogram Based on Enhanced Feature Extraction Method
| Total Downloads : 4
Authors : Jasmin M R, Soorya P
An Efficient Approach for Classification and Recommendation of Mobile Apps with Security
| Total Downloads : 4
Authors : Rhithu L Sreenivas, Anju J
An Efficacious Decision Support System for the Migration of Application to the Cloud
| Total Downloads : 3
Authors : Anu A S, Beena A Philipose
Amino-Acid Sequence Analysis and Pattern Matching Tool (A2SA2P M T)
| Total Downloads : 4
Authors : Shejin Murali, Kishore A Nair, Prof. Nijil Raj. N
A System to Filter Undesired post From OSN user Space using NLP
| Total Downloads : 4
Authors : Sayana S, , Soorya P
A Probabilistic Energy Efficient Routing Protocol for Asymmetric Sensor Networks
| Total Downloads : 4
Authors : Pooja Varma P, Sajan Joy
A Novel Energy Saving Scheme using Potential Based Dynamic Routing in Wireless Sensor Networks
| Total Downloads : 3
Authors : Jasiya Y, Asha George
A Cloud Assisted Secure Privacy Perpetuating System for M-Health Monitoring
| Total Downloads : 4
Authors : Sreethi S, Neetha Alex
A Bio-Cryptosystem to Mitigate Fingerprint Uncertainty Based on Modified Voronoi Neighbor Structures
| Total Downloads : 3
Authors : Theresa Priyanka A. C, Shemi Mol B, Meera Krishna G. H
A BioCapsule Based Authentication System with Secured Intrusive user Authentication
| Total Downloads : 4
Authors : Swathy. G. S, Rasmi. P. S
Two Factor user Authentication in Wireless Sensor Networks
| Total Downloads : 4
Authors : Ajeena A, Muneera Hashim
Surface Plasmon Holography for Security Application
| Total Downloads : 4
Authors : Deepthi Sekhar, Mrs. Radhika R
Social Network Data Analysis and Menaces Detection of Email users
| Total Downloads : 3
Authors : Linta Jacob, Mruthula. N. R

Crossref - DOI Prefix: 10.17577

IJERT Indexing Databases

IJERT Indexing Databases

Submit Manuscript online

Journal of Engineering Call for Papers 2018

ISSN for IJERT Digital Library

ISSN: 2278-0181

ISO 3297:2007

Join as Reviewer

Creative Commons License

Newsletter Subscribe

© 2018 International Journal of Engineering Research & Technology - IJERT.ORG. All Rights Reserved.