|
Palmprint Identification based on texture features using GLCM through Dynamic ROI - K.J Archana, V.Sangeetha, Y. L. Malathi Latha |
|
A Review On Different Access Control Mechanism In Cloud Environment - B Sankaraiah, D. Bhadru, G Shravan Kumar |
|
Crime Detection In Credit Card Fraud - Ms. E.Anuradha, Mr N S S R S Srikar, Mr Aditya Sairam, Mr P. Srikar |
|
Cooperative Secure Multi – Cloud Verification System - Mr. B.Shankernayak, Msb.Deekshitha, Mr J. Karthik Reddy, Msb.Swathi |
|
Fake Objects Based Intruder Detection System In Cloud Storage - K V Rajani, V.Sangeetha, K.J Archana |
|
Using Fuzzy Logic Clustering Discover Semantic Similarity in Web Document - Miss. Sukshma M. Durge, Mr. Yogeshwar M.Kurwade, Dr. Vilas M. Thakare |
|
Secure and Authorized Approach for Routing In MANET Using Group Signature - Phani Raja.I |
|
A Novel Approach For Progressive Of Duplicate Detection - Vinaysagar Anchuri |
|
A Proportional Study of Issues in Big Dataclustering Algorithm with Hybrid Cs/Pso Algorithm - A.C.Priya Ranjani, Dr. M.Sridhar |
|
Secure and Authorized Approach Node trust Evaluation in Mobile Ad Hoc Networks - K.Sridevi, M.Sridhar |