Back close
Publications
Self Medication Practice and Related Knowledge Among Students of Selected Nursing Institutions

Citation : N. Surendran, Prof. Sheela Pavithran, and C. M. SijiMol, “Self Medication Practice and Related Kno ...

Publisher :International Journal of Pharma Medicine and Biological Sciences

Publications
Self medication practice and related Knowledge among students of slected nursing institutions

Publisher :International Journal of Pharma Medicine and Biological Sciences

Publications
Segmentation, Tracking And Feature Extraction For Indian Sign Language Recognition

Citation : S. Divya, Kiruthika, S., Anton, A. L. Nivin, and Dr. Padmavathi S., “Segmentation, Tracking And Fe ...

Publisher :International Journal on Computational Sciences Applications (IJCSA)

Publications
Security Vulnerabilities in Open Source Projects: An India Perspective

Citation : K. Achuthan, S. SudhaRavi, R. Kumar and R. Raman, "Security vulnerabilities in open source projects: ...

Publisher :2nd International Conference on Information and Communication Technology (ICoICT).

Publications
Security Measures on Mobile Technology using Software Service

Publisher :International Journal of Science Research

Publications
Security in wireless sensor Networks in smart grids

Citation : R. N., V., V., and P., A. Archana., “Security in wireless sensor Networks in smart grids”, Inter ...

Publisher :International Journal of Applied Engineering and Research

Publications
Security and trust- new challenges to computing today in cyberspace

Publisher :2014 Seventh International Conference on Contemporary Computing (IC3)

Publications
Securing User Input As a Defense Against MitB

Publisher :Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing

Publications
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach

Publisher :The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)

Publications
Secure Key Stream Generation using Computational Intelligence Techniques

Citation : Dr. S. Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation usin ...

Publisher :Int. Journal Computer Technology Applications, Month and Year of Publication, ,

Admissions Apply Now