Title of Paper and Author
|
Identifying Parkinson’s disease Using Speech Processing
Eunice Daphne J
, Gayathri J
, Deepa B B
Cite this article :
Eunice Daphne J, Gayathri J, Deepa B B " Identifying Parkinson’s disease Using Speech Processing" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCICE-17 , February 2017, URL: http://www.ijtrd.com/papers/IJTRD7735.pdf
|
A Comparative Approach for the Design of Delay Locked Loop with Low Power Consumption
P.Latha
, Dr. S.Ramasamy and K.Vigneshraja
Cite this article :
P.Latha, Dr. S.Ramasamy and K.Vigneshraja " A Comparative Approach for the Design of Delay Locked Loop with Low Power Consumption" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCICE-17 , February 2017, URL: http://www.ijtrd.com/papers/IJTRD7746.pdf
|
SteganoPIN – A secured PIN for ATMs
Kaavya
, Kamalini
, Hemalatha and Dr.Sandra Johnson
|
The Privacy Preserving Model Using For Securing Simple Object Access Protocol Messages
S.Chakaravarthi, P.Visu
, R. P. Brindha Devi
, A. Merlin Monisha and P.Mohanapriya
Cite this article :
S.Chakaravarthi, P.Visu, R. P. Brindha Devi, A. Merlin Monisha and P.Mohanapriya " The Privacy Preserving Model Using For Securing Simple Object Access Protocol Messages" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCICE-17 , February 2017, URL: http://www.ijtrd.com/papers/IJTRD7748.pdf
|
Security Enhancement Using IDT in Wireless Sensor Network
M.C.Charumathi
, P.Divya
, D.Nagapriya
Cite this article :
M.C.Charumathi, P.Divya, D.Nagapriya " Security Enhancement Using IDT in Wireless Sensor Network" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCICE-17 , February 2017, URL: http://www.ijtrd.com/papers/IJTRD7749.pdf
|
Application for the Treatment of Cancer
Yokesh Kumar.C.R
, UdhayaKumar.G
, Raji
|
Flooding Attack on MANET – A Survey
C.M. Nalayini
, Jeevaa Katiravan
, Arvind Prasad. V
|
Enhanced Routing Protocol for Underwater Sensor Networks
|
Recognizing and Thwart the Illegal Signature from Originator Data Dissemination Using Blowfish in VANET
R.Janani
, Angayarkanni S A
Cite this article :
R.Janani, Angayarkanni S A " Recognizing and Thwart the Illegal Signature from Originator Data Dissemination Using Blowfish in VANET" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCICE-17 , February 2017, URL: http://www.ijtrd.com/papers/IJTRD7753.pdf
|
|