Vol 6, No 7 (2017)


Table of Contents


Revocation Mechanisms For Conventional Public Key Settings PDF [Full Text]
A. Anuradha, T.Udaya Lakshmi Aditya, T.Giri Ramu 190-193
Simulation of Gabor Filter Algorithms For Fingerprint Recognition PDF [Full Text]
Ch. Gangadhar, Habibulla Md., K. Venkatesh 194-200
Capacity-aware Control Topology in MANET PDF [Full Text]
Madhusudan G, Kumar TNR 201-204
To Characterize The Contents Of The Documents Through Pattern Discovery In Text Mining PDF [Full Text]
G. Nagamallika, A. Anuradha, K. Sridevi 205-208
To Authenticate A User Before Accesses To Secured Websites Using PWD Based Authentication PDF [Full Text]
A. Anuradha, Ch. Balaveera, V. Sankaranandh 209-212
A Survey on Software Fault Prediction Using Software Metrics PDF [Full Text]
T Ravi Kumar, T Srinivasa Rao 213-222
Emotion Recognition using Wavelets and SVM Speech System PDF [Full Text]
R.Lakshmi Madhuri, V G Prasad Naraharisetti 223-231

Copyright © 2012, All rights reserved.| ijrcct.org

Creative Commons License
International Journal of Research in Computer and Communication Technology Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJRCCT , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.