IJAICE - Journal Papers

Emerging Attacks And Solutions For Secure Hardware

Authors :  S.Anguraj, Karuppannaraja Elumalai , Vignesh kanna R, Tamilvanan L , Poovarasan N | Pages : 28-32

Ischemic Stroke Subtyping Using Recursive

Authors :  T.PREMAMALA M.E , AKSHYABHARATHI.M, DHARANI.P, DHARSHINI.B, MALATHI.M | Pages : 21 - 27

Android Based Tourist Guide System

Authors :  Dr.V.SRINIVASAN Ph.D, G.MATHUMATHI , D.INDHU , V.R.M.GOKUL , P.KOMALA | Pages : 14 - 20

Heart Disease Prediction Using Machine Learning Algorithms

Authors :  Dr.K.GANESH KUMAR Ph.D, P.DILIPKUMAR , M.HARINI , T.HEMANTH , S.INDUMATHIPRIYA | Pages : 6 - 13

Location Based Garbage Management

Authors :  T.NITHYA M.E, T.S.KEERTHANA , J.DHANASHREE , K.JEEVA , M. JEEVANANDHAM | Pages : 1 - 5

Face Recognition System Under Morphing Attacks Using Dbn And Som

Authors :  V.GOMATHI , NANDHINI SRI .S , NAVEEN KUMAR .N.G , NIMISHA.V , SANGETHA .R.S | Pages : 28 - 33

Scheduling Methods In D2d Communications

Authors :  T.G DHAARANI , R.DEVIBALA, R.DHARANI, M.JAMUNA, R.SELSHIYA. | Pages : 34 - 38