|
1.
|
PC & Wireless Automation of AC Appliences in Embedded System
by "Arunagiri (K), Ashok (K) & Vijay Shankar (S)" | [AUTHOR] | Latha (L). Publisher: 2004Availability: No items available
|
|
2.
|
Wireless Printer
by Rangadurai (C) & Pradeep Philip Joseph | [AUTHOR] | Latha (L). Publisher: 2004Availability: No items available
|
|
3.
|
Firewall for Network Security
by Anusha Nataraj & Avinash (J) | [AUTHOR] | Latha (L). Publisher: 2004Availability: No items available
|
|
4.
|
Digital Filter Design Using PC
by "Latha (L), Madhumathi (S), Mahesh (S) & Sudhakar (S)" | [AUTHOR] | Vasuki (A). Publisher: 1994Availability: No items available
|
|
5.
|
Steganography
by "Brindha (D), Periyanayagi (T), Vani Shanmuga Priya" | [AUTHOR] | Latha (L). Publisher: 2005Availability: No items available
|
|
6.
|
Face Recognition from Multipose Image Sequence
by Nirmala (M) | [AUTHOR] | Latha (L). Publisher: 2005Availability: No items available
|
|
7.
|
Fingerprint Identification for Twins
by Thilagavathi (R) | [AUTHOR] | Latha (L). Publisher: 2005Availability: No items available
|
|
8.
|
Appliances Control through SMS
by "Anjanadevi(S), Suganya (B)" | [AUTHOR] | Latha (L). Publisher: 2005Availability: No items available
|
|
9.
|
Fast Fractal Image Compression
by "PRADEEP (R), NANDAGOPAL (R), SRIHARI (N.S)" | [AUTHOR] | LATHA (L). Publisher: 2006Availability: No items available
|
|
10.
|
Continuous Verification Using Multimodal Biometrics
by Pravinthraja (S) | [AUTHOR] | Latha (L). Publisher: 2009Availability: No items available
|
|
11.
|
Deformation Modeling for Robust 3d Face Matching
by Sushma (A) | [AUTHOR] | Latha (L). Publisher: 2009Availability: No items available
|
|
12.
|
Authentication of E-Learners Using Multimodal Biometrics
by "Suresh (V), Viveak (R)" | [AUTHOR] | Latha (L). Publisher: 2009Availability: No items available
|
|
13.
|
Mobile Cryptography
by "Anandraj (S), Sri Bhuvanesh (M)" | [AUTHOR] | Latha (L). Publisher: 2009Availability: No items available
|
|
14.
|
Eigenfeature Regularixation and Extraction in Face Recognition
by "Vaddevel (S E), VelPrasad (P)" | [AUTHOR] | Latha (L). Publisher: 2009Availability: No items available
|
|
15.
|
Unseen Visible Watermarking
by "Anantdha Kumar (R), Mohan (V)" | [AUTHOR] | Latha (L). Publisher: 2010Availability: No items available
|
|
16.
|
Credit Card Fraud Detection Using Hidden Markov Model
by "Birundha (N), Senbagapriya (P), Sivaselvi (R)" | [AUTHOR] | Latha (L). Publisher: 2010Availability: No items available
|
|
17.
|
Multimodel Biometric Authentication System Using Palmprint and Ear
by Nandhini Devi (M) | [AUTHOR] | Latha (L). Publisher: 2010Availability: No items available
|
|
18.
|
Fusion of Retinal and Fingerprint Biometrics for efficient Person Authentication
by Pabitha (M) | [AUTHOR] | Latha (L). Publisher: 2010Availability: No items available
|
|
19.
|
Robust Multimodal Biometric Authentication System Based on Ant Colony Optimization
by Shilpa Nair | [AUTHOR] | Latha (L). Publisher: 2011Availability: No items available
|
|
20.
|
Efficient Authentication Method Using Score Level Fusion of Multimodal Biometrics
by Sugantha Priyadharshini (P) | [AUTHOR] | Latha (L). Publisher: 2011Availability: No items available
|