| Gender Recognition System Using Speech Signal |
| Md. Sadek Ali, Md. Shariful Islam and Md. Alamgir Hossain, |
| Volume : 2 volume number : 1 pdf |
| Fuzzy Weighted Associative Classifier : A Predictive Technique for Health Care Data Mining |
| Sunita Soni1 and O.P.Vyas2 |
| Volume : 2 volume number : 1 pdf |
| Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes |
| Rifat Ara Shams, M. Hasnat Kabir and Sheikh Enayet Ullah |
| Volume : 2 volume number : 1 pdf |
| A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms |
| T. Vijayakumar1, V.Nivedhitha2, K.Deeba2 and M. Sathya Bama2 |
| Volume : 2 volume number : 1 pdf |
| Performance Analysis of Fingerprinting Extraction Algorithm in Video Copy Detection System |
| R.Gnana Rubini, P.Tamije Selvy and P.Anantha Prabha |
| Volume : 2 volume number : 1 pdf |
| Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition |
| Smita S. Mudholkar, Pradnya M. Shende and Milind V. Sarode |
| Volume : 2 volume number : 1 pdf |
| Face Recognition Using Different Local Features with Different Distance Techniques |
| M.Koteswara Rao1, K.Veera Swamy1, K.Anithasheela2 and B.Chandra Mohan3 |
| Volume : 2 volume number : 1 pdf |
| Biometric Application of Intelligent Agents in Fake Document Detection of Job Applicants |
| Salathiel Bogle and Suresh Sankaranarayanan |
| Volume : 2 volume number : 1 pdf |
| A Model for Remote Access and Protection of Smartphones Using Short Message Service |
| K.S. Kuppusamy, Senthilraja.R and G. Aghila |
| Volume : 2 volume number : 1 pdf |