Research Article: IJIRCCE |
Gensolution: Website through Bioinformatics
Approach |
Dr. Mohammad Alamgeer |
|
|
|
Research Article: IJIRCCE |
New Planar CPW Fed Antenna for UWB
Applications with Excellent Performance |
Haitham Alsaif, N. E. Islam |
|
|
|
Research Article: IJIRCCE |
Big Integer Multiplication with CUDA FFT
(cuFFT) Library |
Hovhannes Bantikyan |
|
|
|
Research Article: IJIRCCE |
Quadtree Segmented Double Predictor DPCM
Image Compression |
Jia-Chyi Wu |
|
|
|
Research Article: IJIRCCE |
Framework for Enhancing e-Health Security:
Case of South African Healthcare |
Phathutshedzo Nemutanzhela |
|
|
|
Research Article: IJIRCCE |
Design and Implementation of a Global
Positioning System Based Automatic Vehicle
Location System |
Arulogun Oladiran Tayo, Ganiyu Rafiu Adesina, Akande Noah Oluwatobi |
|
|
|
Research Article: IJIRCCE |
Implementation of IPv6/IPv4 Dual-Stack
Transition Mechanism |
Niranjan Ravi, Muppidathi @ Saravanan A, Manoranjan Periyasamy |
|
|
|
Research Article: IJIRCCE |
A Review on Load and Energy Based Routing
In Wireless Mesh Network |
V. Lakshmi Praba, A.Mercy Rani |
|
|
|
Research Article: IJIRCCE |
Measuring Wind Turbine Parameters Using
Microcontroller as Data Acquisition |
O.Maheshwari, M.Mohana Arasi, S.M.RameshC.Lakshmi Priya, P.Sathiya Bama |
|
|
|
Research Article: IJIRCCE |
Discovering Probabilistic Frequent Sequential
Patterns in Uncertain Databases under
Systolic Tree |
D.Sugumar, P.LeveenBose |
|
|
|
Research Article: IJIRCCE |
Intrusion Detection Technique using Data
Mining Approach: Survey |
Meghana Solanki, Vidya Dhamdhere |
|
|
|
Research Article: IJIRCCE |
A Review of Performance Evaluation of the
Routing Protocols in MANETs |
NehaSingla, Ruby Gupta |
|
|
|
Research Article: IJIRCCE |
Analysis of Different Bit Carry Lookahead
Adder with Reconfigurability in Low Power
VLSI Using Verilog Code |
C. Suba, S. Karthick, M. Prakash |
|
|
|
Research Article: IJIRCCE |
Enhancement of the Security of Pass-Go Pattern
Password Using Shuffling Grid-Shapes |
Deepika jyoti, Dr.Amandeep Verma |
|
|
|
Research Article: IJIRCCE |
Rule Based and Association Rule Mining On
Agriculture Dataset |
Dr. Rahul G. Thakkar, Dr. Manish Kayasth, Hardik Desai |
|
|
|
Research Article: IJIRCCE |
Model to Predict Price Movement of GWAR
for North Gujarat Using Classification Rules:
A Data Mining Approach |
Dr. Rahul G. Thakkar, Hardikkumar V. Desai, Dr. Manish Kayasth |
|
|
|
Research Article: IJIRCCE |
A Review on Hybrid Techniques of Security In
Cloud Computing |
Saurin Khedia, Nishant Khatri |
|
|
|
Research Article: IJIRCCE |
Oral Cancer Early Detection and Stages Using
Various Methods |
G. Visalaxi |
|
|
|
Research Article: IJIRCCE |
Bandwidth Enhancement of Rectangular
Array Using Cross Slots DGS Pattern in
Ground Plane |
Lokeshwari Kartikey, Sunil Kumar Singh |
|
|
|
Research Article: IJIRCCE |
A Review of Anomaly Detection Techniques in
Network Intrusion Detection System |
Dr.D.V.S.S.Subrahmanyam |
|
|
|
Research Article: IJIRCCE |
An Approach to Evaluate Subjective
Questions for Online Examination System |
Sheeba Praveen |
|
|
|
Research Article: IJIRCCE |
Implementation of High Speed Low Power
Split-SAR ADCs |
M. Ranjithkumar , C.Selvi, M.Bhuvaneswaran |
|
|
|
Research Article: IJIRCCE |
Analysis of PWM Strategies for a Single-Phase
Multilevel Inverter with Reduced Number of
Switches for PV Application |
P.Vaishnavi, Dr.R.Seyezhai |
|
|
|
Research Article: IJIRCCE |
Review on Low Power Theme over VLSI
Design Circuit |
Prajakta Ashok Khedkar, Ashish Raghuwanshi |
|
|
|
Research Article: IJIRCCE |
An Efficient Packet Scheduling Scheme in
Wireless Sensor Networks to Prevent the
Deadlock |
J.Nivetha, A.Deepa |
|
|
|
Research Article: IJIRCCE |
Visual Exploration of Amnesic Time Series
Data Streams |
Kaushal Chauhan, Mukta Takalikar |
|
|
|
Research Article: IJIRCCE |
Modified Dijkstra?s Shortest Path Algorithm |
S. Sivakumar, Dr. C.Chandrasekar |
|
|
|
Research Article: IJIRCCE |
A Modified MPPT-SRF Configuration of a
Single Stag Grid-Connected PV System
Inverter Based on Voltage-Oriented Control |
Dindu Venkata Koteswara Rao, O. Ranjit Kumar |
|
|
|
Research Article: IJIRCCE |
Design and Implementation of Application
Software for CSR MK II Controller Card |
B.Srinivasa Reddy, MSR Sekhar |
|
|
|
Research Article: IJIRCCE |
A Novel Speech Separation Based On Ica
Strategical C lassification |
Y.D.Chandramouli, Dr.P.Sailaja |
|
|
|
Research Article: IJIRCCE |
RFID and GSM Based ATM Money Transfer
Prototype System |
G Vinay Kumar , R.Raju, Santhosh Kumar |
|
|
|
Research Article: IJIRCCE |
A Pragmatic Approach of Preprocessing the
Data Set for Heart Disease Prediction |
Dr. Durairaj.M, Sivagowry.S |
|
|
|
Research Article: IJIRCCE |
An Overview on Image Processing Techniques |
B. Chitradevi, P.Srimathi |
|
|
|
Research Article: IJIRCCE |
Analysis of Area ? Delay Low Power Adders
in QCA Using VHDL Code |
Ms.S.Rajalakshmi , Dr.P.Sampath, Mrs.K.Anitha |
|
|
|
Research Article: IJIRCCE |
Study on Techniques for Cluster Head
Formation over Mobile Ad Hoc Networks |
B.Sindhuja, Dr.J.Shanthini |
|
|
|
Research Article: IJIRCCE |
A Comparative Study on Privacy-Preserving
Public Auditing for Secure Cloud Storage |
Vikram.J, M.Kalimuthu |
|
|
|
Research Article: IJIRCCE |
A Comparative Study on Various Scheduling
Algorithms in Cloud Environment |
P Kowsik, K.Rajakumari |
|
|
|
Research Article: IJIRCCE |
Data Broadcasting Using Backbone Driven Operation
for Two Dimensional Highways in VANET |
T. Nagalakshmi, P.Gokulakrishnan |
|
|
|
Research Article: IJIRCCE |
Energy Efficient Mobicast Protocol for
Underwater Sensor Networks |
M.Anuradha, S. Sathees babu, Dr.K.Balasubadra |
|
|
|
Research Article: IJIRCCE |
Survey on Security Issues in Cloud Computing
Enviro nment |
Rachna Jain, Gaurav Saxena, Anuj Madan, Saurabh Sharma, Nishant Pai |
|
|
|
Research Article: IJIRCCE |
Implementation of Efficient Modified Booth
Recoder for Fused Sum-Product Operator |
A.Sindhu, K.PriyaMeenakshi |
|
|
|
Research Article: IJIRCCE |
Kernel Fisher Analysis Based Feature
Extraction for Face Recognition Using
Euclidean Classifier |
M.Manimozhi, S.Sangeetha, M.Malarvizhi, S.Mohamed Nizar |
|
|
|
Research Article: IJIRCCE |
Detecting Critical Link and Critical Node
Vulnerability for Network Vulnerability
Assessment |
Savita R. Dhurde, Prof .A.Deshpande |
|
|
|
Research Article: IJIRCCE |
A Survey on Effective User Navigation
through Website Using Optimal Links |
Piyusha P. Dhalpe, Deeksha Bhardwaj |
|
|
|
Research Article: IJIRCCE |
Simulation of Mouse Using Human Face
(HCI) |
Snehal Dongre, Sachine patil |
|
|
|
Research Article: IJIRCCE |
A Survey on Activity Detection using
Data Mining |
Santosh S.Gurav, Prof. S. R. Todmal |
|
|
|
Research Article: IJIRCCE |
Comparison of Interleaved Boost Converter
Topologies with Voltage Multiplier for Battery
Charging Of PHEV |
Dr.R.Seyezhai, V.Aarthi |
|
|
|
Research Article: IJIRCCE |
Performance Analysis of Classifiers to
Effieciently Predict Genetic Disorders Using
Gene Data |
R Preethi, G M SuriyaaKumar, N G Bhuvaneswari Amma, G Annapoorani |
|
|
|
Research Article: IJIRCCE |
Implementing Dynamic Authority Based
Search Using Binrank Algorithm |
Silica Kole, Ashish Kumar, Pranav Bhatia, and AnshulGoel |
|
|
|
Research Article: IJIRCCE |
Audio Signal Separation and Classification:
A Review Paper |
Silk Smita, Sharmila Biswas, Sandeep Singh Solanki |
|
|
|
Research Article: IJIRCCE |
Design Of Efficient Shift Register with Double
Edge Triggered Flip-Flop |
R.Vidhya, K.Bashkaran |
|
|
|
Research Article: IJIRCCE |
Design and Analysis of Digital Circuits Using
Quantum Dot Cellular Automata (QCA) |
M.Prabakaran, J.Alphas Jeba Singh |
|
|
|
Research Article: IJIRCCE |
Data Mining with Rough Set Using Map-
Reduce |
Prachi Patil |
|
|
|
Research Article: IJIRCCE |
Material Fault Detection Using FPGA for
Nitrile Butadience Rubber Float |
Hema.S,SelvaKumar.V |
|
|
|
Research Article: IJIRCCE |
SoapUI and Soap Sonar Testing Tool Using
Vulnerability Detection of Web Service |
Ramakrishnan.R , Anbarasi.J, Kavitha.V |
|
|
|
Research Article: IJIRCCE |
Implementation of Data Mining Techniques to
Perform Market Analysis |
B.Sabitha, N.G.Bhuvaneswari Amma, G.Annapoorani, P.Balasubramanian |
|
|
|
Research Article: IJIRCCE |
FPGA Implementation of 3/6 SRFFT
Algorithm for Length 6*m DFTS |
M. Sathya, M.B.Annadurai |
|
|
|
Research Article: IJIRCCE |
Predicting the Risk of Heart Attacks using
Neural Network and Decision Tree |
S.Florence, N.G.Bhuvaneswari Amma, G.Annapoorani, K.Malathi |
|
|
|
Research Article: IJIRCCE |
A Study on Various Search Engine
Optimization Techniques |
J.Prethi Sagana Poongkode, V.Nirosha |
|
|
|
Research Article: IJIRCCE |
Design of Low Power Low Voltage DCVS
Logic Based Comparator |
K.Mathumathi, P.D.Hemapriya |
|
|
|
Research Article: IJIRCCE |
Security Architecture and Verification of Java
Bytecode |
Ankit Tyagi, Abhishek Anand, Archana Bharti, Rashi Kohli |
|
|
|
Research Article: IJIRCCE |
QoS Provision in a Cloud-Based Multimedia
Storage System |
Minal Padwal, Manjushri Mahajan |
|
|
|
Research Article: IJIRCCE |
Design of 6-Element, 432.2 MHz QUAGI
Antenna Using 4NEC2 Tool |
Lavanyashree B.J, Lakshmi S. Melikatti, Jayateerth S Pandhari, Madhukar Kalkeri |
|
|
|
Research Article: IJIRCCE |
A Probabilistic Misbehavior Detection Scheme
in DTN: Survey |
Prerana S. Jagadale, PrashantJawalkar |
|
|
|
Research Article: IJIRCCE |
A Scalable Two-Phase Top-Down
Specialization Approach for Data
Anonymization Using Map Reduce On Cloud |
Shweta Sunil Bhand, Prof.J.L.Chaudhari |
|
|
|
Research Article: IJIRCCE |
A Study on Online Web Log Prediction System
Using web Mining Technologies: a Review |
Megha P. Jarkad, Prof. Mansi, Bhonsle |
|
|
|
Research Article: IJIRCCE |
A Survey of Intrusion Detection System Using
Different Data Mining Techniques |
Trupti Phutane, Apashabi Pathan |
|
|
|
Research Article: IJIRCCE |
A Survey on Audio Retrieval System for
Classification |
Priyanka S. Jadhav., Saurabh H. Deshmukh |
|
|
|
Research Article: IJIRCCE |
A Survey on Information Extraction in Web
Searches Using Web Services |
Maind Neelam R., Sunita Nandgave |
|
|
|
Research Article: IJIRCCE |
A Survey on Secure Sharing In Cloud
Computing |
Aakanksha maliye, Sarita Patil |
|
|
|
Research Article: IJIRCCE |
Biometric Recognition Using Unimodal and
Multimodal Features |
Sarala Patil |
|
|
|
Research Article: IJIRCCE |
Cloud-Based Mobile Multimedia
Recommendation System with User
Behavior Information |
Jayshri M. Somwanshi, Prof. Y.B. Gurav |
|
|
|
Research Article: IJIRCCE |
Cross-Domain Privacy-Preserving Cooperative
Firewall Optimization |
Rutuja P. Shirbhate, Prof. S.D. Babar |
|
|
|
Research Article: IJIRCCE |
Database Security Approach for Distributed
Datasets: A Survey |
Kalpana K. Palve, Prof R.W. Deshpande |
|
|
|
Research Article: IJIRCCE |
Efficient Two Server Authentication and
Verification Using ECC |
Seema P. Nakhate, Prof. R. M. Goudar |
|
|
|
Research Article: IJIRCCE |
Enhancing Data Securing In Cloud Using
Scalable Transactions |
Mrudul S Rajhans |
|
|
|
Research Article: IJIRCCE |
Evaluating the Vulnerability of Network
Devices to Sophisticated DDoS Attacks |
Ashutosh S. Bajpei. Prof.Geetika Narang |
|
|
|
Research Article: IJIRCCE |
Personalize Web Search Using User Feedback
Sessions |
Sharayu Kakade, Prof. Ranjana Badre |
|
|
|
Research Article: IJIRCCE |
Single Sign-On Secure Authentication
Password Mechanism |
Deepali M. Devkate, N.D.Kale |
|
|
|
Research Article: IJIRCCE |
An Efficient Two-Server Password Only
Authenticated Key Exchange Secure Against
Dictionary Attacks |
Sonal C. Pansare, Prof.Vaishali Nandedkar |
|
|
|
Research Article: IJIRCCE |
Survey on Load Rebalancing For
Distributed File System in Cloud with
Security |
Jayesh D. Kamble, Prof. Y.B.Gurav |
|
|
|
Research Article: IJIRCCE |
Survey Paper on Web Image Re-Ranking
Using Semantic Signature |
Bhakti P. Buche, V.S.Nandedkar |
|
|
|
Research Article: IJIRCCE |
Various Approaches for Intrusion Detection
System: An Overview |
Priya U. Kadam, Prof.Manjusha Deshmukh |
|
|
|
Research Article: IJIRCCE |
An Extremely Scalable Input Pre-Distribution
Proposal on Behalf of Wireless Sensor
Networks |
E.Ramesh, K.Tulasi |
|
|
|
Research Article: IJIRCCE |
Analyzing the Effect of Number of Nodes,
Network Area and Base Station Position In
HEED Protocol for Wireless Sensor Networks |
Sheena Kohli, Rupal Satija |
|
|
|
Research Article: IJIRCCE |
A Token Based Approach for Detecting
Replica Node Attack in Static WSNs |
Geetha C, Ramakrishnan M |
|
|
|
Research Article: IJIRCCE |
Data Cube Materialization Using Map Reduce |
Kawhale Rohitkumar, Sarita Patil |
|
|
|
Research Article: IJIRCCE |
Algorithms for Reducing the Size of Network |
Rachita Nagpal, Roopali Garg |
|
|
|
Research Article: IJIRCCE |
Review On Architecture & Security Issues of
SDN |
Gagandeep Garg, Roopali Garg |
|
|
|
Research Article: IJIRCCE |
Energy Efficient, Power Based, Secured
Routing Method for Wireless Sensor Network |
Swetha.G , Anantha Lakshmi E, Uma N |
|
|
|
Research Article: IJIRCCE |
Effect of Different Substrate Material on
Performance of H Shaped Patch Antenna |
Trupti Ingale, Chaitali Ingale, A.A.Trikolikar, Gunjan Rathore, P.C.Latane |
|
|
|
Research Article: IJIRCCE |
Performance Evaluation of Modern
Sophisticated Parking Management System
with Space Modeling |
Bandu Nandekar, Dr. Ranjana Raut, Dr. Pravin Dakhole |
|
|
|
Research Article: IJIRCCE |
Secure Distribution of File on Cloud |
Niyamat I. Ujloomwale, Ranjana Badre |
|
|
|
Research Article: IJIRCCE |
A Survey on Opportunistic Routing Protocols |
R. Logesh babu, Dr. P. Balasubramanie |
|
|
|
Research Article: IJIRCCE |
Review on Stable Relational Pattern Mining in
Dynamic Networks |
SushamaPatil |
|
|
|
Research Article: IJIRCCE |
A Survey on Privacy Preservation Recent
Approaches and Techniques |
Dhivakar K , Mohana S |
|
|
|
Research Article: IJIRCCE |
Tweets Mining: Knowledge from the Social
Web |
G. Thiyagarajan, S.A.K. Jainulabudeen |
|
|
|
Research Article: IJIRCCE |
Tweets Mining: Knowledge from the Social
Web |
G. Thiyagarajan, S.A.K. Jainulabudeen |
|
|
|
Research Article: IJIRCCE |
Optimal Path Search with User-Defined
Queries |
Sravani Adusumilli1, S Ravi Kishan |
|
|
|
Research Article: IJIRCCE |
An Analytical Study on 2D Ultrasound Fetal
Anatomy Measurement |
R.Mehaboobathunnisa, A.A.Haseena Thasneem, Dr.M.Mohammed Sathik, Dr.S.Arumugam |
|
|
|
Research Article: IJIRCCE |
An Exclusive Survey on Web Usage Mining
For User Identification |
Satpal Singh, Vivek Badhe |
|
|
|
Research Article: IJIRCCE |
Enhanced M-Privacy for Collaborative Data
Publishing |
Aseema Jana, Shubham Joshi |
|
|
|
Research Article: IJIRCCE |
A Review on Secure Routing Protocols in
MANET |
Komal Khedkar, Shubham Joshi |
|
|
|
Research Article: IJIRCCE |
User and Query Based Ranking for
Web Data Bases |
Ram Kiran Puttagunta, S Ravi Kishan |
|
|
|
Research Article: IJIRCCE |
Performance Evolution of XML Data
Searching by Using Fuzzy Type a head Search |
Laxman Dethe, Prof. R. M. Goudar, Prof. Sunita Barve |
|
|
|
Research Article: IJIRCCE |
Review on DRINA: A Lightweight and
Reliable Routing Approach for In-Network
Aggregation in Wireless Sensor Networks |
Harshada Bhosale, Shubham Joshi |
|
|
|
Research Article: IJIRCCE |
Improvise P2P File Sharing for Routing
Efficiency |
Ashwini S. Jagtap, Shubham Joshi |
|
|
|
Research Article: IJIRCCE |
Data Reduction Techniques in Wireless Sensor
Network: A Survey |
Thaker Maulik B., Prof. Uma Nagaraj, Prof. Pramod D. Ganjewar |
|
|
|
Research Article: IJIRCCE |
A Survey on Sentiment Analysis and Opinion
Mining |
Dudhat Ankitkumar M, Prof. R. R. Badre, Prof. Mayura Kinikar |
|
|
|
Research Article: IJIRCCE |
Product Aspect Ranking Techniques: A
Survey |
Rutuja Tikait, Ranjana Badre, Mayura Kinikar |
|
|
|
Research Article: IJIRCCE |
Secured Neuro Genetic Approach for
Predicting the Risk of Heart Disease |
N.G.Bhuvaneswari Amma, K.Malathi, P.Balasubramanian |
|
|
|
Research Article: IJIRCCE |
Survey on Two Layer Encryption System |
Uma B. Ajantiwale, Prof. Ranjana Badre |
|
|
|
Research Article: IJIRCCE |
Optimized Locking and Unlocking a System
Using Arduino |
Sedhumadhavan. S, Saraladevi. B |
|
|
|
Research Article: IJIRCCE |
Data Compression in Wireless Sensor
Network: A Survey |
Chetna Bharat Mudgule, Prof. Uma Nagaraj, Prof. Pramod D. Ganjewar |
|
|
|
Research Article: IJIRCCE |
An Innovative Method to Improve Security in
Cloud: Using LDAP and OSSEC |
Shikha Nema, Shailendra Singh Raghuwanshi |
|
|
|
Research Article: IJIRCCE |
An Efficient Indoor Localization of Mobile
Nodes on Novel Cooperative Algorithm |
Anitha.L , Amarnath Prabhakaran.A |
|
|
|
Research Article: IJIRCCE |
Comparison of Three Phase Voltage Back to
Back Converter and Matrix Converter |
C.Kalaiselvi, M.Bhuvaneswari, A.Divya Vinoth Raja |
|
|
|
Research Article: IJIRCCE |
An Innovative Approach for Dynamic
Authentication in Public Cloud: Using RSA,
Improved OTP and MD5 |
Priyanka Nema |
|
|
|
Research Article: IJIRCCE |
Mobile Communication in 4G Technology |
R.Arunadevi, S.Selvakumari |
|
|
|
Research Article: IJIRCCE |
CORDIC Based FM Demodulator for Digital
Telecommand Receiver |
S.Selvakumari, A. Kiruthika |
|
|
|
Research Article: IJIRCCE |
Trust Aware Routing Framework for WSN |
G. Priyadharshini., M.Parimala |
|
|
|
Research Article: IJIRCCE |
LAN Based Industrial Automation with GSM
Connectivity |
A.Nirosha, R.Arunadevi |
|
|
|
Research Article: IJIRCCE |
A Direct Injection-Locked QPSK Modulator
Based on Ring VCO |
K.Gopi, T.Kowsalya |
|
|
|
Research Article: IJIRCCE |
Design of UWB Microstrip Filter Using
Quarter Wavelength Short Circuited Stubs |
Kavita, Sandeep Kumar, Anupma Gupta |
|
|
|
Research Article: IJIRCCE |
Design of UWB Microstrip Filter Using Quarter
Wavelength Short Circuited Stubs |
Kavita, Sandeep Kumar, Anupma Gupta |
|
|
|
Research Article: IJIRCCE |
Mixed Scheduling Coupled With Power
Control and Routing for Wireless Adhoc
Networks |
A.Vidya, N.Tamilselvi |
|
|
|
Research Article: IJIRCCE |
Scratch Recognition With In Wireless Sensor
Networks |
P.Madhavidevi, P.Rajasekhar |
|
|
|
Research Article: IJIRCCE |
Identifying Prevelance Flood Attacks in Delay
Tolerant Networks |
C.Gnana Prakash, K.Shanthi |
|
|
|
Research Article: IJIRCCE |
Power Optimization Using Clock Gating
Technique |
R.Saranya, K.Radhika , Dr.S.Nirmala, K.Priyameenkshi |
|
|
|
Research Article: IJIRCCE |
A Lightweight Framework for Detection and
Resolution for Phishing, Pharming and Email
Spoofing |
Pooja Modi, Hardik Upadhyay, Ketan Modi, Krunal Suthar |
|
|
|
Research Article: IJIRCCE |
Password less Authentication Using Keystroke
Dynamics: A Survey |
Jhalak Modi, Hardik G. Upadhyay, Mitesh Thakor |
|
|
|
Research Article: IJIRCCE |
Customize Approach for Detection and
Prevention of Unsolicited Call in VoIP
Scenario: A Review |
Jui Khamar, Hardik Upadhya, Jayesh Mevada |
|
|
|
Research Article: IJIRCCE |
A Survey: A Hybrid Approach to Secure
Transmitted Message by Combining
Steganography and Asymmetric
Cryptography |
Pooja Singh, Hardik Upadhyay, Mitesh Thakor, Krunal Suthar |
|
|
|
Research Article: IJIRCCE |
Robust and High-Secured Watermarking
System Using Zernike Moments |
P Karthik, E.Sathiya Priya |
|
|
|
Research Article: IJIRCCE |
Design of a Secured Electronic Voting System
Using Multimodal Biometrics |
Olowookere Abiodun, Awode Tolulope |
|
|
|