Table of Contents
Articles
| Effective Data Hiding Method Through Pixel Pair Matching | PDF [Full Text] |
| N. Arjun, Ch. Sridevi, V.Dhana Raj, A. Praveen | 657-660 |
| Restrain On Social Networks From Conjecture Attacks | PDF [Full Text] |
| K Gowtham Kumar, P Eswaraiah | 661-662 |
| Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus | PDF[FULL TEXT] |
| S Venkataramana, N.G.N Prasad | 663-665 |
| A Reconfigurable Low Power FPGA Design with Autonomous Power Gating and LEDR Encoding | PDF[FULL TEXT] |
| K Raghuram, Dhana Lakshmi Yarkaredy | 666-668 |
| Power Quality Enhancement of Grid interconnected wind energy system with 4-Leg Inverter | PDF[FULL TEXT] |
| P balaji, B Venkateswarlu, V Haribabu | 669-674 |
| A Noval Converter For Integrated Wind – Pv Energy System | PDF[FULL TEXT] |
| A Devika Bala, T Subash chowdary, D Srilatha | 675-679 |
| Co-ordinate Control for Fuel Cell And Photovoltaic Cell | PDF [Full Text] |
| Gurram Nookaraju, S. Gangadharan, B. Subbareddy | 680-684 |
| Dynamic Performance Improvement Of Induction Motor Using Radr Controller | PDF[FULL TEXT] |
| P Raja, SK Meera shareef | 685-689 |
| A Novel Three-Port Converters For Solar Power System | PDF[FULL TEXT] |
| B Surendra, B Srinivasulu, SK Meera shareef | 690-695 |
| Modelling And Simulation Of Lossless Damping Reduction By Vector Controlled Ac Motor Drive With An Efficient Lc Filter | PDF [Full Text] |
| A Anusha, O.V.S. Srinivasa Prasad | 696-705 |
| A PWM Controlled IGBT based VSCS with a Battery Energy Storage System for an Isolated Wind-Hydro Hybrid System Using Cage Generators | PDF [Full Text] |
| D. Narendra, N.V.A Ravi Kumar | 706-711 |
| Performance Improvement of IUPQC in Distribution System under Abnormal Conditions Using FLC | PDF [Full Text] |
| E Durga Prasad, Sheik Mahaboob Shariff, N.Rama Surya Rao | 712-719 |
| Application of Integrated Interface Schema (LIS) Over Multiple WDBS To Enhance Data Unit Annotation | PDF[FULL TEXT] |
| M Vamsikrishna, G G.Parameswarakumar | 720-724 |
| Mobile Ad Hoc Networks Authentication Using Npv Method | PDF[FULL TEXT] |
| M Vamsi Krishna, S Geetha | 725-728 |
| A New Approach for Node Replica Detection in WSN | PDF[FULL TEXT] |
| M Vamsi Krishna, T ravi kumar | 729-732 |
| Security Analysis And Perform Extensive Simulations To Demonstrate The Efficiency Of Mona For Data Sharing In The Cloud | PDF[FULL TEXT] |
| M Vamsi Krishna, K V.V.S.Narayana Murthy, T Satya swaroop | 733-736 |
| To Provide A Privacy Preserving Auditing Protocol In Cloud Computing Using Tpa | PDF[FULL TEXT] |
| M Vamsi Krishna, V Sailaja, K V.V.S.Narayana Murthy | 737-741 |
| Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity | PDF[FULL TEXT] |
| M Vamsi Krishna, K V.V.S.Narayana Murthy | 742-745 |
| A Security Measure That Quantify The Anonymity Of Different Systems | PDF[FULL TEXT] |
| M Vamsi Krishna, Yalla Satyasudheer | 746-749 |
| The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols | PDF[FULL TEXT] |
| N Santoshi Lakshmi, M V.V.S.Narayana Murthy | 750-754 |
| Privacy and Classification Of Analyzed Data Using EMD | PDF[FULL TEXT] |
| T Sravya, G Appa Rao | 755-758 |
| Percolate And M Supremacy User Walls By Using Pfw | PDF[FULL TEXT] |
| anush chaitanya katikitala, madhavi katamaneni | 759-762 |
| Design and Analysis of Progressive Die for Chain Link Plate | PDF [Full Text] |
| Md Inaithul Rehaman, P Satish Reddy, Matta Manoj, N.Guru Murthy | 763-768 |
| Biodiesel Production By Using Native Micro Algae From Food Processing Wastewater In Shake Flask Cultures | PDF [Full Text] |
| D. Sreekanth, P.Manikya Reddy, V.Kamakshi Himabindu | 769-782 |
| Bioremediation Of Dairy Wastewater Using Microalgae For The Production Of Biodiesel | PDF [Full Text] |
| D. Sreekanth, K. Pooja, Y. Seeta, V. Himabindu, P.Manikya Reddy | 783-791 |
| Enhanced Protocol for data exchange through Natural Wireless Ad Hoc Networks | PDF[FULL TEXT] |
| M Vamsi Krishna, R.Satya Ravindra Babu | 792-795 |
| To Provide A Classification Mechanism To Avoid Useless Data From Osn Walls | PDF[FULL TEXT] |
| M Vamsikrishna, N Madhurisha | 796-800 |
| A New Extensible Key Exchange Scheme For Wireless Sensor Networks | PDF[FULL TEXT] |
| B Kalpana, N Siva Rama Krishna | 801-805 |
| Low-Error and High-Throughput Discrete Cosine Transform (DCT) Design | PDF[FULL TEXT] |
| Sadiq Ali Mohammad, Sumanth K | 806-810 |
| Securing Manets By Using An Intrusion Detection System (Eaack) | PDF[FULL TEXT] |
| M Vamsi Krishna, D Jaya Prakash | 811-814 |
| Seculation Routing With Fortification Wireless Networks | PDF[FULL TEXT] |
| Tikka Pallam Raju, B S N Murthy | 815-817 |
| Unique value disintegration for probing results using clustering algorithm | PDF[FULL TEXT] |
| Sushuma Narkedamilli, B S N Murthy | 818-822 |
| Accelerometer Based Vehicle Monitoring And Tracking System Using ARM Processor And GPS | PDF [Full Text] |
| B. Praveen kumar, V. Anuragh, NLP Raju | 823-828 |
| Closed Loop Fuzzy Logic Control of High Voltage Gain Interleaved Boost Converter fed 3-Ï• BLDC Motor Drive | PDF [Full Text] |
| Tarun Kumar. Mallemoggala, Rama Kumar.M.S, Bala Murali Krishna.V | 829-834 |
| Design and Implementation of Unsigned Multiplier Using COSA | PDF [Full Text] |
| S.Varaprasad Babu, T.Babu Rao | 835-840 |
| Secure Gratified Allocation with Uncontrived System in Adhoc Networks | PDF[FULL TEXT] |
| Sudhakar CH, Varada Rajkumar K | 841-845 |
| A High speed Vedic Multiplier using Different Compressors | PDF[FULL TEXT] |
| Devi Sasikala D, Nagaraju NV | 846-851 |
| Easing Operative User Steering through Website Construction Development | PDF[FULL TEXT] |
| R Konda Reddy, Balakrishna Konduru | 852-855 |
| Rtl Desing And Vlsi Implementation Of An Efficient Convolution Encoder And Adaptive Viterbi Decoder | PDF[FULL TEXT] |
| Eleesha THALAKAYALA, V.G Pavan Kumar | 856-860 |
| Disk Resident Taxonomy Mining for Large Temporal Datasets | PDF [Full Text] |
| P.Lakshmi Bhanu, N. Leelavathy, G.Satya Suneetha | 861-868 |
| An FPGA Implementation Of Real-Time Finger-Vein Recognition System For Security Levels | PDF [Full Text] |
| Durga Veera Prasad V, A Arunkumar Gudivada | 869-875 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


