Table of Contents
Articles
| Gender and Name Classification Based on Texture, Local Binary Pattern and Probabilistic Neural Network | PDF [Full Text] |
| Alla Mahesh, M.Raja Babu | 876-879 |
| The Dynamic Load Balancing Method On Game Theory For Distributed Systems | PDF[FULL TEXT] |
| Lakshmi Sowjanya Sivalenka, CH Hemanandh, K.T.V Subbarao | 880-883 |
| Analyzation Of The Scalability Problems Of Distributed Presence Server Architectures | PDF[FULL TEXT] |
| R Sangeetha, M.M Balakrishna, K.T.V Subbarao | 884-887 |
| A Clustering-Based Shifting Technique To Align Data Units In Web Data Bases | PDF[FULL TEXT] |
| lalitha kumari kolli, K.V.T subba rao | 888-891 |
| A Routing Algorithm To Reduce The Queueing Complexity In Communication Networks | PDF[FULL TEXT] |
| Suresh pydi, A Ramamurthy, K.T.V Subbarao | 892-895 |
| A Classification Mechanism To Avoid Useless Data From Osn Walls | PDF[FULL TEXT] |
| S koteswara rao Yarlagadda, CH Hemanand, K.T.V Subbarao | 896-900 |
| Analysis of Sandwich Beam | PDF [Full Text] |
| M Siva Prasad, P Satish Reddy, Matta Manoj, N.Guru Murthy | 901-908 |
| A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users | PDF[FULL TEXT] |
| R Suganya, K.V.T Subbarao | 909-912 |
| To Provide An Innovative Policy Anomaly Management Framework For Firewalls | PDF[FULL TEXT] |
| Subha Sree Mallela, M M Bala Krishna, K.T.V Subbarao | 913-916 |
| Resonant Current Control Of Three Phase Grid Connected Photovoltaic Inverters | PDF [Full Text] |
| V. Pranay Kumar, M.M. Irfan | 917-924 |
| Optimal Object Placement Policies To Minimize The Network-Wide Content Provisioning Cost | PDF[FULL TEXT] |
| Ravikala Raveendra, G Raju, K.T.V Subbarao | 925-929 |
| Switching Activity Reduction Technique In Soc Testing | PDF [Full Text] |
| P. Sai Kumar, N S Govind | 930-935 |
| Enhancement of Power Quality by Using Shunt Hybrid Power Filter With TCR | PDF [Full Text] |
| D. Srikanth, V. Sreepriya | 936-943 |
| An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks | PDF[FULL TEXT] |
| S Rajeswari, A Ramamurthy, K.T.V Subbarao | 944-947 |
| A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice | PDF[FULL TEXT] |
| K Suganya, K.V.T subba rao | 948-952 |
| An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network | PDF[FULL TEXT] |
| Morampudi Satya Harish, A Ramamurthy, K.T.V Subbarao | 953-955 |
| To Improve Content Based Face Retrieval By Creating Semantic Code Words | PDF[FULL TEXT] |
| Melam Srikanth, A Ramamurthy, K.T.V Subbarao | 956-959 |
| To Achieve An Optimal Tradeoff Between P2p Overlay Maintenance And Video Sharing Efficiency In Osn’s | PDF[FULL TEXT] |
| D Bhanuprakash, A Ramamurthy, K.T.V Subbarao | 960-963 |
| A Searchbased Multi-Objective Approach To Generate Test Suites For High Branch Coverage | PDF[FULL TEXT] |
| M.N.V Surekha, K.V.T subba rao | 964-967 |
| Performance Analysis Of IPMSM Drive Using Fuzzy Logic Controller Based Loss Minimization Algorithm (LMA) | PDF [Full Text] |
| P. Sandeep, G. Venkata Sagar, Subbirami Reddy | 968-976 |
| Evaluate The Quality Of Marked Decrypted Image Quantitatively To Encrypted Images Using Rdh | PDF[FULL TEXT] |
| N Bhaskar, VijayKumar Janga | 977-980 |
| Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage | PDF[FULL TEXT] |
| M Mounika, Farhana Begum | 981-984 |
| An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers | PDF[FULL TEXT] |
| Ch Rajeshwari, S Suresh | 985-988 |
| A Study To Support First-N Queries And Incremental Updates To Answer Multi Keyword Queries | PDF[FULL TEXT] |
| Ala Rajitha, Fasi Ahmed Parvez | 989-991 |
| A Complete System To Securely Outsource Log Records To A Cloud Provider | PDF[FULL TEXT] |
| kodari Shravan Kumar, Vishnuprasad Goranthala | 992-995 |
| Boost Interleaved Converter Integrated Voltage Multiplier Module for Renewable Energy System | PDF[FULL TEXT] |
| E Sandhya Rani, CH Vinod Kumar, Y Srinivas Rao | 996-1005 |
| A texture feature extraction of crop field images using GLCM approach | PDF [Full Text] |
| Sushila Shidnal | 1006-1011 |
| Contact Stress Analysis of Helical Gear by Using AGMA and ANSYS | PDF [Full Text] |
| S.Sai Anusha, P.Satish Reddy, P. Bhaskar, M Manoj | 1012-1016 |
| Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud | PDF[FULL TEXT] |
| Penta Mukhesh, A Ramamurthy, K.T.V Subbarao | 1017-1020 |
| A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours | PDF[FULL TEXT] |
| P Ramojeerao, G Raju, K.T.V Subbarao | 1021-1024 |
| Maintain Data Integrity And Protection Of Private Label Information In Social Network Data | PDF[FULL TEXT] |
| Mallam Ujwala, P Ravi | 1025-1027 |
| A Novel Method for Providing Discrete Filtering and Blacklisting Options for OSN Users | PDF [Full Text] |
| gadde sai sudha, K. Priyanka | 1028-1032 |
| Character segmentation from multi-oriented video words using Discrete Wavelet Transform and K-Means Clustering | PDF [Full Text] |
| B.Jagadeesh babu, D Kishore | 1033-1039 |
| A Study on Process Parameters in Milling of Al-MMC | PDF [Full Text] |
| B.Swapna Priya, P.Satish Reddy, P. Bhaskar, M Manoj | 1040-1043 |
| Pitch Control of DFIG Wind Turbine Based on Fuzzy Logic Controller | PDF [Full Text] |
| T.Anil Kumar, Ch.V.V. Mangalakshmi | 1044-1048 |
| Simulation of VSC Based HVDC Transmission System under Fault Conditions | PDF[FULL TEXT] |
| K Sivanagamani, P Bhaskar Reddy | 1049-1055 |
| Dairy Automation Using Controlled Area Network Protocol | PDF [Full Text] |
| B.Praveen Kumar, S. Rajagopal | 1056-1060 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


