Table of Contents
Articles
To demonstrate overlay routing using BPG routing, TCP improvement, and VOIP applications | PDF [Full Text] |
P.Vasavika Komali, M. Vamsi Krishna | 547-550 |
A novel DNA encryption technique using efficient key generation method for secure data | PDF [Full Text] |
Ardhani Siva Sravanthi, S. Sushma | 551-555 |
An Analysis on Differential Query Services in Cost–Efficient Clouds | PDF [Full Text] |
Shaik Noorjahan, G Minni, Sayeed Yasin | 556-561 |
Enhancing inquiry responsive time to discover spatial items with keywords | PDF [Full Text] |
P. Manikanta, J. Rajanikanth | 562-565 |
A novel approach to naturally mine equivalent elements from relative questions | PDF [Full Text] |
Srinu Chinnam, P. Arun Patnaik | 566-569 |
Reducing Cost of Cloud Bandwidth using Prediction-Based System | PDF [Full Text] |
Rajapudi Durga Devi, G Syam Prasad | 570-575 |
Distributed access control with unknown validation of information stored in clouds | PDF [Full Text] |
Bande Nagendra Babu, Avinash Potluri | 576-579 |
Design Of Conventional Deep Drawing And Hydro Forming Deep Drawing By Finite Element Analysis | PDF [Full Text] |
B.Nagarjuna Reddy, Sandhi. Raja Sekhar, J Hari Narayana Rao | 580-591 |
Eco-Physiological Studies On Fox Sagar Lake With Reference To Water Quality | PDF [Full Text] |
A. Rajani, E.M. Sunitha, T. Sreelakshmi, P. Vaani, O. Sitakumari, K. Shailaja | 592-596 |
Control Of Active And Reactive Power Using Distributed Energy System For Power Generation In Distribution Network | PDF [Full Text] |
S Swapna Dharma, Shaik Hussain Vali | 597-601 |
An Improved Performance Of Pid And Fuzzy Controller Based Sapf For Wind And Solar Power Generation | PDF[FULL TEXT] |
T Bhaskara Rao, B Aditya Kumar, K Ramana Babu | 602-608 |
Discovering Closely Related Peers of a Person in Social Networks | PDF[FULL TEXT] |
Veepuri VS Prasad Raju, D Suneetha | 609-616 |
A New Technique For Authenticating Short Encrypted Messages | PDF [Full Text] |
M.Vamsi Krishna, V.G.L. Narasamba, N. Veeramani | 617-621 |
Evaluation of LOCX for location-basedsocial applications (LBSAS) while preserving user locationprivacy | PDF [Full Text] |
M.Vamsi Krishna, Ch. Sandeep | 622-625 |
Legacy Authentication Methods Preventing Key logging Attacks | PDF [Full Text] |
M.Vamsi Krishna, K. Nagababu | 626-629 |
To Assess Numerous Procedures in combination with a Neural learning plan to semantically classify short texts | PDF [Full Text] |
Vijya Sai KumarSheela, A. Ramesh, K. Ramesh | 630-633 |
Hop-by-Hop Adaptive linking A Novel Approach for Finest routing | PDF [Full Text] |
Sunkara Mounika, Md Amanatulla | 634-638 |
Dynamics Of Multi layered Composite Shell With Shape Memory Alloys | PDF [Full Text] |
B.Venkateswa Rao, I.Vinod Babu, V.V. Subba Rao, J Hari Narayana Rao | 639-650 |
Encounted Malware Using Spyware In Delay Tolerant Network | PDF[FULL TEXT] |
B Estheramma, G Dayanandam, Dr. T . V. Rao | 651-656 |
A Framework For Protecting The Privacy In Web Search | PDF[FULL TEXT] |
A.V.S Laxman Kumar, K.C Sreedhar | 657-662 |
Self-Assured Formal Deduplication In FusionCloud Methodology | PDF[FULL TEXT] |
P Lakshmi Tejaswi, N Srinu | 663-667 |
Smart House Controlling system for Time Critical Appliances Controlling Smart House system with ease Real Time Appliances | PDF[FULL TEXT] |
M Sunil, S.I Siva Jyothi | 668-671 |
A Newfangled Authentication Protocol Based On Audio Produced Principles | PDF[FULL TEXT] |
P Suneetha, B Sujatha | 672-678 |
Fortification Support Access Control Manipulate Procedure Intended for Relational Data | PDF[FULL TEXT] |
Puppala S P K Parameswari, Madhavarao M | 679-682 |
Secure Deduplication Technique for Privilege Data Access Using Hybrid Cloud | PDF[FULL TEXT] |
Priyanka Vajja, Gopala Krishna J S V | 683-685 |
A Novel Approach For Large-Scale D ata Processing Platform On Peer- To- Peer Based Bestpeer++ | PDF [Full Text] |
V. Prasanthi, N. Anusha | 686-689 |
Data Access In Disruption Tolerant Networks Using Cooperative Caching | PDF [Full Text] |
M. Arshi, N. Deepak | 690-693 |
Multicast Routing In MANETS | PDF [Full Text] |
M. Mounica, Samparthi V S Kumar | 694-697 |
Implementation And Evaluation Of Privacy Preserving Protocol | PDF [Full Text] |
M.Lakshmi Priyanka, Chaithanyaa Deepthi | 698-701 |
An Effective Secure Authorized Deduplication in Hybrid Cloud | PDF [Full Text] |
Atchana Venugopal, M.N.Satish Kumar | 702-706 |
The Methodology To Underrate Routing Incursion In Informatics Networks | PDF [Full Text] |
Gopala Krishna T, Sai M | 707-711 |
Explicit Uncertainty word directing through Data Mining | PDF [Full Text] |
Anguluri Anil Kumar, Byravarapu Prashant | 712-716 |
Finest Informant Filtering of Malicious Traffic in Intrusion Detection System | PDF [Full Text] |
Palli Rama Krishna, K Ravi Kumar | 717-722 |
Distributed Manipulation Through Unidentified Data Accumulated In Cloud | PDF [Full Text] |
G. Ramyadeepika, Sheik Ahmad Shah | 723-728 |
Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks | PDF [Full Text] |
J Bala Ambedkar, D Srinivas | 729-735 |
A Numerical Model To Predict The Performance Of A Ci Engine Enriched By Hydrogen Fuel And Flow Visualization In The Intake Manifold For Hydrogen Injection Using CFD | PDF [Full Text] |
G.Bala Krishna Reddy, Sammala. Rajasekhar, A.Venkata Sridhar, Y.Dhana Sekhar | 736-750 |
Design And Material Optimization Of Wind Turbine Blade | PDF [Full Text] |
D.L.V. Subrahmanyam, Kuppili.Mohan Krishna, Sammala. Rajasekhar, Y.Dhana Sekhar | 751-763 |
Individualized Recommender System Using Keywords With Efficient Similarity Computation Employing Map Reduce | PDF [FULL TEXT] |
K. Sindhuja, D Srinivas | 764-769 |
A New Effective Subject Extraction for Travel Package Suggestions | PDF [Full Text] |
Kurapati Kiran Kumar, K Ashok Reddy | 770-773 |
A protection PWS system UPS to sum up profiles as per client security prerequisites | PDF [Full Text] |
Tadapaneni Sambasivarao, Lukka Srikanth | 774-776 |
Multi-Level Inverter with Facts Capability for Reliable Power Distributions Using Wind Energy as Source | PDF[FULL TEXT] |
K Durga Prasad, G Venkateswarao | 777-784 |
The cloud Methodology for Reliable approved deduplication | PDF[FULL TEXT] |
Ravi Raj Kuna, R Chandra sekhar | 785-790 |
Scattered simultaneous and autonomous access to scrambled cloud databases | PDF[FULL TEXT] |
B Mahalakshmi Rao, K Ravi Kumar | 791-796 |
A novel Fuzzy Based STATCOM Control Scheme for the Grid Connected Wind Energy Generating System | PDF[FULL TEXT] |
K KotaiahChowdary, P Raghavarani | 797-804 |
Facet Based Estimation Polling From Customer Reviews | PDF[FULL TEXT] |
M K Subrahmanyam, R.V Satayanarayana | 805-811 |
Protection Tolerate Access Manipulate Procedure for Relational Data | PDF [Full Text] |
Kartheek Ravula, Uthpala B | 812-816 |
An Adpted Search On Mobile Devices With Shielded Web | PDF [Full Text] |
Venkata Jyothsna Tatikonda, Mowna SK | 817-822 |
Optimal Clustering approach used for concurrent Probabilistic Graphs | PDF [Full Text] |
Parimala Sowmya Bodapati, Amarnadh Suragani | 823-828 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â