Table of Contents
Articles
| Current Control of Three Phase Grid – Connected PV Inverter Using Fuzzy Logic Controller | PDF [Full Text] |
| P Sai Manikanta, K Venkata Ramana | 153-160 |
| A New Control Strategy For Cascaded H-Bridge Multilevel PV Inverter With Distributed MPPT For Grid Connected Applications | PDF [Full Text] |
| Nagulapalli Trimurthulu, M Sudheer Kumar | 161-168 |
| Emerging Session Management and Secured User Access Control for Internet services | PDF [Full Text] |
| Konduru Sandeep, M Murali Krishna | 175-179 |
| Enhanced Arbitrary Topology for Efficient Encryption Using Short Cipher texts | PDF [Full Text] |
| Bora Narsunaidu, Dr. Rjendra Kumar Ganiya | 180-184 |
| Power Quality Enhancement In DG Based Micro grid Using UPQC | PDF [Full Text] |
| M Jyothi, G Kamesh | 185-189 |
| Power Optimized CNN Based CAM Using Clock Gating Techniques | PDF [Full Text] |
| K. SaiLakshmi, K.Siva Nagendra | 190-192 |
| Adaptive Control Strategy of Active Power Filter for Harmonic Compensation of Non Linear Loads | PDF [Full Text] |
| P Sri Kavitha, B Subba Reddy | 193-197 |
| A New Double Security And Protection Schemes In Cloud Storage | PDF [Full Text] |
| Sk. Shammi, T. Naga Raju | 198-201 |
| Efficient Mechanism For Privacy And Improve The Quality Answers In Q&A Systems | PDF [Full Text] |
| N. Bala Subrahmanyam, D. Srinivas | 202-205 |
| Accessible Method for Content-Based Image Retrieval In Peer To- Peer Networks | PDF [Full Text] |
| Dandangi Ravi, P Padmaja, M. Veerabhadra Rao | 206-209 |
| Identifying Node Falls In Mobile Wireless Networks: A Probabilistic Method | PDF [Full Text] |
| Talla Soni Priya, P Padmaja, M. Veerabhadra Rao | 210-212 |
| Cryptographic Primitive to Enable a User to Check And Update Integrity Of Outsourced Files In a Cloud Server | PDF [Full Text] |
| Chavala Naga Lakshmi Geetha, V S Naidu, M. Veerabhadra Rao | 213-216 |
| A Novel Multi Scale Index for Exact and Approximate NKS Query Processing | PDF [Full Text] |
| Petta Susmita, K V V Ramana, M. Veerabhadra Rao | 217-220 |
| Characterization Of Epoxy Composites Reinforced With Short Palmyra Fibers | PDF [Full Text] |
| Shikha Karuna Kumar, P.Satish Reddy, N.Guru Murthy, M Babji | 221-225 |
| Detection of Delamination in A Composite Beam By Using Vibration Analysis | PDF [Full Text] |
| Sarat Chandra Yanapu, P.Satish Reddy, N.Guru Murthy, M Babji | 226-229 |
| A New Accountable Data Transfer Protocol In Malicious Environments | PDF [Full Text] |
| Guthula Akhil, Veera Raju Ryali | 230-233 |
| An Efficient Separation of Users And Improve Access Permissions to Protect User Identity In Cloud | PDF [Full Text] |
| Meka Sayiram, Subhash Chintalapudi | 234-237 |
| New Hybrid Active Filter Topology With Variable Conductance For Reduced Harmonic Distortion | PDF [Full Text] |
| P Satya Sri, P Govinda Raju | 169-174 |
| A Secure Data Transmission Using Efficient Aggregate Signature Scheme to Verify Data in Wireless Sensor N/W | PDF [Full Text] |
| Ganti Dinesh Kumar, G K Havilah, M. Veerabhadra Rao | 238-240 |
| A Novel Estimation of Range Queries over Spatial information by Users | PDF [Full Text] |
| Kalagata Venkataramana, K V V Ramana, M. Veerabhadra Rao | 241-243 |
| A New Semantic Correlation Among Data Sets to Reduce Processing Latency | PDF [Full Text] |
| Bhadri Sri Surya Aruna | 244-247 |
| A Concrete Construction of RS IBF In Defined Security Model | PDF [Full Text] |
| Donga Mounika, M Vinaya Nagini, M. Veerabhadra Rao | 248-251 |
| Providing High Quality Answers For Users Posted Questions Using Question-User Mapping In Q&A Websites | PDF [Full Text] |
| Nimana S V Raja, V Swamy Naidu, M. Veerabhadra Rao | 252-255 |
| Efficient Secure Framework For Providing Security In n/w Layer For MANET | PDF [Full Text] |
| Jagadam Lovaraju | 256-259 |
| An Inverted Index Structure for the Social Image Dataset To Accelerate the Searching Process | PDF [Full Text] |
| Gosangi Swathi, M Vinaya Nagini, M. Veerabhadra Rao | 260-262 |
| Online Social Voting Techniques in Social Networks Used for Distinctive Feedback in Recommendation Systems | PDF [Full Text] |
| G.N.P.S Kranthi, B.V Ram Kumar | 263-268 |
| Secured Framework for Data Outsourcing using ABE in Cloud Computing | PDF [Full Text] |
| V Sri Ramya, A.P.V.D.L A.P.V.D.L. Kumar | 269-275 |
| A Multi-Level access control scheme towards software as a service in cloud computing | PDF [Full Text] |
| M Suneetha, G Vijaya Kumari | 276-282 |
| A Progressive Technique for Duplicate Detection Evaluating Multiple Data Using Genetic Algorithm with Real World Objects | PDF [Full Text] |
| K. Sai Mallikarjuna, N N. Sushma | 283-288 |
| A New Search Recommendation for automatically Mining Query Facets | PDF [Full Text] |
| V. Neelima, T. Veeraju | 289-292 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


