Table of Contents
Articles
Twitter Spam Detection Using Hybrid Method | PDF [Full Text] |
Borra Haritha | 137-140 |
A New Hybrid Method For Credit Card Fraud Detection On Financial Data | PDF [Full Text] |
Narra Murali Krishna | 141-144 |
Health Monitoring for Overtime Usage of Social Media | PDF [Full Text] |
Kunapareddi Lalitha Devi | 145-148 |
Monitoring User Health Condition on Social Based on their Tweets | PDF [Full Text] |
K. Jyothirmayi | 149-151 |
A Novel Access Control Procedure To Maintain Health Records In Cloud | PDF [Full Text] |
Prabha Sailaja Palagummi | 152-154 |
Secure Sharing of PHR Data Using Re-Encryption: SESPHR | PDF [Full Text] |
V K Monika, V Praveen Kumar Bejagam | 155-157 |
Providing Cloud Data Security By Using Proof of Past Log | PDF [Full Text] |
B. Anila, B.Maha Lakshmi Rao | 158-161 |
A novel approach for Secure Key-Deduplication with IBBE | PDF [Full Text] |
L.Venkata Lakshmi, R. Anusha | 162-165 |
Finite Element Study of Behavior of Sandwich Beam Under Static And Dynamic Conditions | PDF [Full Text] |
Nagasuryanarayana P, J Suresh, P.Satish Reddy, N.Guru Murthy | 166-171 |
Computational Fluid Dynamics Analysis Of Louver Fins With Different Configurations | PDF [Full Text] |
V Prasanna Kumar, M Babji, P.Satish Reddy, P Bhaskara Rao | 172-177 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â