Issue | Title | |
Vol 2, No 12 (2014): December | A Study To Support First-N Queries And Incremental Updates To Answer Multi Keyword Queries | Abstract PDF[FULL TEXT] |
Ala Rajitha, Fasi Ahmed Parvez | ||
Vol 8, No 5 (2020): May | A Suit of Record Normalization Methods, From Naive Ones, Globally Mine a Group of Duplicate Records | Abstract PDF [Full Text] |
Mummidi Siva Sankar, Nadella Sunil | ||
Vol 5, No 8 (2017): August | A Supervised Filter Based Feature Selection Algorithm For Intrusion Detection-FMIFS | Abstract PDF [Full Text] |
D.S.S. Madhuri, R. Anusha | ||
Vol 5, No 8 (2017): August | A Support framework To Enable the Nodes to Adapt Their Routing Strategies | Abstract PDF [Full Text] |
D. Madhavi Latha, K.N.S.L. Kumar | ||
Vol 5, No 1 (2017): January | A Survey of Fourth Generation Technologies in Cellular Networks | Abstract PDF [Full Text] |
Zia Ur Rahman, Ihtesham ul Haq, Sajid Ullah, Muhammad Ilyas Ibn Abid, Kamran Ali Shah | ||
Vol 13, No 3 (2025): OCTOBER | A Survey on Big Data ads its Recent Trends in Different Industrial and Research Sectors | Abstract PDF [Full Text] |
Nandhini Shree J P, R. Rangaraj | ||
Vol 7, No 10 (2019): October | A survey on detecting financial fraud with anomaly feature detection | Abstract PDF [Full Text] |
Sirisha Rajavarapu, Havilah G.K., Tatayyanaidu G | ||
Vol 5, No 10 (2017): October | A Survey on Mathematics Fuzzy Logic Model | Abstract PDF [Full Text] |
S. Ravi Kumar, G. Srinivas Rao | ||
Vol 2, No 10 (2014): October | A Survey on Random Grid based Cryptography Schemes | Abstract PDF [Full Text] |
ankita bhimarao patkure, nikita kulkarni | ||
Vol 8, No 7 (2020): July | A Survey to Build a Movie Recommender System Using Hybrid Filtering | Abstract PDF [Full Text] |
T. Suvarna Kumari, K. Sagar | ||
Vol 4, No 1 (2016): January | A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks | Abstract PDF [Full Text] |
A. Radhika, D. VaraLaxmi | ||
Vol 5, No 5 (2017): May | A Tangible Structure To Comprehend Circuits Cipher text-Policy Based Hybrid Encryption With Verifiable Delegation (VD-CPABE) | Abstract PDF [Full Text] |
D. Shravani, J.Bala Ambedkar | ||
Vol 2, No 10 (2014): October | A Technique To Sieve Annoying Communications From Osn Client Walls | Abstract PDF [Full Text] |
Nagendla Venkateswarlu, Alahari Hanumat Prasad | ||
Vol 2, No 12 (2014): December | A texture feature extraction of crop field images using GLCM approach | Abstract PDF [Full Text] |
Sushila Shidnal | ||
Vol 3, No 11 (2015): November | A Three Phase Four Wire Network Based Interleaved High-Frequency Inverter with Single-Reference Eight-Pulse-Modulation Technique for Fuel Cell Vehicle Applications | Abstract PDF [Full Text] |
Mahboob Peera Shaik, M.Bala Subbareddy | ||
Vol 5, No 4 (2017): April | A Two Layer Secure Data Search with Bilinear Map and AES over Cloud | Abstract PDF [Full Text] |
V.B.T. Rajeswari, R. Srinivas | ||
Vol 3, No 11 (2015): November | A Unified Control Startergy For Three Phase Inverter In Dg | Abstract PDF [FULL TEXT] |
Ramya Kanaka Sowjanya Maddila, B.D.S. Prasad | ||
Vol 6, No 12 (2018): December | A unified two level online learning scheme to optimizer a distance metric | Abstract PDF [Full Text] |
Ravanam Sri Anusha Devi, G K Havilah, G Tatayyanaidu | ||
Vol 5, No 8 (2017): August | A Versatile Cryptographic Primitive to Protect Group Communications and Computation Platforms | Abstract PDF [Full Text] |
Nagendra Rasamsetti, Veerendra Bethineedi | ||
Vol 2, No 9 (2014): September | A Voltage Oriented Control Method for PV - Grid Interfaced Inverter by Using Advanced MPPT Algorithm | Abstract PDF [Full Text] |
Bhargav Ram T, Hima Bindu S | ||
Vol 3, No 7 (2015): July | A Well-Organized Revocable Data Access Control for Multi-Authority Cloud Storage | Abstract PDF [Full Text] |
Harika Mallisetti, Jaladi Praveena | ||
Vol 2, No 11 (2014): November | Accelerometer Based Vehicle Monitoring And Tracking System Using ARM Processor And GPS | Abstract PDF [Full Text] |
B. Praveen kumar, V. Anuragh, NLP Raju | ||
Vol 4, No 9 (2016): September | Access Control And Security Mechanisms On Sensitive Information | Abstract PDF [Full Text] |
P. Srivijaya, D Srinivas | ||
Vol 2, No 10 (2014): October | Accessable and Confident allotment of Personal Health Records in the cloud | Abstract PDF [Full Text] |
Anil Alla, Ramanjaiah G | ||
Vol 6, No 5 (2018): May | Accessible Method for Content-Based Image Retrieval In Peer To- Peer Networks | Abstract PDF [Full Text] |
Dandangi Ravi, P Padmaja, M. Veerabhadra Rao | ||
226 - 250 of 1122 Items | << < 5 6 7 8 9 10 11 12 13 14 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â