Issue | Title | |
Vol 3, No 11 (2015): November | Precision Controlled Secrecy Stabilization In Relational Data | Abstract PDF [FULL TEXT] |
Rajkumar Lingamgunta, Jajula Hari Babu | ||
Vol 5, No 5 (2017): May | Predictive Query Indexing for Ambiguous Moving Objects in Uncertain Data Mining | Abstract PDF [Full Text] |
Gowri SreeLakshmi Neeli, Kesavarao Seerapu | ||
Vol 5, No 6 (2017): June | Predictive Torque Control Scheme for Three-Phase Four-Switch Inverter -Fed Induction Motor Drive | Abstract PDF [Full Text] |
M Aparna, K Naga Tejaswani | ||
Vol 5, No 4 (2017): April | Premature Breast Cancer Mammographic Detection Using Image Segmentation Approaches | Abstract PDF [Full Text] |
Bilal Rasheed, Omer Suleman | ||
Vol 8, No 7 (2020): July | Preprocessing Data is Used to Envision Hospitalization in Emergency Department | Abstract PDF [Full Text] |
Yedla Chandini, B. Srinivas | ||
Vol 6, No 3 (2018): March | Preventing DDOS Attack by Dynamic Path Identifiers In Internet | Abstract PDF [Full Text] |
Ananth Teja, V.Aditya Ramalingeswararao | ||
Vol 3, No 12 (2015): December | Prevention of Sensitive Information by Enhancing Cloud Access Control | Abstract PDF [FULL TEXT] |
Swamy Mandapaka, D Ramesh | ||
Vol 2, No 11 (2014): November | Privacy and Classification Of Analyzed Data Using EMD | Abstract PDF[FULL TEXT] |
T Sravya, G Appa Rao | ||
Vol 3, No 12 (2015): December | Privacy enhanced and web based service composition | Abstract PDF [FULL TEXT] |
Bandaru Swamy Sri, U Vinod Kumar | ||
Vol 4, No 9 (2016): September | Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media | Abstract PDF [Full Text] |
Veeramala Devi, K.Naga B hargavi | ||
Vol 3, No 12 (2015): December | Privacy Preservation and traceability support using Public Auditing Mechanism | Abstract PDF [FULL TEXT] |
Jayanthi Anusha, K Lakshmi Priya | ||
Vol 3, No 4 (2015): April | Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique | Abstract PDF[FULL TEXT] |
himasri p, chandhra sekhar m.v.b | ||
Vol 5, No 7 (2017): July | Privacy Protection Data and Batch Auditing Through Public Auditing Scheme | Abstract PDF [Full Text] |
Amiripalli Naga Vamsi Krishna, P. Bala Krishna Prasad | ||
Vol 2, No 10 (2014): October | Probity and Speculations Yielding Model For Multi Clouds | Abstract PDF [Full Text] |
Gayithri Mantravadi, Pitchiah R | ||
Vol 3, No 2 (2015): February | Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users | Abstract PDF[FULL TEXT] |
Syam Kumar Nallamothu, Amanatulla Mohammad, Sayeed Yasin | ||
Vol 3, No 8 (2015): August | Proficient Authentication Mechanism for Mobile and Pervasive Computing | Abstract PDF [Full Text] |
Kantamraju Anuhya, G Syam Prasad | ||
Vol 3, No 11 (2015): November | Protected data retrieval System using CP-ABE for decentralized Tolerant Networks (DTNs) where many key authorities manage their attributes separately | Abstract PDF [FULL TEXT] |
V Siva mallikarjunarao, K Jhon Paul | ||
Vol 4, No 8 (2016): August | Protecting (PWS) Structure Ups To Generalize Profiles As Per Client Indicated Protection Requests | Abstract PDF [Full Text] |
T.Rama Satya Vani, Satti.Vijaya Krishna Reddy | ||
Vol 3, No 9 (2015): September | Protection Assessment of Design Classifiers under Assault | Abstract PDF[FULL TEXT] |
D Srujan Chandra Reddy, S Ajay kumar | ||
Vol 3, No 9 (2015): September | Protection Guarded Secrecy Sustain Access Manipulate Procedure Intended for Relational Data | Abstract PDF[FULL TEXT] |
D Srujan Chandra Reddy, Y Siva Parvathi | ||
Vol 4, No 11 (2016): November | Protection of “Fault Tolerant Parallel Filters†by Hamming code with Reversible logic | Abstract PDF [Full Text] |
Sabbi Suryakala, M Nagendra Kumar | ||
Vol 3, No 10 (2015): October | Protection Tolerate Access Manipulate Procedure for Relational Data | Abstract PDF [Full Text] |
Kartheek Ravula, Uthpala B | ||
Vol 3, No 11 (2015): November | Providing Best Quality Of Video Streaming Using AMES Method | Abstract PDF [FULL TEXT] |
harikoti raj venkat, Vahiduddin shariff | ||
Vol 7, No 7 (2019): July | Providing Cloud Data Security By Using Proof of Past Log | Abstract PDF [Full Text] |
B. Anila, B.Maha Lakshmi Rao | ||
Vol 3, No 7 (2015): July | Providing Distinguish Access Levels to Encrypted Cloud Databases | Abstract PDF [Full Text] |
Mohammad Juned Ansari, Syed Yasin | ||
851 - 875 of 1079 Items | << < 30 31 32 33 34 35 36 37 38 39 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â