Browse Title Index


 
Issue Title
 
Vol 3, No 11 (2015): November Precision Controlled Secrecy Stabilization In Relational Data Abstract   PDF [FULL TEXT]
Rajkumar Lingamgunta, Jajula Hari Babu
 
Vol 5, No 5 (2017): May Predictive Query Indexing for Ambiguous Moving Objects in Uncertain Data Mining Abstract   PDF [Full Text]
Gowri SreeLakshmi Neeli, Kesavarao Seerapu
 
Vol 5, No 6 (2017): June Predictive Torque Control Scheme for Three-Phase Four-Switch Inverter -Fed Induction Motor Drive Abstract   PDF [Full Text]
M Aparna, K Naga Tejaswani
 
Vol 5, No 4 (2017): April Premature Breast Cancer Mammographic Detection Using Image Segmentation Approaches Abstract   PDF [Full Text]
Bilal Rasheed, Omer Suleman
 
Vol 8, No 7 (2020): July Preprocessing Data is Used to Envision Hospitalization in Emergency Department Abstract   PDF [Full Text]
Yedla Chandini, B. Srinivas
 
Vol 6, No 3 (2018): March Preventing DDOS Attack by Dynamic Path Identifiers In Internet Abstract   PDF [Full Text]
Ananth Teja, V.Aditya Ramalingeswararao
 
Vol 3, No 12 (2015): December Prevention of Sensitive Information by Enhancing Cloud Access Control Abstract   PDF [FULL TEXT]
Swamy Mandapaka, D Ramesh
 
Vol 2, No 11 (2014): November Privacy and Classification Of Analyzed Data Using EMD Abstract   PDF[FULL TEXT]
T Sravya, G Appa Rao
 
Vol 3, No 12 (2015): December Privacy enhanced and web based service composition Abstract   PDF [FULL TEXT]
Bandaru Swamy Sri, U Vinod Kumar
 
Vol 4, No 9 (2016): September Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media Abstract   PDF [Full Text]
Veeramala Devi, K.Naga B hargavi
 
Vol 3, No 12 (2015): December Privacy Preservation and traceability support using Public Auditing Mechanism Abstract   PDF [FULL TEXT]
Jayanthi Anusha, K Lakshmi Priya
 
Vol 3, No 4 (2015): April Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique Abstract   PDF[FULL TEXT]
himasri p, chandhra sekhar m.v.b
 
Vol 5, No 7 (2017): July Privacy Protection Data and Batch Auditing Through Public Auditing Scheme Abstract   PDF [Full Text]
Amiripalli Naga Vamsi Krishna, P. Bala Krishna Prasad
 
Vol 2, No 10 (2014): October Probity and Speculations Yielding Model For Multi Clouds Abstract   PDF [Full Text]
Gayithri Mantravadi, Pitchiah R
 
Vol 3, No 2 (2015): February Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users Abstract   PDF[FULL TEXT]
Syam Kumar Nallamothu, Amanatulla Mohammad, Sayeed Yasin
 
Vol 3, No 8 (2015): August Proficient Authentication Mechanism for Mobile and Pervasive Computing Abstract   PDF [Full Text]
Kantamraju Anuhya, G Syam Prasad
 
Vol 3, No 11 (2015): November Protected data retrieval System using CP-ABE for decentralized Tolerant Networks (DTNs) where many key authorities manage their attributes separately Abstract   PDF [FULL TEXT]
V Siva mallikarjunarao, K Jhon Paul
 
Vol 4, No 8 (2016): August Protecting (PWS) Structure Ups To Generalize Profiles As Per Client Indicated Protection Requests Abstract   PDF [Full Text]
T.Rama Satya Vani, Satti.Vijaya Krishna Reddy
 
Vol 3, No 9 (2015): September Protection Assessment of Design Classifiers under Assault Abstract   PDF[FULL TEXT]
D Srujan Chandra Reddy, S Ajay kumar
 
Vol 3, No 9 (2015): September Protection Guarded Secrecy Sustain Access Manipulate Procedure Intended for Relational Data Abstract   PDF[FULL TEXT]
D Srujan Chandra Reddy, Y Siva Parvathi
 
Vol 4, No 11 (2016): November Protection of “Fault Tolerant Parallel Filters†by Hamming code with Reversible logic Abstract   PDF [Full Text]
Sabbi Suryakala, M Nagendra Kumar
 
Vol 3, No 10 (2015): October Protection Tolerate Access Manipulate Procedure for Relational Data Abstract   PDF [Full Text]
Kartheek Ravula, Uthpala B
 
Vol 3, No 11 (2015): November Providing Best Quality Of Video Streaming Using AMES Method Abstract   PDF [FULL TEXT]
harikoti raj venkat, Vahiduddin shariff
 
Vol 7, No 7 (2019): July Providing Cloud Data Security By Using Proof of Past Log Abstract   PDF [Full Text]
B. Anila, B.Maha Lakshmi Rao
 
Vol 3, No 7 (2015): July Providing Distinguish Access Levels to Encrypted Cloud Databases Abstract   PDF [Full Text]
Mohammad Juned Ansari, Syed Yasin
 
851 - 875 of 1079 Items << < 30 31 32 33 34 35 36 37 38 39 > >> 


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â