Issue | Title | |
Vol 2, No 10 (2014): October | Review on Data Hiding Schemes into Multimedia Data | Abstract PDF [Full Text] |
Ashwini Gorakh Kamble, Nikita J. Kulkarni | ||
Vol 2, No 10 (2014): October | Role of Cloud Computing in Health Monitoring System | Abstract PDF[FULL TEXT] |
Sunkara Vaishnavi, Akula Suneetha | ||
Vol 7, No 4 (2019): April | Role Of Social Media As Time Variant In Health Monitoring System | Abstract PDF [Full Text] |
Laxmi Durga Pasupuleti, Aditya Ramalingeswarao V | ||
Vol 3, No 4 (2015): April | RSVP- A Fault Tolerant Mechanism in MPLS Networks | Abstract PDF[FULL TEXT] |
Ch Suman Chakravarthy, Y Laxmana Rao, Chokkapu Narayanarao | ||
Vol 2, No 11 (2014): November | Rtl Desing And Vlsi Implementation Of An Efficient Convolution Encoder And Adaptive Viterbi Decoder | Abstract PDF[FULL TEXT] |
Eleesha THALAKAYALA, V.G Pavan Kumar | ||
Vol 4, No 12 (2016): December | Safety prerequisite for coal mine using Wireless Sensor Technique and Artificial Intelligence Technology | Abstract PDF [Full Text] |
Amar Nath Singh, Bikash Narayan Naik | ||
Vol 1, No 5 (2013): October | Scalable Coding of PRNG Encrypted Images | Abstract PDF [FULL TEXT] |
Y. Sridhar, Bighneswar Panda | ||
Vol 3, No 12 (2015): December | Scalable Data Sharing In Cloud using Public Key Cryptosystem | Abstract PDF [FULL TEXT] |
Madeti Mohana Krishna Kumar, S Madhri | ||
Vol 3, No 8 (2015): August | Scattered Security System for Mobile Networks through Assorted Contraption | Abstract PDF[FULL TEXT] |
subhashini putla, hanumant prasad a | ||
Vol 3, No 10 (2015): October | Scattered simultaneous and autonomous access to scrambled cloud databases | Abstract PDF[FULL TEXT] |
B Mahalakshmi Rao, K Ravi Kumar | ||
Vol 3, No 9 (2015): September | Scheduling Cached-Content in Wireless Networks With Elastic and Inelastic Traffic | Abstract PDF [Full Text] |
Syed Ajmal Pasha C, Sayeed Yasin | ||
Vol 5, No 4 (2017): April | Scheduling Job Queue On Hadoop | Abstract PDF [Full Text] |
Durga Achuta Toram, B.P.N.Madhu Kumar | ||
Vol 2, No 9 (2014): September | Scrounger Outbreaks Strenuous Life From Wireless Adhoc Sensor Networks | Abstract PDF [Full Text] |
Teki Rakesh, Potti Kusuma Tejaswini | ||
Vol 2, No 10 (2014): October | Scuttling Web Opportunities By Application Cramming | Abstract PDF [Full Text] |
Vijaya Sree Dhulipalla, Hanumat Prasad Alahari | ||
Vol 2, No 8 (2014): August | Secrecy Stabilizing for Cloud Storage With Assessing Of Third Party | Abstract PDF [ Full Text] |
K Venkata Ramana, Murram Sree Harsha | ||
Vol 3, No 7 (2015): July | Secrecy Sustain Broadcast Assessment for Collective Information in Cloud Computing | Abstract PDF [Full Text] |
V Ujjwala, J Haribabu, R lakshmi Tulasi | ||
Vol 2, No 11 (2014): November | Seculation Routing With Fortification Wireless Networks | Abstract PDF[FULL TEXT] |
Tikka Pallam Raju, B S N Murthy | ||
Vol 3, No 8 (2015): August | Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Abstract PDF [Full Text] |
Vundrajavarapu Ajay Kumar, K. Satyanarayana Raju | ||
Vol 5, No 5 (2017): May | Secure Cloud Email System On Privacy Protocol And Identity-Based Encryption | Abstract PDF [Full Text] |
O. Parvathi, J.Bala Ambedkar | ||
Vol 7, No 10 (2019): October | Secure data group sharing with attribute and time based encrypted data access over cloud | Abstract PDF [Full Text] |
Badaballa Rama Lakshmi, Perabathula Chitti Talli | ||
Vol 5, No 6 (2017): June | Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data | Abstract PDF [Full Text] |
Katta Uma Devi, D.Sasi Rekha | ||
Vol 3, No 10 (2015): October | Secure Deduplication Technique for Privilege Data Access Using Hybrid Cloud | Abstract PDF[FULL TEXT] |
Priyanka Vajja, Gopala Krishna J S V | ||
Vol 10, No 3 (2022): June | Secure File Allocation in Cloud Storage Using Audit Services and Deduplication | Abstract PDF [Full Text] |
Burlu Revathi, N.P. Patnayak.M | ||
Vol 7, No 3 (2019): March | Secure File Sharing With Access Grants In Cloud | Abstract PDF [Full Text] |
Shanmukh Durga Prasad, K.V.V.L Madhuri | ||
Vol 2, No 11 (2014): November | Secure Gratified Allocation with Uncontrived System in Adhoc Networks | Abstract PDF[FULL TEXT] |
Sudhakar CH, Varada Rajkumar K | ||
901 - 925 of 1079 Items | << < 32 33 34 35 36 37 38 39 40 41 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â