| Issue | Title | |
| Vol 4, No 1 (2016): January | A Novel Approach for Consistent Self Organizing By Using Agile Methods | Abstract PDF [Full Text] |
| G.Lakshmi Mounica, T.Sai Durga | ||
| Vol 4, No 9 (2016): September | A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud | Abstract PDF [Full Text] |
| Shaik Mahammad Irfan, Md. Amanatulla | ||
| Vol 3, No 10 (2015): October | A Novel Approach For Large-Scale D ata Processing Platform On Peer- To- Peer Based Bestpeer++ | Abstract PDF [Full Text] |
| V. Prasanthi, N. Anusha | ||
| Vol 1, No 4 (2013): September | A Novel Approach for O (1) Parallel Sorting Algorithm | Abstract PDF [FULL TEXT] |
| Lamesginew Andargie, Gizachew Melkamu, Dr. Vuda Sreenivasarao | ||
| Vol 5, No 3 (2017): March | A Novel Approach for Processing of Real Time Big Data for Machine Learning By Using Map reduce Paradigm | Abstract PDF [Full Text] |
| Lakshmi Padmaja Paruchuri, B V N Prasad Paruchuri | ||
| Vol 7, No 7 (2019): July | A novel approach for Secure Key-Deduplication with IBBE | Abstract PDF [Full Text] |
| L.Venkata Lakshmi, R. Anusha | ||
| Vol 5, No 9 (2017): September | A Novel Approach For Secure Scheme Of Detecting Data Provenance And Packet Drop Attacks In Sensor Networks | Abstract PDF [Full Text] |
| Syed Gulam Gouse, Dr.R.Kiran Kumar | ||
| Vol 6, No 8 (2018): August | A Novel Approach for Security Provides In Distributed Denial-of-Service (DoS) and Using Path Identifiers | Abstract PDF [Full Text] |
| Chintalapudi Mohan Kumar Yadav, G.Hara Rani | ||
| Vol 7, No 1 (2019): January | A Novel Approach for Serving The Web By Exploiting Email Tunnels In Networks | Abstract PDF [Full Text] |
| Tammineni Anil kumar | ||
| Vol 4, No 9 (2016): September | A Novel Approach For Using Multi-Keyword Ranked Search Scheme Over Encrypted in Secure And Dynamic Cloud Data | Abstract PDF [Full Text] |
| Syed Sadat Ali Alias Abdul Gani, Sayeed Yasin | ||
| Vol 2, No 5 (2014): May | A Novel Approach of FPGA Implementation of Transceiver System | Abstract PDF [FULL TEXT] |
| P.Lokaranjan rao, K.Supreem Babu | ||
| Vol 4, No 8 (2016): August | A Novel Approach Of Privacy Preserving Data With Anonymizing Tree Structure | Abstract PDF [Full Text] |
| E. Lohitha, Khaleelullah . Shaik | ||
| Vol 3, No 9 (2015): September | A Novel Approach to Build Reliable and Efficient Query Services in Cloud with RASP Data Perturbation | Abstract PDF [Full Text] |
| Mohammad Junaid, V. Padmaja | ||
| Vol 8, No 7 (2020): July | A Novel Approach to Deduplication of Cloud Data using Secure Key Hierarchy | Abstract PDF [Full Text] |
| Y.Lokesh Reddy, V.N.S Vijay Kumar | ||
| Vol 3, No 10 (2015): October | A novel approach to naturally mine equivalent elements from relative questions | Abstract PDF [Full Text] |
| Srinu Chinnam, P. Arun Patnaik | ||
| Vol 5, No 5 (2017): May | A Novel Approach To Recognize Malicious Application In Face Book- FRAppE | Abstract PDF [Full Text] |
| Krishnaveni Shanmuga balu, T.Naga Raju | ||
| Vol 2, No 12 (2014): December | A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice | Abstract PDF[FULL TEXT] |
| K Suganya, K.V.T subba rao | ||
| Vol 5, No 5 (2017): May | A Novel Attack Methods For Inferring On Certain Url’s On Twitter | Abstract PDF [Full Text] |
| M.V.D.Siva Chaitanya Kumar, D.Anil Kumar | ||
| Vol 5, No 1 (2017): January | A Novel Auditing Scheme And Efficient Data Repairing Process In Multiple Clouds | Abstract PDF [Full Text] |
| Mohana Krishna K, R Praveen Kumar | ||
| Vol 5, No 4 (2017): April | A Novel Control Scheme for a Stand-Alone Wind Energy Conversion System | Abstract PDF [Full Text] |
| K D V S Mithilesh, K Sri Ram Murthy | ||
| Vol 2, No 9 (2014): September | A Novel Control Strategy of PV Generation System with LPC for Loading Balance of Distribution Feeders | Abstract PDF [Full Text] |
| Bhatraj Anudeep, T Bhargav Ram | ||
| Vol 5, No 6 (2017): June | A Novel Controlled Method Of Transformer Less Cascaded H-Bridge STATCOM | Abstract PDF [Full Text] |
| Jyothirmai Anguluri, K Anil Kumar | ||
| Vol 5, No 1 (2017): January | A Novel DiDrip Protocol with Dissemination-Privilege Pair Authentication | Abstract PDF [Full Text] |
| P.Lakshmi Durga, Y.Yesu Jyothi | ||
| Vol 3, No 10 (2015): October | A novel DNA encryption technique using efficient key generation method for secure data | Abstract PDF [Full Text] |
| Ardhani Siva Sravanthi, S. Sushma | ||
| Vol 6, No 5 (2018): May | A Novel Estimation of Range Queries over Spatial information by Users | Abstract PDF [Full Text] |
| Kalagata Venkataramana, K V V Ramana, M. Veerabhadra Rao | ||
| 126 - 150 of 1125 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


