Issue | Title | |
Vol 5, No 12 (2017): December | A Predictive Control Scheme for Enhancement of Active Power Filter Performance | Abstract PDF [Full Text] |
Kondapalli Paparao, pithani Suresh, Nammi Sagar Teja Yadav | ||
Vol 8, No 12 (2020): December | A Procedure of Collaboration for Data Access To Prevent Unauthorized User Collusion | Abstract PDF [Full Text] |
Sridhar Kavuri | ||
Vol 4, No 1 (2016): January | A productive video sharing and streaming in cloud environment | Abstract PDF [Full Text] |
R. Annapurna, B. NarasimhaRao | ||
Vol 6, No 5 (2018): May | A Progressive Technique for Duplicate Detection Evaluating Multiple Data Using Genetic Algorithm with Real World Objects | Abstract PDF [Full Text] |
K. Sai Mallikarjuna, N N. Sushma | ||
Vol 1, No 5 (2013): October | A Project On Analysis Of Bi-Directional Dc-Dc Converter With Closed Loop Control | Abstract PDF [FULL TEXT] |
I.Mahesh Babu, Firozali Mohammed | ||
Vol 3, No 10 (2015): October | A protection PWS system UPS to sum up profiles as per client security prerequisites | Abstract PDF [Full Text] |
Tadapaneni Sambasivarao, Lukka Srikanth | ||
Vol 2, No 11 (2014): November | A PWM Controlled IGBT based VSCS with a Battery Energy Storage System for an Isolated Wind-Hydro Hybrid System Using Cage Generators | Abstract PDF [Full Text] |
D. Narendra, N.V.A Ravi Kumar | ||
Vol 2, No 11 (2014): November | A Reconfigurable Low Power FPGA Design with Autonomous Power Gating and LEDR Encoding | Abstract PDF[FULL TEXT] |
K Raghuram, Dhana Lakshmi Yarkaredy | ||
Vol 7, No 6 (2019): June | A Reliable Traffic and Energy Aware Routing Protocol for Diverse Wireless Sensor Networks | Abstract PDF [Full Text] |
K. Lakshmi, P. Rama Krishna | ||
Vol 3, No 8 (2015): August | A review of Data Mining Techniques Using in Big Data | Abstract PDF [Full Text] |
Venkata Madhavi . Vinnakota, Chinta.Venkata Murali Krishna | ||
Vol 6, No 2 (2018): February | A Review on Extracting Facets For Queries From Search Results | Abstract PDF [Full Text] |
Kasi Sailaja, V Swamy Naidu, M. Veerabhadra Rao | ||
Vol 5, No 10 (2017): October | A Review On Hadoop: Privacy For A Multi-Skyline Queries With Map Reduce | Abstract PDF [Full Text] |
P. Vidhyavathi | ||
Vol 7, No 6 (2019): June | A Review on Protecting Location Privacy for Task Allocation in Mobile Cloud Computing | Abstract PDF [Full Text] |
P. Susila, D. Shravani | ||
Vol 5, No 10 (2017): October | A Review: Security And Privacy In Healthcare Using Bigdata | Abstract PDF [Full Text] |
K. Sumdeepthi | ||
Vol 2, No 12 (2014): December | A Routing Algorithm To Reduce The Queueing Complexity In Communication Networks | Abstract PDF[FULL TEXT] |
Suresh pydi, A Ramamurthy, K.T.V Subbarao | ||
Vol 5, No 8 (2017): August | A Routing Framework for Video Traffic in Wireless Multihop Network | Abstract PDF [Full Text] |
A.K.G. Dhana Lakshmi, T Sivarama Krishna | ||
Vol 7, No 3 (2019): March | A Scalable Framework To Allow Users For Keyword Search With Access Control Over Encrypted Data | Abstract PDF [Full Text] |
Manikanta Gopasi, Radhika Krupalani | ||
Vol 2, No 12 (2014): December | A Searchbased Multi-Objective Approach To Generate Test Suites For High Branch Coverage | Abstract PDF[FULL TEXT] |
M.N.V Surekha, K.V.T subba rao | ||
Vol 3, No 12 (2015): December | A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based | Abstract PDF [FULL TEXT] |
Meesala Venkata Nooka Raju, K Lakshmi Priya | ||
Vol 8, No 3 (2020): March | A secure cloud storage scheme on fog computing- ð‘‹ð‘œð‘Ÿâˆ’ð¶ð‘œð‘šð‘ð‘–ð‘›ð‘Žð‘¡ð‘–ð‘œð‘›, ðµð‘™ð‘œð‘ð‘˜âˆ’ð‘€ð‘Žð‘›ð‘Žð‘”ð‘’ð‘šð‘’ð‘›ð‘¡ and ð¶ð‘…ð» operation | Abstract PDF [Full Text] |
A.Tejaswi Gurunath, K.V.V.L. Madhuri | ||
Vol 6, No 5 (2018): May | A Secure Data Transmission Using Efficient Aggregate Signature Scheme to Verify Data in Wireless Sensor N/W | Abstract PDF [Full Text] |
Ganti Dinesh Kumar, G K Havilah, M. Veerabhadra Rao | ||
Vol 5, No 7 (2017): July | A Secure Off-Line MICO Payment Approach Using Multiple Physical Unclonable Functions | Abstract PDF [Full Text] |
Mounica Nethala, G.P Madhuri | ||
Vol 4, No 4 (2016): April | A Secure Protocol for M-commerce Secure SMS Mobile Payment | Abstract PDF [Full Text] |
Sai Dharma Reddy Gudimetla, Buddharaju Shanmukh Varma, sai Raghukanth Reddy Gudimetla | ||
Vol 7, No 11 (2019): November | A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud Storage | Abstract PDF [Full Text] |
K Prasanthi, N. Sushma | ||
Vol 2, No 11 (2014): November | A Security Measure That Quantify The Anonymity Of Different Systems | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, Yalla Satyasudheer | ||
176 - 200 of 1079 Items | << < 3 4 5 6 7 8 9 10 11 12 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â