Table of Contents
Articles
Gender and Name Classification Based on Texture, Local Binary Pattern and Probabilistic Neural Network | PDF [Full Text] |
Alla Mahesh, M.Raja Babu | 876-879 |
The Dynamic Load Balancing Method On Game Theory For Distributed Systems | PDF[FULL TEXT] |
Lakshmi Sowjanya Sivalenka, CH Hemanandh, K.T.V Subbarao | 880-883 |
Analyzation Of The Scalability Problems Of Distributed Presence Server Architectures | PDF[FULL TEXT] |
R Sangeetha, M.M Balakrishna, K.T.V Subbarao | 884-887 |
A Clustering-Based Shifting Technique To Align Data Units In Web Data Bases | PDF[FULL TEXT] |
lalitha kumari kolli, K.V.T subba rao | 888-891 |
A Routing Algorithm To Reduce The Queueing Complexity In Communication Networks | PDF[FULL TEXT] |
Suresh pydi, A Ramamurthy, K.T.V Subbarao | 892-895 |
A Classification Mechanism To Avoid Useless Data From Osn Walls | PDF[FULL TEXT] |
S koteswara rao Yarlagadda, CH Hemanand, K.T.V Subbarao | 896-900 |
Analysis of Sandwich Beam | PDF [Full Text] |
M Siva Prasad, P Satish Reddy, Matta Manoj, N.Guru Murthy | 901-908 |
A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users | PDF[FULL TEXT] |
R Suganya, K.V.T Subbarao | 909-912 |
To Provide An Innovative Policy Anomaly Management Framework For Firewalls | PDF[FULL TEXT] |
Subha Sree Mallela, M M Bala Krishna, K.T.V Subbarao | 913-916 |
Resonant Current Control Of Three Phase Grid Connected Photovoltaic Inverters | PDF [Full Text] |
V. Pranay Kumar, M.M. Irfan | 917-924 |
Optimal Object Placement Policies To Minimize The Network-Wide Content Provisioning Cost | PDF[FULL TEXT] |
Ravikala Raveendra, G Raju, K.T.V Subbarao | 925-929 |
Switching Activity Reduction Technique In Soc Testing | PDF [Full Text] |
P. Sai Kumar, N S Govind | 930-935 |
Enhancement of Power Quality by Using Shunt Hybrid Power Filter With TCR | PDF [Full Text] |
D. Srikanth, V. Sreepriya | 936-943 |
An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks | PDF[FULL TEXT] |
S Rajeswari, A Ramamurthy, K.T.V Subbarao | 944-947 |
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice | PDF[FULL TEXT] |
K Suganya, K.V.T subba rao | 948-952 |
An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network | PDF[FULL TEXT] |
Morampudi Satya Harish, A Ramamurthy, K.T.V Subbarao | 953-955 |
To Improve Content Based Face Retrieval By Creating Semantic Code Words | PDF[FULL TEXT] |
Melam Srikanth, A Ramamurthy, K.T.V Subbarao | 956-959 |
To Achieve An Optimal Tradeoff Between P2p Overlay Maintenance And Video Sharing Efficiency In Osn’s | PDF[FULL TEXT] |
D Bhanuprakash, A Ramamurthy, K.T.V Subbarao | 960-963 |
A Searchbased Multi-Objective Approach To Generate Test Suites For High Branch Coverage | PDF[FULL TEXT] |
M.N.V Surekha, K.V.T subba rao | 964-967 |
Performance Analysis Of IPMSM Drive Using Fuzzy Logic Controller Based Loss Minimization Algorithm (LMA) | PDF [Full Text] |
P. Sandeep, G. Venkata Sagar, Subbirami Reddy | 968-976 |
Evaluate The Quality Of Marked Decrypted Image Quantitatively To Encrypted Images Using Rdh | PDF[FULL TEXT] |
N Bhaskar, VijayKumar Janga | 977-980 |
Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage | PDF[FULL TEXT] |
M Mounika, Farhana Begum | 981-984 |
An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers | PDF[FULL TEXT] |
Ch Rajeshwari, S Suresh | 985-988 |
A Study To Support First-N Queries And Incremental Updates To Answer Multi Keyword Queries | PDF[FULL TEXT] |
Ala Rajitha, Fasi Ahmed Parvez | 989-991 |
A Complete System To Securely Outsource Log Records To A Cloud Provider | PDF[FULL TEXT] |
kodari Shravan Kumar, Vishnuprasad Goranthala | 992-995 |
Boost Interleaved Converter Integrated Voltage Multiplier Module for Renewable Energy System | PDF[FULL TEXT] |
E Sandhya Rani, CH Vinod Kumar, Y Srinivas Rao | 996-1005 |
A texture feature extraction of crop field images using GLCM approach | PDF [Full Text] |
Sushila Shidnal | 1006-1011 |
Contact Stress Analysis of Helical Gear by Using AGMA and ANSYS | PDF [Full Text] |
S.Sai Anusha, P.Satish Reddy, P. Bhaskar, M Manoj | 1012-1016 |
Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud | PDF[FULL TEXT] |
Penta Mukhesh, A Ramamurthy, K.T.V Subbarao | 1017-1020 |
A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours | PDF[FULL TEXT] |
P Ramojeerao, G Raju, K.T.V Subbarao | 1021-1024 |
Maintain Data Integrity And Protection Of Private Label Information In Social Network Data | PDF[FULL TEXT] |
Mallam Ujwala, P Ravi | 1025-1027 |
A Novel Method for Providing Discrete Filtering and Blacklisting Options for OSN Users | PDF [Full Text] |
gadde sai sudha, K. Priyanka | 1028-1032 |
Character segmentation from multi-oriented video words using Discrete Wavelet Transform and K-Means Clustering | PDF [Full Text] |
B.Jagadeesh babu, D Kishore | 1033-1039 |
A Study on Process Parameters in Milling of Al-MMC | PDF [Full Text] |
B.Swapna Priya, P.Satish Reddy, P. Bhaskar, M Manoj | 1040-1043 |
Pitch Control of DFIG Wind Turbine Based on Fuzzy Logic Controller | PDF [Full Text] |
T.Anil Kumar, Ch.V.V. Mangalakshmi | 1044-1048 |
Simulation of VSC Based HVDC Transmission System under Fault Conditions | PDF[FULL TEXT] |
K Sivanagamani, P Bhaskar Reddy | 1049-1055 |
Dairy Automation Using Controlled Area Network Protocol | PDF [Full Text] |
B.Praveen Kumar, S. Rajagopal | 1056-1060 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.