Vol 3, No 8 (2015)


Table of Contents


Improved Mca Based Dos Attack Detection PDF [Full Text]
Lakshmi Prasanna Kumar Relangi, M Krishna Satya Varma 293-297
Detection of Behavioral Malware in Delay Tolerant Networks PDF [Full Text]
Kolanu Venkata Krishna Sasikanth, K.Satyanarayana Raju 298-302
An Unprecedented Approach of Detecting and Reporting System of Earthquakes Using Tweet Analysis PDF [Full Text]
Hemantha Mareedu, Ella Karunakar 303-306
Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm PDF [Full Text]
KandiKattu Balaji Swamy, K.KISHORE RAJU 307-311
Establishing a Trust-Worthy Social Authentications PDF [Full Text]
Dakupati Omprakash, K Satyanarayana Raju 312-317
Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption PDF [Full Text]
Vundrajavarapu Ajay Kumar, K. Satyanarayana Raju 318-322
Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks PDF [Full Text]
Mugada Sri Lakshmi Vani, B.RajaSrinivasa Reddy 323-327
Results Search from Web Databases using automatic Annotation Wrapper PDF [Full Text]
Anuradha .Podile, Chinta.Venkata Murali Krishna 328-330
A review of Data Mining Techniques Using in Big Data PDF [Full Text]
Venkata Madhavi . Vinnakota, Chinta.Venkata Murali Krishna 331-336
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks PDF [Full Text]
N. Vijaya Bharatha Lakshmi, K.V.S.S. Rama Krishna 337-341
Proficient Authentication Mechanism for Mobile and Pervasive Computing PDF [Full Text]
Kantamraju Anuhya, G Syam Prasad 342-345
A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy PDF [Full Text]
Sai Sirisha Chittineni, Bandarupalli Mouleswara Rao 346-350
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism PDF [Full Text]
Chaparala Pushya, G Syam Prasad 351-355
Message Endorsement and Informant Confidentiality In Wireless Set of Connections PDF[FULL TEXT]
Kanakmedala krishna priya, sk mubeena sultana 356-361
Scattered Security System for Mobile Networks through Assorted Contraption PDF[FULL TEXT]
subhashini putla, hanumant prasad a 362-368
Simulation and Application of Maximum Power Tracking Scheme in a Novel Excitation Synchronous Wind Power Generator (ESWPG) by using Fuzzy Logic Controller PDF [Full Text]
Sivaramu G, Nagabhushana E 369-377
Pesticide Toxicity Classification using Data Mining Techniques PDF [Full Text]
Issac Syam Sundar Palli, Sandeep Yelisetti 378-385
She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications PDF [Full Text]
Rani Hepsiba, P. V. Prasuna 386-392
Electronic Circuits Diagnosis Using Artificial Neural Networks PDF [Full Text]
Yogesh Kumar 393-402

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.