Page Header Logo Page Header

User
Journal Content Search

Browse
  • By Issue
  • By Author
  • By Title
Keywords - acoustic communes, acoustic networks, seismic monitoring, stretch synchronization, underneathwater stretch networks Attribute-Based Access Bidirectional converters, dc–dc converters, zero-current switching (ZCS) converters, PV system Cloud computing, searchable encryption, privacy-preserving, keyword search, ranked search Cloud storage, data sharing, key-aggregate encryption, Public Key Encryption. Cryptography, Key Management, Group Key Agreement, Broadcast Encryption. Data alignment, data annotation, web database, wrapper generation Data alignment, data annotation, web database, wrapper generation. Data deduplication, Confidentiality, Hybrid cloud, Authorized Duplicate check, Authorization. Deduplication, authorized duplicate check, confidentiality, hybrid cloud. Digital signature, digital signature algorithm (DSA), Enhanced Adaptive ACKnowledgment (AACK) (EAACK), Mobile Ad hoc NETwork (MANET). Distributed generation (DG), islanding, load current, seamless transfer, three-phase inverter, unified control, NPC Distributed service integrity attestation, cloud computing, secure distributed data processing. Micro grid, islanded operation Online social networks, information filtering, short text classification, policy-based personalization. Personalized web seek, Privacy saving, personalisation utility, security hazard, client profile Website design, user Steering, web mining, mathematical programming peer-to-peer, store-carry-forward, discover predict-deliver, interaction, recommendation. precision controlled data, secrecy stabilization. — Dynamic voltage restorer (DVR), fuzzy logic controller, voltage-source converter (VSC — Unified Power Quality Conditioner, Three Phase Inverter, Distributed generation (DG), islanding, load current, seamless transfer
Current Issue Atom logo
RSS2 logo
RSS1 logo
  • Home
  • About
  • Log In
  • Register
  • Search
  • Current
  • Archives
  • Announcements
  • EDITORIAL TEAM
  • Author Guidelines
  • Publication Ethics
Home > Archives > Vol 8, No 3 (2020)

Vol 8, No 3 (2020)

March

Table of Contents

Articles

A secure cloud storage scheme on fog computing- ð‘‹ð‘œð‘Ÿâˆ’ð¶ð‘œð‘šð‘ð‘–ð‘›ð‘Žð‘¡ð‘–ð‘œð‘›, ðµð‘™ð‘œð‘ð‘˜âˆ’ð‘€ð‘Žð‘›ð‘Žð‘”ð‘’ð‘šð‘’ð‘›ð‘¡ and ð¶ð‘…ð» operation PDF [Full Text]
A.Tejaswi Gurunath, K.V.V.L. Madhuri 029-032
The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots PDF [Full Text]
Juvva Manjari, Nadella Sunil 033-036
A novel SSGK to protect the communication process and shared data from unauthorized access PDF [Full Text]
B. Venkateswara Rao, P.Radhika Krupalini 037-040


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â