Issue | Title | |
Vol 2, No 12 (2014): December | A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours | Abstract PDF[FULL TEXT] |
P Ramojeerao, G Raju, K.T.V Subbarao | ||
Vol 5, No 5 (2017): May | A Double-Quality-Guaranteed (DQG) Renting Scheme For Service Providers | Abstract PDF [Full Text] |
Pathi V Venkata Sivannarayana, B Srinivas | ||
Vol 5, No 5 (2017): May | A Fast Bootstrapping Algorithm To Recreate The Initial Set Of Paths | Abstract PDF [Full Text] |
K.Ramya Sai Sowjanya, Ch. Subhash | ||
Vol 3, No 11 (2015): November | A Fault Localization Algorithm To Isolate Faulty Devices and Rules | Abstract PDF [Full Text] |
M vamsi Krishna, R Sowndarya | ||
Vol 2, No 9 (2014): September | A FLC Based DVR by Employing Z-Source Inverter For Voltage Sag/Swell Reduction | Abstract PDF [Full Text] |
K. Surender | ||
Vol 3, No 10 (2015): October | A Framework For Protecting The Privacy In Web Search | Abstract PDF[FULL TEXT] |
A.V.S Laxman Kumar, K.C Sreedhar | ||
Vol 3, No 9 (2015): September | A Graph theory algorithmic approach to data clustering and its Application | Abstract PDF [Full Text] |
K. Venkatasubramanian, S.K. Srivatsa, C. Parthasarathy | ||
Vol 1, No 5 (2013): October | A Grid Connected Wind Energy System’s Power Quality Improvement By Using D-Statcom | Abstract PDF [FULL TEXT] |
M.Somi Reddy, V.Srinivasa Rao | ||
Vol 3, No 11 (2015): November | A Grid Level High Power Back To Back System Using Modular Multilevel Cascade Converter Without Dc Link Capacitor | Abstract PDF [FULL TEXT] |
Nikhilesh Reddy, Y.Raja Babu | ||
Vol 5, No 9 (2017): September | A Hierarchical Multi User Data Share Environment To Protect Data Privacy And Defend Unauthorized Access | Abstract PDF [Full Text] |
Chekuri Avinash, V Swamy Naidu, M. Veerabhadra Rao | ||
Vol 1, No 5 (2013): October | A High Speed 16*16 Multiplier Based On Urdhva Tiryakbhyam Sutra | Abstract PDF [FULL TEXT] |
D.V. Satish, B Ratna Raju | ||
Vol 2, No 11 (2014): November | A High speed Vedic Multiplier using Different Compressors | Abstract PDF[FULL TEXT] |
Devi Sasikala D, Nagaraju NV | ||
Vol 3, No 5 (2015): May | A high step up Application of Stand-Alone Photovoltaic and Battery Power Systems | Abstract PDF[FULL TEXT] |
L S N Sairam, Ch Vinod Kumar | ||
Vol 3, No 12 (2015): December | A High Step Up Converter With A Voltage Multiplier Module For A Pv System | Abstract PDF [FULL TEXT] |
Suman Lakshmi Phani Madduri, Y.Raja Babu | ||
Vol 3, No 1 (2015): January | A high Step-up DC-DC Converter employs Cascading Cockcroft-Walton Voltage Multiplier by omitting Step-up Transformer | Abstract PDF[FULL TEXT] |
A Subrahmanyam, A Tejasri | ||
Vol 6, No 3 (2018): March | A Hybrid Multilevel Inverter DSTATCOM Topology to Compensate Reactive Power for Nonlinear Loads | Abstract PDF [Full Text] |
Duggirala Ajay Kumar, M Ramesh | ||
Vol 8, No 11 (2020): November | A Hybrid Penetrating System Framework for the Prediction of Heart Disease Using Machine Learning | Abstract PDF [Full Text] |
Majji Raghurama Krishna, Murali Krishna Vasantha | ||
Vol 7, No 6 (2019): June | A LDSS-CP-ABE Algorithm to Migrate Major Computation Overhead from Mobile Devices on to Proxy Server | Abstract PDF [Full Text] |
G. Satya Teja, D. Shravani | ||
Vol 5, No 7 (2017): July | A Matrix Framework Factorization on a Sentiment Based Rating Prediction Method tackles Cyber bullying Detection | Abstract PDF [Full Text] |
Shiny Prathyusha Kambham, G.P Madhuri | ||
Vol 4, No 11 (2016): November | A Method Based On a Monolingual Word Alignment Model | Abstract PDF [Full Text] |
K. B M Pavan Kumar, V. Chandra Sekhara Rao | ||
Vol 2, No 12 (2014): December | A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users | Abstract PDF[FULL TEXT] |
R Suganya, K.V.T Subbarao | ||
Vol 5, No 6 (2017): June | A Modified Gradient Boosting Trees Methods To Transform Social Networking Features Into Embeddings | Abstract PDF [Full Text] |
Srinivas Devana, K. Tirumala Reddy | ||
Vol 5, No 7 (2017): July | A Multi User Data Share For Data Privacy and Defend Un-authorized Access | Abstract PDF [Full Text] |
Konakalla Vishnu Priyanka, Vakkalagadda Rajesh Babu | ||
Vol 8, No 5 (2020): May | A Multi-Authority Cipher Text Attribute-Based Encryption (CP-ABE) for G2C | Abstract PDF [Full Text] |
Ch. Ramya, K.V.V.L. Madhuri | ||
Vol 6, No 5 (2018): May | A Multi-Level access control scheme towards software as a service in cloud computing | Abstract PDF [Full Text] |
M Suneetha, G Vijaya Kumari | ||
26 - 50 of 1079 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.