Issue | Title | |
Vol 3, No 5 (2015): May | Enhance the data alignment results using multiple annotators | Abstract PDF[FULL TEXT] |
B Prasad | ||
Vol 6, No 3 (2018): March | Enhanced aggregate signature scheme for secure data verification in wireless sensor network | Abstract PDF [Full Text] |
Rentala Mounika, Nadella Sunil | ||
Vol 6, No 5 (2018): May | Enhanced Arbitrary Topology for Efficient Encryption Using Short Cipher texts | Abstract PDF [Full Text] |
Bora Narsunaidu, Dr. Rjendra Kumar Ganiya | ||
Vol 3, No 11 (2015): November | Enhanced Authorized Deduplication check and providing data confidentiality in Twin cloud | Abstract PDF [FULL TEXT] |
M Vamsi Krishna, G Rajasekhar, K Satyanarayana | ||
Vol 4, No 10 (2016): October | Enhanced Document Search and Sharing Tool in Organized P2p Frameworks | Abstract PDF [Full Text] |
Mohammad Aslamsultana, SSSN Usha Devi N | ||
Vol 7, No 4 (2019): April | Enhanced method to detect spammers in social network | Abstract PDF [Full Text] |
Rajesh Manem, Radhika Krupalini P | ||
Vol 6, No 1 (2018): January | Enhanced Novel Technique for Mobile Cloud To Support Confidentiality and Security | Abstract PDF[Full Text] |
R. Leela, T. Kishore | ||
Vol 5, No 5 (2017): May | Enhanced Overlay routing With Efficient Key Distribution in Network | Abstract PDF [Full Text] |
Subhash Chintalapudi, Kanchapu. Satya Pavani | ||
Vol 5, No 4 (2017): April | Enhanced Path Reconstruction with Security in WSN | Abstract PDF [Full Text] |
R.V.V.Gani Lakshmi, S N Ali Ansari | ||
Vol 3, No 11 (2015): November | Enhanced performance of micro grid in islanded mode with multi level inverter | Abstract PDF [FULL TEXT] |
Yatam Venkata Siva, S Rajshekar | ||
Vol 1, No 4 (2013): September | Enhanced Protection for Multi-axle Vehicles | Abstract PDF [FULL TEXT] |
P. Revathi, S. Shanmugapriyan | ||
Vol 2, No 11 (2014): November | Enhanced Protocol for data exchange through Natural Wireless Ad Hoc Networks | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, R.Satya Ravindra Babu | ||
Vol 5, No 6 (2017): June | Enhanced Rank-Estimated Searching for Dimensional Reliance Based on Nearest Neighbor Search | Abstract PDF [Full Text] |
Silla Srinivasrao, K Sameer | ||
Vol 4, No 10 (2016): October | Enhanced Reroute Integrity Checking Algorithm For Data Transmission In WSN | Abstract PDF [Full Text] |
M. Sunitha, G. Rajasekhar, M.Vamsi Krishna | ||
Vol 6, No 12 (2018): December | Enhanced Secure Dissemination with DIP and Data Discovery protocol in Wireless Sensor Networks | Abstract PDF [Full Text] |
B. Manikumar, Kesavarao Seerapu | ||
Vol 2, No 10 (2014): October | Enhancement of Micro Grid Power Quality with cascaded Voltage-Current control | Abstract PDF[FULL TEXT] |
B Gayathri, M Nagarjuna | ||
Vol 2, No 12 (2014): December | Enhancement of Power Quality by Using Shunt Hybrid Power Filter With TCR | Abstract PDF [Full Text] |
D. Srikanth, V. Sreepriya | ||
Vol 3, No 10 (2015): October | Enhancing inquiry responsive time to discover spatial items with keywords | Abstract PDF [Full Text] |
P. Manikanta, J. Rajanikanth | ||
Vol 3, No 11 (2015): November | Enhancing Performance of Data Access by using Cooperative Caching in Disruption Tolerant Networks | Abstract PDF [FULL TEXT] |
Shaik Khadar Basha, Mr.P.V.N.N Durga Prasad | ||
Vol 2, No 10 (2014): October | Enlightening Website Structure for Enabling Client Steering Effectually | Abstract PDF [Full Text] |
Nagakarhik D, Kusuma Tejaswini Potti | ||
Vol 4, No 7 (2016): July | Ensuring Semantic Security in Keyword Search using Searchable Public-Key Ciphertexts with Hidden Structures | Abstract PDF [Full Text] |
P Gnana Iswarya, P Sunitha | ||
Vol 5, No 5 (2017): May | Ensuring The Integrity And Non-Transferability Of The STP Proofs | Abstract PDF [Full Text] |
P.S.M. Sampath, T.Rajendra Prasad | ||
Vol 2, No 7 (2014): July | Ergonomic Evaluation of Workstations in an IT Industry | Abstract PDF [Full Text] |
Mahantesh Malayya Math | ||
Vol 5, No 3 (2017): March | ESAD: An Efficient Secure Authorized Data Deduplication On Hybrid Cloud Storage Architecture | Abstract PDF [Full Text] |
Kooragayala Sukeerthi, V.Anantha Lakshmi | ||
Vol 3, No 8 (2015): August | Establishing a Trust-Worthy Social Authentications | Abstract PDF [Full Text] |
Dakupati Omprakash, K Satyanarayana Raju | ||
576 - 600 of 1075 Items | << < 19 20 21 22 23 24 25 26 27 28 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.