Browse Title Index


 
Issue Title
 
Vol 5, No 3 (2017): March The Competent Service Management and Reliable Trustworthiness in Cloud Environment Abstract   PDF [Full Text]
Kilari Prasanna, Dasari Ravi Kumar
 
Vol 5, No 4 (2017): April The Data Storage and Assured Sharing Methodology among Differing Groups in Cloud Computing Abstract   PDF [Full Text]
Polumahanti Sinddhuri, Ganiya Rajendra Kumar
 
Vol 5, No 12 (2017): December The Decentralized Probabilistic Method for Resource Sharing and Encrypted Data Stored In the Cloud Abstract   PDF[Full Text]
T Tejeswi, N Seetayya
 
Vol 2, No 12 (2014): December The Dynamic Load Balancing Method On Game Theory For Distributed Systems Abstract   PDF[FULL TEXT]
Lakshmi Sowjanya Sivalenka, CH Hemanandh, K.T.V Subbarao
 
Vol 4, No 12 (2016): December The Effect of Aggregate Gradation on Design Mix using Modified Bitumen Abstract   PDF [Full Text]
Akash Kumar Naik, Barsha Baishali Malla
 
Vol 6, No 7 (2018): July The Efficient Adaptive Pre-Encoded Multipliers Based on (NR4SD) Encoding for Digital Signal Processing Applications Abstract   PDF [Full Text]
Guggilla.Satya Sudha, Chintha.Sri Pothu Raju
 
Vol 7, No 8 (2019): August- 2019 The Efficient and probabilistic symmetric searchable encryption scheme in Cloud Abstract   PDF [Full Text]
D. Vijaya Durga, A.P.V.D.L. Kumar
 
Vol 5, No 7 (2017): July The Enriched Object Oriented Software processes for Software Fault Prediction Abstract   PDF [Full Text]
T Ravi Kumar, T Srinivasa Rao
 
Vol 4, No 5 (2016): May The Evolution of Microprocessor Chip: A historic overview of development Abstract   PDF [Full Text]
Waqar Ahmad Jang, Waseem Khan, Sadawat Shah, Aadil Ahmad
 
Vol 4, No 8 (2016): August The Instinctive Outline towards Online Shortest Path Abstract   PDF [Full Text]
T.Chandana Gouri
 
Vol 3, No 10 (2015): October The Methodology To Underrate Routing Incursion In Informatics Networks Abstract   PDF [Full Text]
Gopala Krishna T, Sai M
 
Vol 4, No 12 (2016): December The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage Abstract   PDF [Full Text]
V.R.S.S.D Sireesha, A Vishnupriya
 
Vol 9, No 2 (2021): February The multi storage Protocol with Ranked Multi-Keyword Search in Cloud Abstract   PDF [Full Text]
Jala Prasadarao, M V V B S Kiran
 
Vol 5, No 6 (2017): June The Need Of Financial Statement Analysis In A Firm/An Orgnization Abstract   PDF [Full Text]
G Suneetha
 
Vol 6, No 1 (2018): January The Probabilistic Methodology for Distinguishing Node Failures in Mobile Wireless Networks Abstract   PDF[Full Text]
Ch Sri Krishna Satyanarayana Swamy, K.C. Pradeep
 
Vol 2, No 11 (2014): November The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols Abstract   PDF[FULL TEXT]
N Santoshi Lakshmi, M V.V.S.Narayana Murthy
 
Vol 5, No 8 (2017): August The Protected Optimization Totaling Outsourcing In A Case Study Of Linear Programming Abstract   PDF [Full Text]
M Yuva Surya Rani, G. Krupa Havilah, M. Veerabhadra Rao
 
Vol 3, No 9 (2015): September The Quality Demonstration projected in Cloud supervisions Abstract   PDF[FULL TEXT]
K Sireesha, M Radhika
 
Vol 5, No 7 (2017): July The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA Abstract   PDF [Full Text]
A. Anuradha, B.Sai Chandu
 
Vol 6, No 12 (2018): December The Secured Cloud Storage with Efficient Key Generation in cloud computing Abstract   PDF [Full Text]
K Surya Kranthi, Kakarla Ravi kumar
 
Vol 7, No 8 (2019): August- 2019 The Secured Data Sharing For Multiauthority Access in Cloud Storage Abstract   PDF [Full Text]
R.N.D.S.S. Lakshmi, B.V. Ram Kumar
 
Vol 8, No 7 (2020): July The Secured Financial Transaction Network using User Identity Verification Abstract   PDF [Full Text]
Mallampalli Sneha, P Rama Krishna
 
Vol 7, No 5 (2019): May The Secured Multi-Keyword Ranked Search over Encrypted Data Stored in Cloud Abstract   PDF [Full Text]
Raja Kondi, S. Srinivas
 
Vol 5, No 11 (2017): November The Study Exploration towards Side Friction Influences by traffic performance measures on roads Abstract   PDF [Full Text]
Itrajula Adinarayana, Dr. N.C Anil
 
Vol 8, No 3 (2020): March The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots Abstract   PDF [Full Text]
Juvva Manjari, Nadella Sunil
 
1001 - 1025 of 1075 Items << < 36 37 38 39 40 41 42 43 > >> 


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.