Issue | Title | |
Vol 4, No 9 (2016): September | Transparent User Authentication Using Biometric Traits for Secure Internet Services | Abstract PDF [Full Text] |
Keerthi Kaja, M.Chandra Sekhar | ||
Vol 4, No 9 (2016): September | Tweet Mining from General Elections of a Country | Abstract PDF [Full Text] |
Muhammad Noman Hayat, Nigar Fida, Haroon Khan, Mohammad Sohail | ||
Vol 2, No 10 (2014): October | Tweet Scrutiny For Fast Communication Reporting | Abstract PDF[FULL TEXT] |
K V Subbaiah, K BalaManikanta | ||
Vol 7, No 7 (2019): July | Twitter Spam Detection Using Hybrid Method | Abstract PDF [Full Text] |
Borra Haritha | ||
Vol 5, No 6 (2017): June | Two Dimensional Data Structure to Record Data Property Information For Dynamic Auditing | Abstract PDF [Full Text] |
Tullimilli Siva Parvathi, Y. Ashok | ||
Vol 3, No 11 (2015): November | Two Efficient outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient outsourced Verifying Protocol | Abstract PDF [FULL TEXT] |
M vamsi Krishna, S Madhuri, Y Praveen Kumar | ||
Vol 2, No 10 (2014): October | Under water Image preprocessing by Average filter and a comparison study | Abstract PDF [FULL TEXT] |
Satish Racharla, V Ramu | ||
Vol 2, No 11 (2014): November | Unique value disintegration for probing results using clustering algorithm | Abstract PDF[FULL TEXT] |
Sushuma Narkedamilli, B S N Murthy | ||
Vol 3, No 5 (2015): May | UPQC Implements The 3-Phase Shunt And Series Active Power Filter To Compensate Current And Voltage Harmonics | Abstract PDF [Full Text] |
J. Sunitha, M. Ramesh | ||
Vol 5, No 1 (2017): January | Urdhva Tiryagbhyam Sutra Multiplier Based 32-Bit MAC Design | Abstract PDF [Full Text] |
Bandaru. Divakar, T. Srinivas | ||
Vol 4, No 10 (2016): October | Using Adaptive Privacy Policy Prediction (A3P) for improved Privacy of User Data and Images on Content Sharing | Abstract PDF [Full Text] |
P. Harika, Addanki Kavitha | ||
Vol 4, No 8 (2016): August | Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data | Abstract PDF [Full Text] |
G.Mohan Phanindra Reddy, K.C. Pradeep | ||
Vol 3, No 11 (2015): November | Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks | Abstract PDF [FULL TEXT] |
Pavani Potnuri, Bharath Kumar Gowru, Venkateswara Rao Nadakuditi | ||
Vol 1, No 3 (2013): August | Various Power Dissipation Mechanisms and Leakage Current Reduction Techniques in Deep-Submicron Technology | Abstract PDF [FULL TEXT] |
D. Sudhakar, R. Durga Bhavani | ||
Vol 3, No 7 (2015): July | Verification Of Scalable Distributed Service Integrity For Software-As-A-Service Clouds | Abstract PDF [Full Text] |
M. Nagalakshmi, Syed Sadat Ali | ||
Vol 2, No 10 (2014): October | Vigorous Component Built Data Controlling System | Abstract PDF [Full Text] |
Raghavendra Chunduri, Ayyappa Chakravarthi M | ||
Vol 4, No 1 (2016): January | Virus Attack Identification And Representation In Sensor Network | Abstract PDF [FULL TEXT] |
Chintha Venkata Ramana, B.P.N Madhu Kumar | ||
Vol 3, No 9 (2015): September | Water Pumping Arrangement for Solar PV ImpartialUtilizing PMSM Drive | Abstract PDF[FULL TEXT] |
V.S Lovaraju, S Venkatesh, B Jagannadha Rao | ||
Vol 3, No 4 (2015): April | Web Based Fault Detection System | Abstract PDF [Full Text] |
K Harshini, Arvind Vishnubatla | ||
Vol 5, No 1 (2017): January | Web based online Home Automation and security system based on wireless Video Streaming using Internet of Things | Abstract PDF [Full Text] |
Palla Suneetha, Kiran. Venneti | ||
Vol 5, No 3 (2017): March | WEB TESTING: For the Expressive of Ability and Imminent Tendencies | Abstract PDF [Full Text] |
Modalavalasa Sateesh, S Vishnumurthy | ||
Vol 2, No 2 (2014): February | Weighted contrast enhancement based enhancement for remote sensing images | Abstract PDF [FULL TEXT] |
Ashok Kumar Dakarapu, V. Anuragh, G Sravan Kumar, N.S.Murthy Sarma | ||
Vol 4, No 11 (2016): November | Wind Energy Conversion Systems using DFIG with Integrated Active Filter Capabilities | Abstract PDF [Full Text] |
B V D N Pourna Ganga Tejaswi, G T P Naidu | ||
Vol 1, No 5 (2013): October | Wireless Protocols for Anti Cloning and Security | Abstract PDF [FULL TEXT] |
Saurabh Gupta, R. K. Singh, K. B. Singh | ||
Vol 2, No 8 (2014): August | Wireless sensor networks for civil structure health monitoring using GPS and GSM module | Abstract PDF [Full Text] |
B.S Sai Sridhar, Md. Javeed Mehdi | ||
1051 - 1075 of 1075 Items | << < 38 39 40 41 42 43 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.