Issue | Title | |
Vol 2, No 4 (2014): April | Token Based Fair Queuing Algorithms for Wireless Networks | Abstract PDF [FULL TEXT] |
Ravindrax Ravindra R Patil | ||
Vol 5, No 1 (2017): January | Transformer less Series Active Filter for Power Quality Improvement | Abstract PDF [Full Text] |
K Srinivasu, K N S K Santhosh | ||
Vol 2, No 12 (2014): December | Transmission Mechanism To Effectively Increase The Social Tv Viewing Experience By Cloud | Abstract PDF[FULL TEXT] |
Penta Mukhesh, A Ramamurthy, K.T.V Subbarao | ||
Vol 3, No 8 (2015): August | Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks | Abstract PDF [Full Text] |
Mugada Sri Lakshmi Vani, B.RajaSrinivasa Reddy | ||
Vol 4, No 9 (2016): September | Transparent User Authentication Using Biometric Traits for Secure Internet Services | Abstract PDF [Full Text] |
Keerthi Kaja, M.Chandra Sekhar | ||
Vol 4, No 9 (2016): September | Tweet Mining from General Elections of a Country | Abstract PDF [Full Text] |
Muhammad Noman Hayat, Nigar Fida, Haroon Khan, Mohammad Sohail | ||
Vol 2, No 10 (2014): October | Tweet Scrutiny For Fast Communication Reporting | Abstract PDF[FULL TEXT] |
K V Subbaiah, K BalaManikanta | ||
Vol 7, No 7 (2019): July | Twitter Spam Detection Using Hybrid Method | Abstract PDF [Full Text] |
Borra Haritha | ||
Vol 5, No 6 (2017): June | Two Dimensional Data Structure to Record Data Property Information For Dynamic Auditing | Abstract PDF [Full Text] |
Tullimilli Siva Parvathi, Y. Ashok | ||
Vol 3, No 11 (2015): November | Two Efficient outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient outsourced Verifying Protocol | Abstract PDF [FULL TEXT] |
M vamsi Krishna, S Madhuri, Y Praveen Kumar | ||
Vol 2, No 10 (2014): October | Under water Image preprocessing by Average filter and a comparison study | Abstract PDF [FULL TEXT] |
Satish Racharla, V Ramu | ||
Vol 2, No 11 (2014): November | Unique value disintegration for probing results using clustering algorithm | Abstract PDF[FULL TEXT] |
Sushuma Narkedamilli, B S N Murthy | ||
Vol 3, No 5 (2015): May | UPQC Implements The 3-Phase Shunt And Series Active Power Filter To Compensate Current And Voltage Harmonics | Abstract PDF [Full Text] |
J. Sunitha, M. Ramesh | ||
Vol 5, No 1 (2017): January | Urdhva Tiryagbhyam Sutra Multiplier Based 32-Bit MAC Design | Abstract PDF [Full Text] |
Bandaru. Divakar, T. Srinivas | ||
Vol 4, No 10 (2016): October | Using Adaptive Privacy Policy Prediction (A3P) for improved Privacy of User Data and Images on Content Sharing | Abstract PDF [Full Text] |
P. Harika, Addanki Kavitha | ||
Vol 4, No 8 (2016): August | Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data | Abstract PDF [Full Text] |
G.Mohan Phanindra Reddy, K.C. Pradeep | ||
Vol 3, No 11 (2015): November | Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks | Abstract PDF [FULL TEXT] |
Pavani Potnuri, Bharath Kumar Gowru, Venkateswara Rao Nadakuditi | ||
Vol 1, No 3 (2013): August | Various Power Dissipation Mechanisms and Leakage Current Reduction Techniques in Deep-Submicron Technology | Abstract PDF [FULL TEXT] |
D. Sudhakar, R. Durga Bhavani | ||
Vol 3, No 7 (2015): July | Verification Of Scalable Distributed Service Integrity For Software-As-A-Service Clouds | Abstract PDF [Full Text] |
M. Nagalakshmi, Syed Sadat Ali | ||
Vol 2, No 10 (2014): October | Vigorous Component Built Data Controlling System | Abstract PDF [Full Text] |
Raghavendra Chunduri, Ayyappa Chakravarthi M | ||
Vol 4, No 1 (2016): January | Virus Attack Identification And Representation In Sensor Network | Abstract PDF [FULL TEXT] |
Chintha Venkata Ramana, B.P.N Madhu Kumar | ||
Vol 3, No 9 (2015): September | Water Pumping Arrangement for Solar PV ImpartialUtilizing PMSM Drive | Abstract PDF[FULL TEXT] |
V.S Lovaraju, S Venkatesh, B Jagannadha Rao | ||
Vol 3, No 4 (2015): April | Web Based Fault Detection System | Abstract PDF [Full Text] |
K Harshini, Arvind Vishnubatla | ||
Vol 5, No 1 (2017): January | Web based online Home Automation and security system based on wireless Video Streaming using Internet of Things | Abstract PDF [Full Text] |
Palla Suneetha, Kiran. Venneti | ||
Vol 5, No 3 (2017): March | WEB TESTING: For the Expressive of Ability and Imminent Tendencies | Abstract PDF [Full Text] |
Modalavalasa Sateesh, S Vishnumurthy | ||
1051 - 1075 of 1079 Items | << < 38 39 40 41 42 43 44 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.