Table of Contents
Articles
| Twitter Spam Detection Using Hybrid Method | PDF [Full Text] |
| Borra Haritha | 137-140 |
| A New Hybrid Method For Credit Card Fraud Detection On Financial Data | PDF [Full Text] |
| Narra Murali Krishna | 141-144 |
| Health Monitoring for Overtime Usage of Social Media | PDF [Full Text] |
| Kunapareddi Lalitha Devi | 145-148 |
| Monitoring User Health Condition on Social Based on their Tweets | PDF [Full Text] |
| K. Jyothirmayi | 149-151 |
| A Novel Access Control Procedure To Maintain Health Records In Cloud | PDF [Full Text] |
| Prabha Sailaja Palagummi | 152-154 |
| Secure Sharing of PHR Data Using Re-Encryption: SESPHR | PDF [Full Text] |
| V K Monika, V Praveen Kumar Bejagam | 155-157 |
| Providing Cloud Data Security By Using Proof of Past Log | PDF [Full Text] |
| B. Anila, B.Maha Lakshmi Rao | 158-161 |
| A novel approach for Secure Key-Deduplication with IBBE | PDF [Full Text] |
| L.Venkata Lakshmi, R. Anusha | 162-165 |
| Finite Element Study of Behavior of Sandwich Beam Under Static And Dynamic Conditions | PDF [Full Text] |
| Nagasuryanarayana P, J Suresh, P.Satish Reddy, N.Guru Murthy | 166-171 |
| Computational Fluid Dynamics Analysis Of Louver Fins With Different Configurations | PDF [Full Text] |
| V Prasanna Kumar, M Babji, P.Satish Reddy, P Bhaskara Rao | 172-177 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


