Page Header Logo Page Header

User
Journal Content Search

Browse
  • By Issue
  • By Author
  • By Title
Keywords :Cloud Computing, Access Control , Security Encryption, Encryption Techniques. Attribute-Based Access Bidirectional converters, dc–dc converters, zero-current switching (ZCS) converters, PV system Bidirectional inverter, capacitance estimation, dc distribution system, dc-bus voltage control, grid connection, rectification Cloud computing, searchable encryption, privacy-preserving, keyword search, ranked search Cloud storage, data sharing, key-aggregate encryption, Public Key Encryption. Cryptography, Key Management, Group Key Agreement, Broadcast Encryption. Data alignment, data annotation, web database, wrapper generation Data alignment, data annotation, web database, wrapper generation. Data deduplication, Confidentiality, Hybrid cloud, Authorized Duplicate check, Authorization. Deduplication, authorized duplicate check, confidentiality, hybrid cloud. Digital signature, digital signature algorithm (DSA), Enhanced Adaptive ACKnowledgment (AACK) (EAACK), Mobile Ad hoc NETwork (MANET). Distributed generation (DG), islanding, load current, seamless transfer, three-phase inverter, unified control, NPC Online social networks, information filtering, short text classification, policy-based personalization Online social networks, information filtering, short text classification, policy-based personalization. Personalized web seek, Privacy saving, personalisation utility, security hazard, client profile Scalable video coding, Adaptive video streaming, Mobile networks, social sharing, Cloud computing Website design, user Steering, web mining, mathematical programming peer-to-peer, store-carry-forward, discover predict-deliver, interaction, recommendation. — Dynamic voltage restorer (DVR), fuzzy logic controller, voltage-source converter (VSC — Unified Power Quality Conditioner, Three Phase Inverter, Distributed generation (DG), islanding, load current, seamless transfer
Current Issue Atom logo
RSS2 logo
RSS1 logo
  • Home
  • About
  • Log In
  • Register
  • Search
  • Current
  • Archives
  • Announcements
  • EDITORIAL TEAM
  • Author Guidelines
  • Publication Ethics
Home > Archives > Vol 8, No 3 (2020)

Vol 8, No 3 (2020)

March

Table of Contents

Articles

A secure cloud storage scheme on fog computing- ð‘‹ð‘œð‘Ÿâˆ’ð¶ð‘œð‘šð‘ð‘–ð‘›ð‘Žð‘¡ð‘–ð‘œð‘›, ðµð‘™ð‘œð‘ð‘˜âˆ’ð‘€ð‘Žð‘›ð‘Žð‘”ð‘’ð‘šð‘’ð‘›ð‘¡ and ð¶ð‘…ð» operation PDF [Full Text]
A.Tejaswi Gurunath, K.V.V.L. Madhuri 029-032
The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots PDF [Full Text]
Juvva Manjari, Nadella Sunil 033-036
A novel SSGK to protect the communication process and shared data from unauthorized access PDF [Full Text]
B. Venkateswara Rao, P.Radhika Krupalini 037-040


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â