| Issue | Title | |
| Vol 1, No 7 (2013): December | Power Quality Improvement in Utility Grid using Single Phase Micro Sources, DSTATCOM and Distributed Generators | Abstract PDF [FULL TEXT] |
| Ajay Kumar P, Sk Gouse Basha, Ravi Kumar Reddy P | ||
| Vol 4, No 8 (2016): August | Powerful Mechanism To Avoid Denial Of Service Attack For Providing Data Security Using Software Puzzle | Abstract PDF [Full Text] |
| B.V.Pavan Krishna Akhil, R.P.S.P. Veerraju | ||
| Vol 3, No 11 (2015): November | Precision Controlled Secrecy Stabilization In Relational Data | Abstract PDF [FULL TEXT] |
| Rajkumar Lingamgunta, Jajula Hari Babu | ||
| Vol 14, No 2 (2026): Special Issue on Artificial Intelligence, Machine Learning and Smart Intelligent Systems | PREDICTIVE ANALYTICS-BASED DECISION SUPPORT SYSTEM FOR LAND INVESTMENT USING AI | Abstract PDF [Full Text] |
| Arokia Muthu, Rohith Kumar, Nithin B, Akshitha B, Deethvik D, Sathwik G | ||
| Vol 13, No 2 (2025): July | Predictive Modeling for Early Detection of Heart Disorders | Abstract PDF [Full Text] |
| HEMANTH E, SASHANK B. N, ANIL KUMAR K, Vijay Kumar K | ||
| Vol 5, No 5 (2017): May | Predictive Query Indexing for Ambiguous Moving Objects in Uncertain Data Mining | Abstract PDF [Full Text] |
| Gowri SreeLakshmi Neeli, Kesavarao Seerapu | ||
| Vol 5, No 6 (2017): June | Predictive Torque Control Scheme for Three-Phase Four-Switch Inverter -Fed Induction Motor Drive | Abstract PDF [Full Text] |
| M Aparna, K Naga Tejaswani | ||
| Vol 5, No 4 (2017): April | Premature Breast Cancer Mammographic Detection Using Image Segmentation Approaches | Abstract PDF [Full Text] |
| Bilal Rasheed, Omer Suleman | ||
| Vol 8, No 7 (2020): July | Preprocessing Data is Used to Envision Hospitalization in Emergency Department | Abstract PDF [Full Text] |
| Yedla Chandini, B. Srinivas | ||
| Vol 6, No 3 (2018): March | Preventing DDOS Attack by Dynamic Path Identifiers In Internet | Abstract PDF [Full Text] |
| Ananth Teja, V.Aditya Ramalingeswararao | ||
| Vol 3, No 12 (2015): December | Prevention of Sensitive Information by Enhancing Cloud Access Control | Abstract PDF [FULL TEXT] |
| Swamy Mandapaka, D Ramesh | ||
| Vol 2, No 11 (2014): November | Privacy and Classification Of Analyzed Data Using EMD | Abstract PDF[FULL TEXT] |
| T Sravya, G Appa Rao | ||
| Vol 3, No 12 (2015): December | Privacy enhanced and web based service composition | Abstract PDF [FULL TEXT] |
| Bandaru Swamy Sri, U Vinod Kumar | ||
| Vol 4, No 9 (2016): September | Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media | Abstract PDF [Full Text] |
| Veeramala Devi, K.Naga B hargavi | ||
| Vol 3, No 12 (2015): December | Privacy Preservation and traceability support using Public Auditing Mechanism | Abstract PDF [FULL TEXT] |
| Jayanthi Anusha, K Lakshmi Priya | ||
| Vol 3, No 4 (2015): April | Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique | Abstract PDF[FULL TEXT] |
| himasri p, chandhra sekhar m.v.b | ||
| Vol 5, No 7 (2017): July | Privacy Protection Data and Batch Auditing Through Public Auditing Scheme | Abstract PDF [Full Text] |
| Amiripalli Naga Vamsi Krishna, P. Bala Krishna Prasad | ||
| Vol 2, No 10 (2014): October | Probity and Speculations Yielding Model For Multi Clouds | Abstract PDF [Full Text] |
| Gayithri Mantravadi, Pitchiah R | ||
| Vol 3, No 2 (2015): February | Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users | Abstract PDF[FULL TEXT] |
| Syam Kumar Nallamothu, Amanatulla Mohammad, Sayeed Yasin | ||
| Vol 3, No 8 (2015): August | Proficient Authentication Mechanism for Mobile and Pervasive Computing | Abstract PDF [Full Text] |
| Kantamraju Anuhya, G Syam Prasad | ||
| Vol 14, No 2 (2026): Special Issue on Artificial Intelligence, Machine Learning and Smart Intelligent Systems | PROFIT-AWARE CROP FORECASTING USING MACHINE LEARNING AND MARKET DATA | Abstract PDF [Full Text] |
| Sreenivasa Reddy K, Aaji Babu Dhangar, Nagalaxmi B, Karthik G, Vishwa Chandu Ch | ||
| Vol 3, No 11 (2015): November | Protected data retrieval System using CP-ABE for decentralized Tolerant Networks (DTNs) where many key authorities manage their attributes separately | Abstract PDF [FULL TEXT] |
| V Siva mallikarjunarao, K Jhon Paul | ||
| Vol 4, No 8 (2016): August | Protecting (PWS) Structure Ups To Generalize Profiles As Per Client Indicated Protection Requests | Abstract PDF [Full Text] |
| T.Rama Satya Vani, Satti.Vijaya Krishna Reddy | ||
| Vol 3, No 9 (2015): September | Protection Assessment of Design Classifiers under Assault | Abstract PDF[FULL TEXT] |
| D Srujan Chandra Reddy, S Ajay kumar | ||
| Vol 3, No 9 (2015): September | Protection Guarded Secrecy Sustain Access Manipulate Procedure Intended for Relational Data | Abstract PDF[FULL TEXT] |
| D Srujan Chandra Reddy, Y Siva Parvathi | ||
| 926 - 950 of 1181 Items | << < 33 34 35 36 37 38 39 40 41 42 > >> | |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


