Issue | Title | |
Vol 6, No 7 (2018): July | The Efficient Adaptive Pre-Encoded Multipliers Based on (NR4SD) Encoding for Digital Signal Processing Applications | Abstract PDF [Full Text] |
Guggilla.Satya Sudha, Chintha.Sri Pothu Raju | ||
Vol 7, No 8 (2019): August- 2019 | The Efficient and probabilistic symmetric searchable encryption scheme in Cloud | Abstract PDF [Full Text] |
D. Vijaya Durga, A.P.V.D.L. Kumar | ||
Vol 5, No 7 (2017): July | The Enriched Object Oriented Software processes for Software Fault Prediction | Abstract PDF [Full Text] |
T Ravi Kumar, T Srinivasa Rao | ||
Vol 12, No 1 (2024): May - June | The Evolution and Impact of Cryptocurrencies on Global Financial Systems: Technological Foundations, Current Applications, and Future Challenges | Abstract PDF [Full Text] |
Boddu Laxman, Gudi V. Chandra Sekhar, Pal Both Dol | ||
Vol 4, No 5 (2016): May | The Evolution of Microprocessor Chip: A historic overview of development | Abstract PDF [Full Text] |
Waqar Ahmad Jang, Waseem Khan, Sadawat Shah, Aadil Ahmad | ||
Vol 4, No 8 (2016): August | The Instinctive Outline towards Online Shortest Path | Abstract PDF [Full Text] |
T.Chandana Gouri | ||
Vol 3, No 10 (2015): October | The Methodology To Underrate Routing Incursion In Informatics Networks | Abstract PDF [Full Text] |
Gopala Krishna T, Sai M | ||
Vol 4, No 12 (2016): December | The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage | Abstract PDF [Full Text] |
V.R.S.S.D Sireesha, A Vishnupriya | ||
Vol 9, No 2 (2021): February | The multi storage Protocol with Ranked Multi-Keyword Search in Cloud | Abstract PDF [Full Text] |
Jala Prasadarao, M V V B S Kiran | ||
Vol 5, No 6 (2017): June | The Need Of Financial Statement Analysis In A Firm/An Orgnization | Abstract PDF [Full Text] |
G Suneetha | ||
Vol 6, No 1 (2018): January | The Probabilistic Methodology for Distinguishing Node Failures in Mobile Wireless Networks | Abstract PDF[Full Text] |
Ch Sri Krishna Satyanarayana Swamy, K.C. Pradeep | ||
Vol 2, No 11 (2014): November | The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols | Abstract PDF[FULL TEXT] |
N Santoshi Lakshmi, M V.V.S.Narayana Murthy | ||
Vol 5, No 8 (2017): August | The Protected Optimization Totaling Outsourcing In A Case Study Of Linear Programming | Abstract PDF [Full Text] |
M Yuva Surya Rani, G. Krupa Havilah, M. Veerabhadra Rao | ||
Vol 3, No 9 (2015): September | The Quality Demonstration projected in Cloud supervisions | Abstract PDF[FULL TEXT] |
K Sireesha, M Radhika | ||
Vol 5, No 7 (2017): July | The Revocation Mechanism Of A Be Scheme Into Asymmetric GKA | Abstract PDF [Full Text] |
A. Anuradha, B.Sai Chandu | ||
Vol 6, No 12 (2018): December | The Secured Cloud Storage with Efficient Key Generation in cloud computing | Abstract PDF [Full Text] |
K Surya Kranthi, Kakarla Ravi kumar | ||
Vol 7, No 8 (2019): August- 2019 | The Secured Data Sharing For Multiauthority Access in Cloud Storage | Abstract PDF [Full Text] |
R.N.D.S.S. Lakshmi, B.V. Ram Kumar | ||
Vol 8, No 7 (2020): July | The Secured Financial Transaction Network using User Identity Verification | Abstract PDF [Full Text] |
Mallampalli Sneha, P Rama Krishna | ||
Vol 7, No 5 (2019): May | The Secured Multi-Keyword Ranked Search over Encrypted Data Stored in Cloud | Abstract PDF [Full Text] |
Raja Kondi, S. Srinivas | ||
Vol 5, No 11 (2017): November | The Study Exploration towards Side Friction Influences by traffic performance measures on roads | Abstract PDF [Full Text] |
Itrajula Adinarayana, Dr. N.C Anil | ||
Vol 8, No 3 (2020): March | The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots | Abstract PDF [Full Text] |
Juvva Manjari, Nadella Sunil | ||
Vol 5, No 5 (2017): May | The Trust and Reputation Systems towards Data for Cloud and Wireless Sensor Networks Integrity | Abstract PDF [Full Text] |
Sudanagunta Venkata Prathyusha, N Mahesh | ||
Vol 3, No 12 (2015): December | The versatile routing in correspondence systems using Back Pressure based packet Algorithm | Abstract PDF [FULL TEXT] |
P Sitaramanjaneyulu, Kande Giri Babu | ||
Vol 3, No 12 (2015): December | The Wireless frameworks consuming TDOA and FDOA Extents for Mobile Emitter Geolocation and Tracking applications | Abstract PDF [FULL TEXT] |
Anwar Mohammed, Babu K.Giri | ||
Vol 3, No 12 (2015): December | Thermal Analysis Of A Gas Turbine Rotor Blade | Abstract PDF [Full Text] |
Gollapothu Boyaraju, Sanmala Rajasekhar, A.V Sridhar, J.Hari Narayana Rao | ||
1051 - 1075 of 1123 Items | << < 38 39 40 41 42 43 44 45 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â