Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 336 | Taxo-Finder to Build a Graph, Cgraph and Representing Domain Corpus and Their Associative Strengths Authors:SHAIK ASHA, P. S. NAVEEN KUMAR |
1810-1814 |
Download | |
IJSETR 337 | Build an Association Rule Mining Solution in Data Base by Using Cloud-Aided Frequent Itemset Mining Solution Authors:D. BHASKARA REDDY, DR. R. MURUGADOSS |
1815-1818 |
Download | |
IJSETR 338 | An Online Anomaly Detection Method That Can Be Applied At the Hypervisor Level of the Cloud Infrastructure Authors:S. PALANI, G. DHANA SEKAR, B. CHANDRA SEKHAR |
1819-1823 |
Download | |
IJSETR 339 | Feasibility and Benefits of Experimental Studies using a Collection of Real-World Trust Feedbacks on Cloud Services Authors:A. M. RANGARAJ, D. SRIDHAR |
1824-1828 |
Download | |
IJSETR 340 | Comprehensive Framework for the Optimization and Performance Evaluation of Uplink Energy Consumption in Cellular Networks Authors:P. PADMAVATHI, DR. R. MURUGADOSS |
1829-1832 |
Download | |
IJSETR 341 | Distributed Energy Efficient Clone Detection Protocol with Random Witness ERCD Protocol Authors:M. ANIL KUMAR, DR. R. MURUGADOSS |
1833-1838 |
Download | |
IJSETR 342 | Privacy Preserving Framework based on Robust Hashing and Partial Encryption Authors:I. V. SUBBARAO, P. S. NAVEEN KUMAR |
1839-1843 |
Download | |
IJSETR 343 | Sensor Information Values Transferring and Maintained in the Outsourced Cloud Resources Authors:S. PALANI, G. DHANA SEKAR, K. HARITHA |
1844-1848 |
Download | |
IJSETR 344 | Lower Bound Techniques Based on Interval and Edge Expansion to Study the Limitations of any Demand-Optimized Network Authors:A. M. RANGARAJ, G. NAGAMANI, A. SUNEETHA |
1849-1852 |
Download | |
IJSETR 345 | Personal Privacy in Personalized through Data Obfuscation and Data Transformation Anonymization Techniques Authors:SK. SUHEL BAIG, MADDALI M. V. M. KUMAR |
1853-1856 |
Download | |