Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 1 | Fuzzy Based Control of Two Links Robotic Manipulator Authors:THIDA NYEIN, ZAW MIN OO, HMWE THITSAR HLAING |
01-07 |
Download | |
IJSETR 2 | Design and Construction of Temperature Control System Using Peripheral Interface Controller Authors:KHIN EI EI KHINE |
08-13 |
Download | |
IJSETR 3 | Customer Relationship Management (CRM) Authors:R. AMOS, ABHILASHA Y C, NISHCHITH J BANGAR |
14-16 |
Download | |
IJSETR 4 | An Enhanced Video Steganography through Motion Object Tracking in Frequency Domain Authors:C. RAJASEKHAR, H. DEVANNA |
17-21 |
Download | |
IJSETR 5 | Smart Health Prediction using Data Mining with Effective Machine Learning Authors:N. VIJAY KUMAR, M. UDAYA PRAKASH |
22-24 |
Download | |
IJSETR 6 | Techno-Rank: Ranking Trends in Information Technology Based on Technical Discussions in Social Media & News Topics Authors:R. HIMABINDU, DR. N. MOHAN KRISHNA VARMA |
25-28 |
Download | |
IJSETR 7 | The Corona Effect on High Voltage Transmission Lines Authors:ABDULATE AHMUDA MUSBAH ELGANAI |
29-31 |
Download | |
IJSETR 8 | Design and Results of Differential Relay Settings for Power Transformers 80MVA, 40MVA and 100MVA Authors:NWAI YEE LAE, CHO CHO KHAING |
32-34 |
Download | |
IJSETR 9 | Access Control Based Privacy Protection for Cloud Based Services Authors:L. VYSHNAVI, DR. D. CHANDRAMOHAN |
35-36 |
Download | |
IJSETR 10 | Avoiding Malware and Fraudulent Behaviors in Google Apps Authors:JELLA CHANDU NAIDU, DR. P. V. VENKATESWARA RAO |
37-39 |
Download | |