Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 46 | A Novel Method for Anomaly Detection and Localization in Crowded Environments Authors:D. NAGA SUDHAKARA REDDY, K. BALA |
0250-0254 |
Download | |
IJSETR 47 | Implementation of a Battery Energy Storage System Control of Reduced Rating Dynamic Voltage Restorer with Fuzzy Logic Authors:VAIDYA VISHAL, RAKESH KUMAR JHA, M. M. HAPSE, SUNIL PUND |
0255-0261 |
Download | |
IJSETR 48 | Seed and Grow Algorithm using Identify Users from Anonymized Social Network Authors:D. AVINASH, M. VENKATA DURGARAO |
0262-0265 |
Download | |
IJSETR 49 | Towards Reliable Knowledge Delivery for Extremely Dynamic Mobile Circumstantial Networks Authors:MOHAMED JAWARD BAH, ALHASSAN ZAKY BAH |
0266-0270 |
Download | |
IJSETR 50 | Secure Mining of Association Rules in Large Scale Distributed Databases Authors:M. V. V. SATYANARAYANA, J. RAJAKALA |
0271-0274 |
Download | |
IJSETR 51 | Data Owner Impose the Cryptography Mechanism to Enabling Data and Mutual Trust Authors:INDIRA MUSUNURU, POSALI SUDHAKAR |
0275-0278 |
Download | |
IJSETR 52 | A Comparative Study on Privacy-Preserving Data in Cloud Computing with a Focus on User Revocation Authors:G. TEJASWI, B. PRASAD BABU |
0279-0283 |
Download | |
IJSETR 53 | The Secure Data Access Control for using Key Policies in Cloud Server Authors:UDAYA TEJASWINI MUKTALA, OJHA SHIV BHAGWAN |
0284-0288 |
Download | |
IJSETR 54 | Design Optmisation and Analysis of Hybrid Composite Leaf Spring Authors:B. VISHWA SAI, DR. V. S. HARIHARAN |
0289-0294 |
Download | |
IJSETR 55 | Fuzzy Based APF for Renewable Energy Sources with Power Quality Improvement Authors:OMMI DEEPTHI, VASANTHA SENA K |
0295-0302 |
Download | |