Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 975 | Experimental Study on Compressive Strength of Concrete by Partial Replacement of Cement with Metakaolin Authors:PENDYALA CHANAKYA, DIPTIKAR BEHRA |
5354-5358 |
Download | |
IJSETR 976 | New Secure Cloud Storage Encryption Scheme via Deniable Attribute Based Encryption Authors:ADAPA GOPI, SABADI LAXMI PRASANNA |
5359-5362 |
Download | |
IJSETR 977 | Novel Approach on Towards Effective Bug Triage with Software Data Reduction Techniques Authors:ADAPA GOPI, N.SRIKANTH, GUNDRATI LAVANYA |
5363-5369 |
Download | |
IJSETR 978 | Personalized Collaborative Filtering for Web Service for Improving Response Time and Throughout Authors:ADAPA GOPI, A.HARI TEJA, PANJUGULLA VEERESH |
5370-5373 |
Download | |
IJSETR 979 | Provable Dynamic Data Possession in Cloud Computing Systems for Improving Scalability Authors:ADAPA GOPI, KARNEWAR PRATIBHA |
5374-5377 |
Download | |
IJSETR 980 | Reducing the Damage of the Clients Key Exposure in Cloud Storage Auditing with Secure and Efficient Authors:ADAPA GOPI, R.USHA RANI, SINGAM MADHUKAR |
5378-5382 |
Download | |
IJSETR 981 | T-Broker Uses the Maximizing Deviation Method to Compute the Direct Experience Based on Multiple Clouds Collaborative Services Authors:ADAPA GOPI, R.USHA RANI, KUCHIPUDI NAVYA |
5383-5389 |
Download | |
IJSETR 982 | Unified Key Management Framework Privacy and Owner Authorization in Cloud Computing Authors:ADAPA GOPI, R.USHA RANI, BOLLAM TIRUPATHI |
5390-5397 |
Download | |
IJSETR 983 | Users Compose Privacy Settings for Their Images using Adaptive Privacy Policy Prediction Authors:ADAPA GOPI, B.HARI KUMAR, GAJAM VENU |
5398-5404 |
Download | |