Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 190 | A Novel High-Efficiency Isolated Ac–Dc Converter for Wind Farms using LLC Resonant Converter for Industrial Application Authors:S.VIJAYA KUMAR, DR.S.SIVANAGARAJU |
1052-1056 |
Download | |
IJSETR 191 | Satellite Image Resolution Enhancement using Enhanced Discrete Wavelet Transform Authors:Y. GANGA BHAVANI, T.V.N.SAI CHARAN, RAVURI PRASHANTHI, RAVURI SATYANARAYANA, N.VEERAIAH |
1057-1059 |
Download | |
IJSETR 192 | Propensity to Buy Model for Fixed Line Telecom Customers Authors:ASTHA AGRAWAL, YAMINI CHOUHAN |
1060-1062 |
Download | |
IJSETR 193 | An Intelligent Medical Monitoring System Based Upon Zigbee, and Automatic Message using GSM Authors:KARLAPATI LAKSHMI DEEPAK, SHAIK USMAN SAHEB, GADDALA NAGA JYOTHI, CHAVA SIRISHA, K.V.PRAVEEN |
1063-1064 |
Download | |
IJSETR 194 | High Computing Throughput in the Context of Cloud Environment for Model Based Partitioning Authors:N. NALINI SREEDEVI, K. ANUSHA, R. LAKSHMI TULASI |
1065-1068 |
Download | |
IJSETR 195 | Secure Authorized Deduplication using Hybrid Cloud Approach Authors:S. ABDUL. AZAM, S.G.NAWAZ, M.HARATHI |
1069-1072 |
Download | |
IJSETR 196 | Containment of Proximity Malware Behavioral Detection in Delay Tolerant Networks Authors:S. IRFHANA BEGUM, S.G.NAWAZ |
1073-1076 |
Download | |
IJSETR 197 | Supporting Security and Consistency for Distributed, Concurrent Access to Cloud Databases Authors:S.RAZIA, S.G.NAWAZ, M.HARATHI |
1077-1080 |
Download | |
IJSETR 198 | Some New Closed and Open Maps in Topological Spaces Authors:S.PIOUS MISSIER, J.ARULJESTI |
1081-1086 |
Download | |
IJSETR 199 | Security Framework of Service Integrity Attestation for Software-As-A-Service Clouds Authors:P. SAI PRIYA, S.G.NAWAZ, M.HARATHI |
1087-1090 |
Download | |