Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 153 | Intra-and-Inter-Constraint-Based Video Enhancement using Piece wise Tone Mapping Authors:GAZALA NAZREEN, K.YOJANA |
6863-6868 |
Download | |
IJSETR 154 | Test Patterns of Multiple Sic Vectors: Theory and Application in BIST Schemes Authors:TUNIKI RAMESH, VENNELA KUSUMA, KAYA VENKATESWARLU |
6869-6874 |
Download | |
IJSETR 155 | Maximizing Energy Efficiency in MISO Beam Forming System Authors:K.PREM, K.YAKESH, DR. POOLA SREENIVASULU |
6875-6879 |
Download | |
IJSETR 156 | Fully Anonymous Profile Matching in Mobile Social Networks Authors:K. SHOBHAN BABU, JHANSI LAKSHMI |
6880-6884 |
Download | |
IJSETR 157 | Performance Evaluation of Scalable Position Services for Geographic Ad-Hoc Routing Authors:P. SUSHMA, K. PRAVEEN KUMAR |
6885-6890 |
Download | |
IJSETR 158 | A Novel Method by Reserving Room before Encryption with a Traditional RDH Algorithm for Encrypted Images Authors:P. MANJUSHA, CH. SRIHARI |
6891-6895 |
Download | |
IJSETR 159 | Cloud Data Privacy Leakage using UBCCE of Intermediate DS Authors:BR. SAISHREE, K.PARSHU RAMULU |
6896-6902 |
Download | |
IJSETR 160 | Speech Synthesis System for Indian Accent using Festvox Authors:MOHAMMED WASEEM, C.N SUJATHA |
6903-6911 |
Download | |
IJSETR 161 | Implementation of Lightweight Protocol for Resource Depletion Attacks in WSN Authors:T.RAMA KRISHNA, M.PURUSHOTTAM |
6912-6915 |
Download | |
IJSETR 162 | Dynamic Authentication using Data Assessments for Handling Misusability in Publishing Data Authors:P.A.L.PRAVALLIKA, A.VANATHI |
6916-6919 |
Download | |