Submission Open for 2025 |
Last Date of Submission : |
20th, May-2025 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, May-2025 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 183 | A Survey of Third Party Auditor for Secure Cloud Storage using Meta Data and Hashing Authors:BODDU KIRAN KUMAR, M. NAGENDRA RAO |
7070-7072 |
Download | |
IJSETR 184 | Detection Against DRDOS Attacks by using Rank Correlation Detection Authors:DIVYA VINJAMURI, K.ASHLESHA |
7073-7076 |
Download | |
IJSETR 185 | Data Mining for Extracting Business Intelligence from Horizontally Distributed Databases Authors:ETNENI MOUNIKA, P.KAVITHA, A. PRATAPAREDDY |
7077-7080 |
Download | |
IJSETR 186 | Design and implementation of Discrete Hartley Transform (DHT) and Fast Fourier Transform (FFT) based OFDM System in AWGN Channel Authors:MUDAPALLY SATHEESH, D.V.RAJESHWARRAJU |
7081-7085 |
Download | |
IJSETR 187 | MCP-ABE Access Control Scheme for Sharing Scalable Media Based on Data Consumers Authors:VINJAMURI PRATHIMA, C. SIVA JYOTHI |
7086-7091 |
Download | |
IJSETR 188 | User Profile Matching With Privacy-Preservation in Mobile Social Networks Authors:ASMA SULTANA |
7092-7096 |
Download | |
IJSETR 189 | Control & Automation of Water Theft Identification System for Urban Drinking Water Supply System using GSM Authors:K UPENDRANATHA REDDY, VANAPARTHI SRIKANTH |
7097-7102 |
Download | |
IJSETR 190 | A Novel Method by Reserving Room before Encryption with a Traditional RDH Algorithm Authors:MIR ABDUL HASEEB KHAN, C. SIVA JYOTHI |
7103-7108 |
Download | |
IJSETR 191 | Management Redundancy of Multipath Routing for Intrusion Tolerance in HWSNs Authors:A. SREENIVASULU, B. PANALLAL |
7109-7117 |
Download | |
IJSETR 192 | An Efficient High Throughput AWG Noise Estimation and Removal using SVD Authors:M. HARISH KUMAR, E.SUNEEL |
7118-7122 |
Download | |