Title | Page No | Download | Author |
A REVIEW ON RENEWABLE ENERGY POWER GENERATION
SYSTEMS Authors: MATURI MADHAVI Doi: 10.48047/IJARST/V12/I01/01 |
1-4 | ||
REVIEW ON PARTICLE SWARM OPTIMIZATION AND QUANTUM -BEHAVED PARTICLE
SWARM OPTIMIZATION Authors: LABHANA SRAVANI Doi: 10.48047/IJARST/V12/I01/02 |
5-8 | ||
A REVIEW ON WIRELESS POWER TRANSMISSION Authors: MAKIREDDY MAHESH Doi: 10.48047/IJARST/V12/I01/03 |
9-23 | ||
A REVIEW ON DEEP LEARNING BASED LOAD
DEMAND FORECASTING TECHNIQUES FOR SMART
GRID Authors: M.VarunKumar, M. Sai Kumar,P.Suhas Raj Doi: 10.48047/IJARST/V12/I01/04 |
24-38 | ||
METHODS OF TRANSMISSION LINE COMPENSATIONS
USING FACTS DEVICES Authors: P. Suhas Raj, M.V.S. Karthik, M. Sai Kumar Doi: 10.48047/IJARST/V12/I01/05 |
39-45 | ||
TECHNOLOGIES FOR DESALINATION OF SEA WATER IN
OCEAN THERMAL ENERGY COVERSION SYSTEM Authors: P.SIDDU JAGANNADHA NAIDU Doi: 10.48047/IJARST/V12/I01/06 |
46-52 | ||
A REVIEW ONUSAGE OF BESS TO MITIGATE
TRANSMISSION LINE CONGESTION AND TO IMPROVE
POWER SYSTEM EFFICIENCY WITH RENEWABLE
ENERGY Authors: P. Tarun Kumar, V. Tarun, M. Varun Kumar Doi: 10.48047/IJARST/V12/I01/07 |
53-87 | ||
PRACTICAL APPLICATIONS OF INTRNET OF THINGS (IOT) Authors: P. Sai teja,M.V.S.Karthik, P. Vasanth Kumar, M.Varun kumar Doi: 10.48047/IJARST/V12/I01/08 |
88-115 | ||
A REVIEW ON ON-ROAD CHARGING OF ELECTRIC
VEHICLES Authors: S.SAI KUMAR Doi: 10.48047/IJARST/V12/I01/09 |
116-128 | ||
Modern Techniques of Encrypted Image using Wavelet
Transform Authors: PB KAVYA, BULLARAO. D Doi: 10.48047/IJARST/V12/I01/10 |
129-133 | ||
Image Recognition of Sparsity, Non-Uniform
Motion Blur, Illumination, and Pose Authors: Darja Usharani, Bullarao.D Doi: 10.48047/IJARST/V12/I01/12 |
134-151 | ||
Optimized Low power efficiency of Radix-2 8
bitReversible Booth‘s Multiplier Authors: M L Mounika, T.K. Kalaiarasan Doi: 10.48047/IJARST/V12/I01/13 |
152-157 | ||
Convolution and Deconvolution Application using Ancient Indian
Vedic Mathematics Authors: S. DHARANISREE,BULLARAO.D Doi: 10.48047/IJARST/V12/I01/14 |
158-162 | ||
WEB VULNERABILITY DETECTION: THE CASE OF CROSS-SITE
REQUESTFORGERY Authors: SUJATA KUMARA, VIJENDER KUMAR SOLANKI Doi: 10.48047/IJARST/V12/I01/15 |
163-172 | ||
V2V SYSTEM CONGESTION CONTROL VALIDATION AND
PERFORMANCE USING CAN COMMUNICATION AND TRACKING
OF VEHICLE Authors: M.SOWMYA, DR.S.MANTHANDI PERIANNASAMY, DR.N.SREEKANTH Doi: 10.48047/IJARST/V12/I01/16 |
173-185 | ||
NOVEL APPROACH ON CONTINUOUS TOOL PATH GENERATION
FOR WELD DEPOSITION BASED ADDITIVE MANUFACTURING Authors: HARIHARAN DURAIVELU, NANDIPATI LAKSHMIVENKATA SAIKUMAR Doi: 10.48047/IJARST/V12/I01/17 |
186-190 | ||
HUMAN RESOURCE MANAGEMENT PRACTICES IN INDIAN RAILWAY- A STUDY Authors: Chiluku Swamy Doi: 10.48047/IJARST/V12/I01/18 |
191-197 | ||
A STUDY OF SELECT MICRO, SMALL AND MEDIUM SCALE INDUSTRIES IN
WARANGAL DISTRICT Authors: CH.Venkat Narsimha Chary Doi: 10.48047/IJARST/V12/I01/19 |
198-215 | ||
Human Resource Management and Performance in Indian Railway-A Study Authors: Chiluk Swamy Doi: 10.48047/IJARST/V12/I01/20 |
216-221 | ||
A STUDY ON CONSUMER SATISFACTION OF ONLINE BUYING AGAINST OFFLINE BUYING Authors: Kilaru Madhavi, Dr.K.Sambasiva Rao Doi: 10.48047/IJARST/V12/I01/21 |
222-227 | ||
MULTI BIT ERROR DETECTION & CORRECTION WITH
AESENCRYPTION FOR SECURE COMMUNICATION Authors: A SRINIVASA REDDY, A.ASWANILALITHA Doi: 10.48047/IJARST/V12/I01/22 |
228-233 | ||
DESIGN A HIGH SPEED AND HIGH SECURE NTT BASED CRYPTO PROCESSOR ENCRYPTION Authors: BHAVIRISETTY HIRANMAI, G .RAMANA REDDY Doi: 10.48047/IJARST/V12/I01/23 |
234-239 | ||
GAS VANISHER Authors: K.RAVIKIRAN, B.ARCHANA,G.KARTHIK REDDY,R.SAI CHARAN,G.SAHITHI Doi: |
247-251 | ||
DIGI ANGLE METER Authors: B.ARCHANA, K.SATHISH,B.SURESH RAM,N UHA,N DEEPTHI Doi: |
252-257 | ||
ECO-REFRI Authors: B.ARCHANA, K.SATHISH,B.SURESH RAM,T.AJITHA,B SRILAYA Doi: |
258-263 | ||
A SIGNIFICANT ROLE OF ARTIFICIAL INTELLIGENCE (AI) IN LAW Authors: Raghu Korrapati, Ph.D., D.Sc., D.Litt Doi: |
264-271 | ||
SECURE DATA TRANSMISSION FOR CRYPTOGRAPHY USING STANDARD FORMAT Authors: ARULKUMAR M Doi: 10.48047/IJARST/V12/ISSUE 01/27 |
272-281 | ||
"SIEM BEST PRACTICES FOR IMPLEMENTING AND MANAGING SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS" Authors: Srinivas Reddy Pulyala, Avinash Gupta Desetty, Vinay Dutt Jangampet Doi: 10.48047/IJARST/V12/ISSUE 01/28 |
282-286 | ||
सामाजिक स्तर पर महिलाओं की शिक्षा की व्यवस्थाओं का अध्ययन Authors: AJAY KUMAR GUPTA,DR. DHIRAJ SHINDE Doi: 10.48047/IJARST/V12/ISSUE 01/29 |
287-297 | ||
अटल बिहारी वाजपेयी की गठबंधन राजनीतिक सक्रियता की भूमिका का अध्ययन Authors: USHA KUMARI,DR. RAFAT AFROZ KHAN Doi: 10.48047/IJARST/V12/ISSUE 01/30 |
298-305 | ||
SIMILARITY SEARCH FOR ENCRYPTED IMAGES IN
SECURE CLOUD COMPUTING Authors: Gullapalli Bhargavi , Raja Rajeswari kalidindi Doi: 10.48047/IJARST/V12/ISSUE 01/31 |
306-316 | ||
A STUDY ON BENGALURU'S ONLINE TEACHING PRACTICES Authors: Antony D, Yogeshver Prasad Sharma Doi: 10.48047/IJARST/V12/ISSUE 01/32 |
317-327 | ||
A CRITICAL EVALUATION OF THE CHALLENGES IN CYBERSECURITY OF
INDIAN BANKING AND THE POSSIBLE WAYS TO MITIGATE THEM Authors: Dr. Dinesh Pratap Singh Doi: 10.48047/IJARST/V12/ISSUE 01/33 |
328-340 |