DESIGN OF A MULTI STORIED RESIDENTIAL BUILDING OF (UNG2+G+10) BY USING MOST ECONOMICAL COLUMN METHOD
Authors: S AMRUTHA
Doi:
|
10-20 |
|
|
ANALYSIS OF G+2 RESIDENTIAL BUILDING USING INTEGRATED GREEN DESIGN CONCEPT
Authors: G DEVI VARA PRASAD
Doi:
|
21-25 |
|
|
RECYCLED CONCRETE STRENGTH ENHANCEMENT
Authors: Dr.M RAMESH BABU
Doi:
|
26-34 |
|
|
DESIGN OF A G+7 STOREYED PRECAST BUILDING
Authors: SREE MAHALAKSHMI
Doi:
|
35-42 |
|
|
MODELING OF POST TENSIONED SLAB (REVIEW)
Authors: M BHAGYA SREE
Doi:
|
53-58 |
|
|
DESIGN & ANALYSIS OF POST-TENSIONED FLAT SLAB BY USING
SAFE
Authors: J SHARAN
Doi:
|
59-62 |
|
|
A REVIEW ON APPLICATION OF SILICA FUME AND NANOSILICA IN
CEMENT AND CONCRETE
Authors: K NARESH
Doi:
|
63-73 |
|
|
SPECTROSCOPIC INVESTIGATIONS WITH NONLINEAR OPTICAL
AND OTHER MOLECULAR PROPERTIES
Authors: U KARNAKAR
Doi:
|
74-85 |
|
|
SYSTEMATIC STUDY INTO THE INFLUENCE OF TEMPERATURE
ON THE OPTICAL PROPERTIES OF NIO THIN FILMS
Authors: B KRISHNA
Doi:
|
86-91 |
|
|
METAMATERIAL ABSORBER BASED POLARIZATION
INSENSITIVE ULTRATHIN COMPACT TRIPLE BAND
Authors: R ANURADHA
Doi:
|
92-99 |
|
|
SIMULATION PROCESS OF ENVIRONMENTAL SUSTAINABILITY ASSESSMENT OF A GAS-TO- LIQUIDS
Authors: NARAYANA J
Doi:
|
100-109 |
|
|
CONSTRUCTION OF [ 14 8 3 ]-LINEAR CODE FROM THE AUNU GENERATED [ 7 4 ]-LINEAR CODE AND THE KNOWN [7 4 3 ] HAMMING CODE USING THE (U|U+V)
Authors: YAKANNA
Doi:
|
110-114 |
|
|
PERFORMANCE ANALYSIS OF A SIMPLE VAPOUR
COMPRESSION REFRIGERATION SYSTEM TO KEEP THE
VOLUME TUBE AS CONSTANT
Authors: R.RAKESH, [ 2 ] DR. MANOJ KUMAR CHOPRA
Doi:
|
115-123 |
|
|
A STUDY ON QUALITY OF WORK LIFE AT BIG BAZAAR, HYDERBAD
Authors: 1P. BUELA PRASANNA KUMARI, 2DR. K. ANIL KUMAR
Doi:
|
124-128 |
|
|
Speech Recognition for Secured Robot Operation
Authors: Dr.GSK Gayatri Devi, Theleru Surender Reddy
Doi: .
|
129-132 |
|
|
ARTIFICIAL INTELLIGENCE CONTROLLER FOR POWER QUALITY IMPROVEMENT IN WECS
Authors: Ms.N.Lavanya,Ms.K.Swetha
Doi: .
|
133-140 |
|
|
A Review on IoT Security with Blockchain
Authors: Mr.Siva Subramanyam,Ms.Ch.Jyothi
Doi: .
|
141-149 |
|
|
FRAUD AND MALWARE DETECTION FROM ANDROID APPLICATIONS USING THE SUPPORT VECTOR MACHINE
Authors: Mr More Praveen, Ms. K Apurva,
Doi: .
|
150-161 |
|
|
PACKET DROPPING ATTACKS DETECTION USING HLA
Authors: Mr.G Venu Gopal Rao, Mr.Repakula Naresh,
Doi: .
|
162-168 |
|
|
PRACTICAL QUERY ACCOMMODATIONS TO SECURE DATA FOR STORING IN CLOUD
Authors: Ms. Mustyala Roopa, Mr. S. Sudheer Reddy,
Doi: .
|
169-177 |
|
|