Total Received Papers: | Total Accepted Papers: | Total Rejected Papers: | Acceptance Rate:
Volume 10 Issue 02, February 2024 | |||||
S.No. | Title of Paper | PageNo. | Download |
||
1. | A Review Article on Analysis and Design of Water Distribution Network for Jabalpur Cantonment Board Area Authors: Mohammad Zafar Mohammad Rizwan, Tarun Ghorse and Rajesh Ingole DOI: https://doi.org/10.46501/IJMTST1002001 |
01-05 | |||
2. | A Review Article on The Impact of the Jal Jeevan Mission on Rural Water Supply: Assessment, Design of Distribution Network, and Analysis Authors: Aniket Soge, Tarun Ghorse and Rajesh Ingole DOI: https://doi.org/10.46501/IJMTST1002002 |
06-09 | |||
3. | Adaptive ANFIS Control for Sustainable Electric Vehicle Charging in Standalone Solar, Wind, and Battery Energy Storage System Authors: B Kavya and Y Priyanka DOI: https://doi.org/10.46501/IJMTST1002003 |
10-24 | |||
4. | Navigating the Unseen: Ultrasonic Technology for Blind Navigation Authors: Roja D, Venkata Ramana Pati, Pravallika K, Chanikya Lakshman Kumar. M and Jaswanth Chowdary K DOI: https://doi.org/10.46501/IJMTST1002004 |
25-31 | |||
5. | Revolutionizing Wellness: The IoT Smart Bottle for Health Monitoring uthors: Lavanya Dalavai, K .Mahesh Chandu, V.Grahya, S.Ashok and S.Sravani Satya Pravallika DOI: https://doi.org/10.46501/IJMTST1002005 |
32-38 | |||
6. | Next-Generation Billing Systems: The Smart eBill Revolution Authors: Khader Basha Sk, R Sai Srinivas, P Naveen Kumar, D Kalayani Sai and A Mahendra DOI: https://doi.org/10.46501/IJMTST1002006 |
39-45 | |||
7. | Stay Alert: Drowsiness Detection with IoT Technology Authors: G Sudha Rani, A Anusha, A Yamini, I.Srinivasa Rao and Ch Gopi Krishna Chowdary DOI: https://doi.org/10.46501/IJMTST1002007 |
46-52 | |||
8. | IoT Based Smart Vehicle Parking System Using RFID Authors: Haritha Koya, K Likhitha, K Srilatha, G Saida Babu and G Vaishnavi DOI: https://doi.org/10.46501/IJMTST1002008 |
53-60 | |||
9. | Harnessing IoT for Real-Time Plant Health Monitoring: Challenges and Opportunities Authors: Roja D, N Venkatesh, S Maheswari, P Triveni and Ch Srikanth DOI: https://doi.org/10.46501/IJMTST1002007 |
61-69 | |||
10. | Intelligent Travel Companion: The IoT-Enabled Smart Bag Authors: Khader Basha Sk, B Pravallika, D Swathi, P Sri Lakshami Durga and Ch SivaTeja DOI: https://doi.org/10.46501/IJMTST1002010 |
70-76 | |||
11. | IoT Based Smart Irrigation and Controlling System Authors: Sai Srinivas Vellela, K Varshini, M Jeevana, Sk Kadheer and T Pavan Kumar DOI: https://doi.org/10.46501/IJMTST1002011 |
77-85 | |||
12. | IoT- Based Weather Reporting System to Find Dynamic Climatic Parameters Authors: D Lavanya, B Sivaiah, P Sarath Kumar, V Narendra Reddy and K Bala Harsha Vardhan Sai DOI: https://doi.org/10.46501/IJMTST1002012 |
86-92 | |||
13. | IoT based COVID Patient Health Monitoring System Authors: Haritha Koya, S Praveen, T Divyasiri, Y Narasimha Rao and N Siva krishna DOI: https://doi.org/10.46501/IJMTST1002013 |
93-101 | |||
14. | Smart Ultrasonic Radar: Real-Time Object Detection and Tracking with IoT Integration Authors: Roja D, Hanumanth Rao .D, Venkateswarlu. R, Nagaa Charan.T and Ashok Teja.A DOI: https://doi.org/10.46501/IJMTST1002014 |
102-109 | |||
15. | A Proactive Defense Mechanism against Cyber Threats Using Next-Generation Intrusion Detection System Authors: Dr.D.Kalyan Kumar, Panyam Bhanu Latha, Y. Manikanta Kalyan, Kancheti Deepu Prabhunadh and Siddi Pavan Kumar DOI: https://doi.org/10.46501/IJMTST1002015 |
110-116 | |||
16. | Develop a Purposely Insecure Web Application for Practicing Security Testing Authors: B.Venkateswara Reddy, Kajjam Pavithra, Vakkalagadda Prudhviraj, Malisetty Narasimha Naidu and Kadiyala Sai Krishna DOI: https://doi.org/10.46501/IJMTST1002016 |
117-121 | |||
17. | Blockchain Security: Work On Securing Blockchain networks and smart contracts Authors: P.Premchand, Gunapaneni Maneesha, Guntakala Bavesh Sai, Bhargav Dronadula and GhantaLokesh DOI: https://doi.org/10.46501/IJMTST1002017 |
122-129 | |||
18. | Implementing a Chatbot with End-To-End Encryption for Secure and Private Conversations Authors: Dr.D.Kalyan Kumar, Muhammad Shaguftha, Putti Venkata Sujinth, Mudraboyina Naga Praveen Kumar, Namburi Karthikeya DOI: https://doi.org/10.46501/IJMTST1002018 |
130-136 | |||
19. | To Implement a Secure Access Control System Using Biometric Authentication Methods Authors: B.Venkateswra Reddy, Munagala RenukaSwathi, Dandu Lakshmi Narayana, Kancharla Raviteja, Nalam Ajay Kumar DOI: https://doi.org/10.46501/IJMTST1002019 |
137-142 | |||
20. | Vulnerability Scanner Build a Tool That Scans a System forPotential Vulnerability Authors: P.Premchand, Galla.Tinkuvasavya, Muppavarapu.Thilak Raghavendra, Gangineni.Gopi, Narla.Bhas DOI: https://doi.org/10.46501/IJMTST1002020 |
143-150 | |||
21. | Email Phishing Simulations Serve as a Valuable Tool in Fostering a Culture of Cybersecurity Awareness Authors: Dr.D.Kalyan Kumar, Kota Nanisai Krishna, Gorantla Nagarjuna, PuvvadaVenkata Naga Sai Jagadesh Kumar, Modepalli Yeswanth Chowdary DOI: https://doi.org/10.46501/IJMTST1002021 |
151-157 | |||
22. | Build a Bot to Monitor the Dark Web for Mentions of Your Organization's Data or Employees Authors: B.Venkateswra Reddy, Gonuguntla Ravi Kiran, Gadagottu Gopichand, Modepalli Vikky, Prattipati Amaralingeswara Rao DOI: https://doi.org/10.46501/IJMTST1002022 |
158-165 | |||
23. | Social Engineering Toolkit a Versatile and Sophisticated Tool to Address Vulnerabilities Stemming from Social Engineering Attacks Authors: P.Premchand, Sadineni.Kavyanjali, Gottumukkala.Lokesh Durga, Shaik.Mahammad Shakil, Panga.Kondaiah DOI: https://doi.org/10.46501/IJMTST1002023 |
166-172 | |||
24. | Build a Tool for Digital Forensics to Analyze and Recover Information from Compromised Systems Authors: Dr.D.Kalyankumar, Saranam Kavyasri, Mandadi Mohan Manikanta, Pandrangi Veera Sekhara Rao, GanugapantaVenkata Pavan Reddy DOI: https://doi.org/10.46501/IJMTST1002024 |
173-180 | |||
25. | Automated Malware Signature Detection: Develop a System for Signatures to detect malware Authors: B.Venkateswra Reddy, Gurijala Anupama, Thiriveedhi Venkatrao, Thiriveedi Vamsi Krishna, Bala Abhilash Reddy DOI: https://doi.org/10.46501/IJMTST1002025 |
181-186 | |||
26. | Creating a Tool to Detect and Address Security Vulnerabilities in Mobile Applications Authors: P.Premchand, Surarapu Vamsi Kumar Reddy, Sindhe Sree Manaswini, Angajala Pavan Santhosh, Narapati Upendra DOI: https://doi.org/10.46501/IJMTST1002026 |
187-193 | |||
27. | Thermal and Stress Analysis of a Drum Brake by using Functional Graded Materials Authors: Shaik Chand Mabhu Subhani, Pilli Sravani and A.Pavan Kumar DOI: https://doi.org/10.46501/IJMTST1002027 |
194-201 | |||
28. | Smart License Based Vehicle Safety and Security System using IoT Authors: P.V.Omkar, V.Durga Sai, D.Pavan Kumar, K.Jagadeesh, R.Y.V.Jagadeesh DOI: https://doi.org/10.46501/IJMTST1002028 |
202-206 | |||
29. | Modelling and Reinforcement of a Heavy Vehicle Leaf sprig for the Material Glasses Carbon Composite Authors: Gandhi.P, Praveen Kumar.B, Venkata Kumar.B, Venkata Gopi. V, Venkata Pavan Kumar.V, Akhil Reddy.Ch DOI: https://doi.org/10.46501/IJMTST1002029 |
207-215 | |||
30. | Design & Static Analysis of Cam Shaft in Automobile Engines Authors: Gandhi.P, Sai Krishna.P, Venkata Pavan.A, Jagadeesh.Ch, Manoj.M, Mahesh.K DOI: https://doi.org/10.46501/IJMTST1002030 |
216-226 | |||
31. | Structural Analysis of Gas Turbine Rotor Blade at Different Pressure Loads Authors: Kiran.G, Imran.SK, Prakash.B, Rajesh.K, Santhosh Vardhan.V, Teja.L DOI: https://doi.org/10.46501/IJMTST1002031 |
227-237 | |||
32. | Modelling and Analysis of Main Shaft of a Two Wheeler Authors: Kiran.G, Abdul Rahaman.SK, Venkatesh.N, Mansur Ahmad.SK, Krishna Gangadhar.P DOI: https://doi.org/10.46501/IJMTST1002032 |
238-249 | |||
33. | Delination and Analysis of Non Inflated Tyres with ANSYS Authors: Venkateswara Rao.K, Bhavani Shankar.M, Vamsi Krishna.V, Vishnu.K, Anil Kumar.K DOI: https://doi.org/10.46501/IJMTST1002033 |
250-264 | |||
34. | IoT Based ICU Patient Monitoring System Authors: Sai Srinivas Vellela, G Varshitha, V Suresh, V Sai Vineeth, L Venkata Suresh DOI: https://doi.org/10.46501/IJMTST1002034 |
265-273 | |||
35. | IoT Based Street Light Controller and Monitoring system Authors: G Sudha Rani, G Naveen Kumar, I Anusha, M Venkata Jyothi, P Niteesh Kumar DOI: https://doi.org/10.46501/IJMTST1002035 |
274-281 | |||
36. | Detecting Harmful Gases: Technologies and Applications Authors: Khader Basha Sk, B Priyanka, K Thathaji, SK Sandhani, A Adithya Reddy DOI: https://doi.org/10.46501/IJMTST1002036 |
282-290 | |||
37. | IoT-Based Tank Water Monitoring Systems: Enhancing Efficiency and Sustainability Authors: Sai Srinivas Vellela, B Venkatesh Babu, D Mahendra, Y Bharat DOI: https://doi.org/10.46501/IJMTST1002037 |
291-298 | |||
38. | Impact of Agro chemicals on Agriculture and Environment : A Review Authors: Dr. Dhirendra Singh DOI: https://doi.org/10.46501/IJMTST1002038 |
299-304 | |||
39. | A Comprehensive Review of AI Techniques in Serious Games: Decision Making and Machine Learning Authors: Dr Bhashyam Krishna Mohan, Dr.Vasantha Rudramalla, Peravali Surekha, Dr. Naga Malleswara Rao Purimetla, B Murali Krishna and Sai Srinivas Vellela DOI: https://doi.org/10.46501/IJMTST1002039 |
305-311 | |||
40. | Predictive Modeling for Early Reviewer Engagement: Optimizing Online Product Marketing Strategies Authors: Dr.Vasantha Rudramalla, Dr. Bhashyam Krishna Mohan, B MuraliKrishna, SaiSrinivas Vellela, Peravali Surekha and Dr. Naga MalleswaraRao Purimetla DOI: https://doi.org/10.46501/IJMTST1002040 |
312-318 | |||
41. | Smart Wheel Chair Authors: Dr. P. Venkata Rao, G. Krupa Rani, K. Vinodh Kumar, B. Sandeep, G. Ajay Kumar DOI: https://doi.org/10.46501/IJMTST1002041 |
319-323 | |||
42. | IoT Based Advanced Automatic Toll Collection and Vehicle Detection System Authors: Dr. D Naga Ravi Kiran, Gorantla Swetha, Dasari Lakshmi Annapurna, Chandu Venkatasai Teja, Avvaru Karthik Subhash DOI: https://doi.org/10.46501/IJMTST1002042 |
324-328 | |||
43. | A Parametric Approach Using Active Shape Models for Facial Landmark Detection Authors: Aswani Lalitha, Irri Vijaya Lakshmi, Dasari Sri Ram, Balla Hemanth, Jammula Ganesh DOI: https://doi.org/10.46501/IJMTST1002043 |
329-335 | |||
44. | Fire Detection and Management System for Industries Based on IoT Authors: Shaik Mastan Basha, Kakustam Prasanna, Gayam Mahesh Reddy, Kandrukonda Addaiah, Kandula Obul Reddy DOI: https://doi.org/10.46501/IJMTST1002044 |
336-341 | |||
45. | Design and Implementation of Verilog-Based Subway Ticketing System Authors: A Raja, Gottimukkala Pavithra, Ambarapu Vamsi Kiran, Kalluri Balarama Chandrudu, Komera Leela Venkata Ashok Kumar DOI: https://doi.org/10.46501/IJMTST1002045 |
342-348 | |||
46. | A Face Recognition Method for Security Applications in Smart Homes and Cities Authors: Dr. D Naga Ravi Kiran, Karasani Yasaswi Mani Kumari, Konidala Sailakshmi, Chittela Venkata Akhil, Daggubati Narendra DOI: https://doi.org/10.46501/IJMTST1002046 |
349-353 | |||
47. | Space-Grade VLSI Implementation: Error Detection and Correction Codes in Advanced Aerospace Systems Authors: G.Rajesh, Bathineni Yamuna, Boda Thirumala, B Kumbha Mani Kumar, Achala Venkata Gopi DOI: https://doi.org/10.46501/IJMTST1002047 |
354-361 | |||
48. | A Novel Approach to reduce Energy/Power in a Parallel Decimal Multiplier Authors: RH Naik, Challa Venkateswarlu, Konidela Siva Nagalakshmi, Chitteti Venkatesh, Dunna Raja Aseessu DOI: https://doi.org/10.46501/IJMTST1002048 |
362-368 | |||
49. | An Efficient Low-Power Redundant-Transition-Free TSPC Dual-Edge-Triggering Flip-Flop using Single – Transistor-Clocked Buffer Authors: Dr. P Bala Murali Krishna, Jallepalli Kalyani, Yelisetti Thirumala Venkatesh, Vemasani Balaji, Tanneru Umamaheswari, Yajali Srivalli DOI: https://doi.org/10.46501/IJMTST1002049 |
369-376 | |||
50. | Secure Visual Data Processing: Image Encryption and Decryption through Reversible Logic Gates in VLSI Design Authors: Dr. D Naga Ravi Kiran, Oruganti Bhaskar Reddy, Repalle Sitha Mahalakshmi, Tiruvaipati Lakshmi Chaitanya Kumar, Sonti Priyathama Siva Krishna DOI: https://doi.org/10.46501/IJMTST1002050 |
377-387 | |||
51. | Xilinx-Enhanced Electronic Voting Machine with Advanced Security Features Authors: Raju Thommandru, Sanka Deekshitha, Sireesha Adapa, Pasala Sarath Babu, Mohammad Riyaz Pashi DOI: https://doi.org/10.46501/IJMTST1002051 |
388-393 | |||
52. | Verilog-Based Solution for Multi-Vehicle Parking Authors: S Sree Chandra, Chamakura Pavani, Tammineni Thirumalarao, Perla Srilekha, Tripuraneni Sireesha DOI: https://doi.org/10.46501/IJMTST1002052 |
394-400 | |||
53. | GSM Based Heart attack Detection and Heart Rate Monitoring System Authors: D Prabhakar, Reddymasu Jagadeesh, Palukuri Supraja, Velchuri Vivek, Velpuri Gopi DOI: https://doi.org/10.46501/IJMTST1002053 |
401-406 | |||
54. | A Wearable Sensor Network System for IoT- Connected Safety and Health Applications Authors: Shaik Subhani, Shaik Mastan Vali, Pallempati Anusha, Seshagiri Lakshmi Narasimhasuri, Para Naga Prasanth DOI: https://doi.org/10.46501/IJMTST1002054 |
407-411 | |||
55. | Autonomous Fault Recovery in Network-on-Chip: A Self-Repairing Router Paradigm for Enhanced Performance Authors: G Rajesh, Venigandla Narendra, Pillutla Maheswari, Yeti Vamsi Krishna, Pallepogu Madhuri DOI: https://doi.org/10.46501/IJMTST1002055 |
412-420 | |||
56. | Next-Gen Food Orders: Dialogflow Integration Authors: Manoah.J, Dharesh Kumar.N.S, Kipson.A.J, Indumathi.K DOI: https://doi.org/10.46501/IJMTST1002056 |
421-428 | |||
57. | Double Text Data Compression: New LZW Algorithm with Bit Reduction Algorithm Authors: N Srinivasa Rao, M Praveen Kumar, K Sai Prasanth, Mastanaih Naidu Y DOI: https://doi.org/10.46501/IJMTST1002057 |
429-432 | |||
58. | Multimodal Insights: Analyzing Text, Audio and Comments Summarization Authors: Rahul.J, Yokesh Sharan.K, Kawsigan.S, Prof. Janani.S DOI: https://doi.org/10.46501/IJMTST1002058 |
433-439 | |||
59. | Music Recommendation using Facial Expression – EmoTunes Authors: V.Rajesh Kannan, S.Jeyesh Vishnu, K.Sharvesh Vishnu, R.Jeevarajan DOI: https://doi.org/10.46501/IJMTST1002059 |
440-446 | |||
60. |
Detection of COVID-19 Lung Image Infection using Convolution Neural Network Authors: Lenin Marksia.U, Selvaganesh Srikanth.E, Esakkibabu.D, Dharshan K DOI: https://doi.org/10.46501/IJMTST1002060 |
447-457 | |||
61. | Effective Test Case Generation: A Harmony Search Approach with Mutation Analysis Authors: Hemant Kumar and Vipin Saxena DOI: https://doi.org/10.46501/IJMTST1002061 |
458-463 | |||
62. | Innovative Approaches and Breakthroughs in Brain Tumor Diagnosis through MRI Technology Authors: Shabir Ahmad Rather DOI: https://doi.org/10.46501/IJMTST1002062 |
464-467 | |||
63. | Smart reading companion Authors: Sridevi Dharshini K, Sivaranjani M, Dharshini S, Praveen Kumar Premkamal DOI: https://doi.org/10.46501/IJMTST1002063 |
468-474 | |||
64. | Exploring Machine Learning in Fake News Detection System Authors: K.S.Naveen Arya, M.Subash Kumar, M.Daniel, Dr.G. Nirmala DOI: https://doi.org/10.46501/IJMTST1002064 |
475-478 | |||
65. | AI Powered Automated Video Surveilance and Alarm System Authors: Malaiappansrikanth.S, Ganeshan.M, Nithishkumar.G.R, Prof. Janani.S, DOI: https://doi.org/10.46501/IJMTST1002065 |
479-483 | |||
66. | A Novel Solution the Social Media Privacy Checker Designed To Empower Users with the Ability to Assess Authors: Dr.D.Kalyankumar, GottumukkalaVeeraVenkata Naveen, Kalyani Vallapuneni, Nallapaneni Sravan Sudheer DOI: https://doi.org/10.46501/IJMTST1002066 |
484-490 | |||
67. | A Robust Password Strength Assessment Tool Capable of Evaluating the Resilience of Passwords against Dictionary Attacks Authors: B.Venkateswra Reddy, Mohammad Sohail Parvez, Chintha Naga Vamsi, Muli Madhan Kumar Reddy, GaneshanaVenkata Rami Reddy DOI: https://doi.org/10.46501/IJMTST1002067 |
491-496 | |||
68. | NPSO-based Pattern Synthesis of Uniformly Spaced Circular Array Antenna Authors: T.V.S Jyothi Swaroop, P. Hari Venkat, T. Gopi Hemanth, Sk. Fatema Tabassum Hassan DOI: https://doi.org/10.46501/IJMTST1002068 |
497-502 | |||
69. | Design of Stacked Patch Antenna Authors: Naga Sai Krishna.B, Sai Sasank Naik.D, Syam Krishna Prasad.A, Hemanth.A DOI: https://doi.org/10.46501/IJMTST1002069 |
503-507 | |||
70. | Unmasking Deep Fakes Using Neural Network Authors: Tejaswi.K, PushpaLatha.M, Raziya Sulthana.SK. DOI: https://doi.org/10.46501/IJMTST1002070 |
508-519 | |||
71. | Detection of CT-image of COVID-19 using deep learning Authors: Lenin Markshia.U, Siva sankar.C, Nawfal Nizam.R, Ramasamy.R, Vishnu Kumar.H, DOI: https://doi.org/10.46501/IJMTST1002071 |
520-525 | |||
72. | IOT-Based Indoor Air Quality Monitoring System Authors: S.Santhi Priya, Srivallika.K, Venkata Charan.M, Durga.S, Bhargav.K DOI: https://doi.org/10.46501/IJMTST1002072 |
526-530 | |||
73. | Road Accident Rescue System Implementation Authors: Dr.P.Ratna Babu, Naga Lakshmi Parvathi.P, Bhavana.P, Hemanth.M, Lavanya.M DOI: https://doi.org/10.46501/IJMTST1002073 |
531-535 | |||
74. | Coal Mine Safety Monitoring and Warning Device Authors: A.Srinivas, Meghana.K, Sri Vivek.G, Bhanu Prakash.A, Alekhya.T DOI: https://doi.org/10.46501/IJMTST1002074 |
536-539 | |||
75. | Smart Visitor Counter Authors: B Rajeev Gandhi, Chadalawada Pallavi, Eppa Jagadeeswar, Attuluri Manisha, Jagarlamudi Satish DOI: https://doi.org/10.46501/IJMTST1002075 |
540-543 | |||
76. | Blow Comsetion of Asthma using IoT Authors: S Srinivasa Rao, Yagnesh. A, Sowmya.B, Yasin.Sk, Charan.S DOI: https://doi.org/10.46501/IJMTST1002076 |
544-547 | |||
77. | Drip Irrigation System Using Wireless Control Valve Acutation with Solar Power Authors: Dr. Keerthipati Kumar, D. Lavanya and K. Nagendra Rao DOI: https://doi.org/10.46501/IJMTST1002077 |
548-553 | |||
78. | Estimation of Parameters of U-Quadratic Distribution by using Weighted Least Squares (WLS) Authors: Raghavaiah, Dr. N. Viswam, Dr. K. Srinivasa Rao, S. Bhavishya DOI: https://doi.org/10.46501/IJMTST1002078 |
554-562 | |||
79. | Smart Shoe for Blind People Authors: S Santhi Priya, Satwik.CH, Maruthi. B, Surya Kiran. G DOI: https://doi.org/10.46501/IJMTST1002079 |
563-568 | |||
80. | IOT Color Based Object Sorting Machine Authors: P. Sri Vidya, Sai Sowmya. B, Karthik.K, Yaswanth.N, Naga Gopal Sai Ganesh Reddy. G DOI: https://doi.org/10.46501/IJMTST1002080 |
569-573 | |||
81. | Smart Keychain Device Authors: P Susmitha Vadana, Sri Harshini.M, Vijay Prasanth Babu.K, Bhaskar.B, Shiva Sai.K, DOI: https://doi.org/10.46501/IJMTST1002081 |
574-579 | |||
82. | An IOT Based Smart Garbage Alert System Authors: S.Srinivasa Rao, Nikhil.M, Vamsi Krishna.T, Mohammed Jabeer.SK, Pavithra Chowdary.N DOI: https://doi.org/10.46501/IJMTST1002082 |
580-586 | |||
83. | LPG Leakage Detection and Prevention System Authors: B.Rajeev Gandhi, Sathwik.Ch, Yasmine Seema.Sk, Dinesh.Y, Lakshmi.Y DOI: https://doi.org/10.46501/IJMTST1002083 |
587-591 | |||
84. | Smart Gloves IoT Device Authors: A Srinivas, Surya P, Harish K, Naga Raju D, Lahari V DOI: https://doi.org/10.46501/IJMTST1002084 |
592-597 | |||
85. | Greenhouse Monitoring and Controlling Device Authors: S.Santhi Priya, Anjali.K, Abdul Mohammed.Sk, Kusuma. K, Pavan Kumar.A DOI: https://doi.org/10.46501/IJMTST1002085 |
598-602 | |||
86. | Paralysis Patient Health Care Device Authors: P.Sri Vidya, Mahaboob Basha.SK, SriLakshmi Prasanna.T, Kalyani.K, Mahesh Babu.G DOI: https://doi.org/10.46501/IJMTST1002086 |
603-609 | |||
87. | Smart Car Parking Device using Sensors Networks Authors: Dr. P. Ratna Babu, Vijay Gopal.CH, Aparna.K, Vamsi.P, Rani.D DOI: https://doi.org/10.46501/IJMTST1002087 |
610-616 | |||
88. | Economic Condition in the Mughal Empire Authors: Dr. Reeta Rani DOI: https://doi.org/10.46501/IJMTST1002088 |
616-622 | |||
89. | Spermatophytic Flora of the SBD Govt. College Campus, Sardarshahar, Churu Dist., Rajasthan State Authors: Dr. Siddhi Gupta DOI: https://doi.org/10.46501/IJMTST1002089 |
623-626 | |||
90. | Design and Implementation of Secured Contactless Doorbell Authors: P Susmitha Vadana, Srilakshmi.R, Phaniswathi.K, Mahendhra.D, Raja.D DOI: https://doi.org/10.46501/IJMTST1002090 |
627-631 |