S.No | Title | Page No | Download |
IJIT 203 | Understanding Taxi Service Strategies from Taxi GPS Traces Authors:Y. NARESH, D. SUBBA RAO 2, SWAPNA KUMARI. B |
1118-1124 |
Download |
IJIT 204 | A Pack Scheming Design Based on Partitioning for Dispersed Information in the Cloud Authors:ANAND KUMAR MANOHAR, D.LAVANYA |
1125-1129 |
Download |
IJIT 205 | A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations Authors:R.V.RAMANA KUMAR, S.NARAYANA REDDY |
1130-1136 |
Download |
IJIT 206 | An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System Authors:B. MADHU KRISHNA, B. SREEDHAR |
1137-1142 |
Download |
IJIT 207 | Autonomous All-Terrain Vehicle using CAN Bus Authors:MANCHIREDDY DIVYA, D. SUBBA RAO, NAGARAJA NAIK. V |
1143-1147 |
Download |
IJIT 208 | Novel Implementation of LMS Adaptive Algorithm for High Speed and Low Complexity Authors:P. SHEKAR REDDY, T. GOPI, D. SUBBA RAO |
1148-1153 |
Download |
IJIT 209 | Automated Irrigation System using a Wireless Sensor Network and GPRS Module Authors:V. MAHESH, D. SUBBA RAO, S. SUBBANNA |
1154-1160 |
Download |
IJIT 210 | Improve the Performance of Security for Attribute-Based Data Sharing Based on Privacy Preserving Techniques Authors:B.LAXMAIAH, N. LAXMI PRASANNA |
1161-1165 |
Download |
IJIT 211 | Preserving of Public Auditing for Shared Cloud Data Authors:HUSSEIN ALI GHADHBAN, M. YESURATNAM |
1166-1169 |
Download |
IJIT 212 | A Novel Pervasive Computing for Mobile Based on Efficient Authentication System Authors:SAMEENA YOUSUFF, D. WASIHA TASNEEM |
1170-1172 |
Download |
IJIT 213 | Implementation of Graphical Passwords for Novel Security Primitive Based on Captcha Authors:G.UDAYSREE, M.PRASANNA |
1173-1179 |
Download |
IJIT 214 | Implementation of Data Integrity Protection in Regenerating-Coding-Based Cloud Storage Authors:ALYAA ABDULJAWAD MAHMOOD, S. SRAVANTHI |
1180-1189 |
Download |
IJIT 215 | Protected Data Recovery for Decentralized Disruption Tolerant Military Network Authors:A.VIJAYALAKSHMI, K. ARJUN |
1190-1195 |
Download |
IJIT 216 | Privacy Preserve Mining of Association Rules in Horizontally Distributed Databases Authors:KHALID AMJED MOHAMMED, T. RAMDAS NAIK |
1196-1200 |
Download |
IJIT 217 | Doubly Fed Induction Machine-Based Wind Turbines under Voltage Dips and Without Crowbar Protection for Direct Torque Control Authors:RANAPANGU RAJEEV KUMAR, BHANU GANESH LUKKA |
1201-1204 |
Download |
IJIT 218 | A Novel Procedure for Facts Anonymization of Access Control Computing Device for Relational Information Authors:J. JAYASREE, N. SWAPNA SUHASINI |
1205-1208 |
Download |
IJIT 219 | Improved Double Line Voltages Synthesis Strategies of Matrix Converter for Input/Output Quality Enhancement Authors:VAGALAGANI NAGENDAR GOUD, SHAMBU PRASAD, DR. J. BAGWAN REDDY |
1209-1219 |
Download |
IJIT 220 | Using Fuzzy Logic Manage to Furnish Sensible Detection in Extend Tolerant Networks Authors:K. GOPALA KRISHNA, S. RAVI KIRAN |
1220-1224 |
Download |
IJIT 221 | Control of Reduced-Rating Dynamic Voltage Restorer with Battery Energy Storage System Authors:TANGELLA VARUN KUMAR, SRINIVASARAO GARNEPUDI, DR.J.BHAGWAN REDDY |
1225-1233 |
Download |
IJIT 222 | Excitation Synchronous Wind Power Generators with Maximum Power Tracking Scheme Authors:M. VEENA, BUKKA NAVYA SREE, DR. J. BAGWAN REDDY |
1234-1244 |
Download |