S.No | Title | Page No | Download |
IJIT 223 | Secure Authorized Deduplication in Hybrid Private and Public Clouds Authors:GANESH. K, ARJUN. K |
1245-1249 |
Download |
IJIT 224 | Demand Driven Differential Queries Service and Cost-Efficient Clouds Authors:E. UMA MANJU SREE, B. SESHAGIRI |
1250-1256 |
Download |
IJIT 225 | Power Quality Improvement in Microgrid using Advanced Active Power Conditioner Authors:M. PARSHARAMULU, BHANU GANESH LUKKA |
1257-1261 |
Download |
IJIT 226 | Child Activity Recognition Based On Cooperative Fusion Model of A Triaxial Accelerometer and A Barometric Pressure Sensor Authors:CH. SUSHMA, DR. D. SUBBA RAO, N. SIVAKUMAR |
1262-1264 |
Download |
IJIT 227 | Automatic Ambulance Rescue System Authors:D. SPANDANA, DR. D. SUBBA RAO, M.PUSHPALATHA |
1265-1270 |
Download |
IJIT 228 | Enhancing Efficient Discovery of Variations under Distributed Data Authors:SANA TAZHYEEN, T. SAI KUMARI, SALEHA FARHA |
1271-1276 |
Download |
IJIT 229 | Power Quality Improvement by using Shunt Active Power Filter and Thyristor Controlled Reactor Authors:A.N.DIVYAVANI, JASMINE JABBARAJ |
1277-1282 |
Download |
IJIT 230 | ZCS Phase shift PWM Full-Bridge DC–DC Converter with Simple Auxiliary Circuits Authors:SURESH KUMAR, AMARNATH NAIDU |
1283-1288 |
Download |
IJIT 241 | Control of a Transformer less High Step-Up DC–DC Converter by using Cascade Cockcroft–Walton Voltage Multiplier Authors:CHENNAMPALLI PRATAP, J. NAGARAJU, A. HEMA SEKHAR |
1351-1356 |
Download |
IJIT 231 | Extracting Interesting Patterns for Large Volumes of Data Secured Verification Authors:MADHAVARAO BATTERI, HARISH PRAGADA |
1289-1293 |
Download |
IJIT 232 | Multi Authority Privacy Protection for Published Data Authors:R. LEELA PHANI KUMAR, S. RENUKA |
1294-1297 |
Download |
IJIT 233 | Analyzing Consumer Buying Behavior Authors:R. SARADA, T. A. JYOTHI |
1298-1303 |
Download |
IJIT 234 | Inferred Flow Based Method for Scrutiny of Contained Relationship of Wikipedia Authors:B. V. BALAJI, U. KASI ANNAPURNA |
1304-1311 |
Download |
IJIT 235 | Preventing Sensitive Information in Individualized Web Search Authors:SUREKHA VEERABATTULA, LEELAVATHI AREPALLI |
1312-1316 |
Download |
IJIT 236 | Dynamic Data Clustering using Transaction Sensitive Sliding Window Authors:KAVYA SRI VEGIREDDY, LEELAVATHI AREPALLI |
1317-1320 |
Download |
IJIT 237 | Mining High Utility Item Sets Authors:A. LEELAVATHI, YERRAGOGU DANA SURESH |
1321-1325 |
Download |
IJIT 238 | Extend-Founded Network Efficient Information Entry in Disruption Tolerant Networks Authors:G. SHANKAR RAO, T. RAMESH |
1226-1230 |
Download |
IJIT 239 | An Web of Everything Enabler Neighbor Search With Key Words Authors:R. RAMYA SREE, N. SWAPNA SUHASINI |
1231-1236 |
Download |
IJIT 240 | A Framework of Adaptive Cell Video Streaming Anonymous Profile Matching In Cellular Social Networks Authors:D. LAKSHMI THRIVENIE, R. REVATHI |
1237-1246 |
Download |
IJIT 241 | Providing Privacy for Location in an Internet of Everything Enabler Authors:SACHIN BANDI, R. REVATHI |
1247-1252 |
Download |