S.No | Title | Page No | Download |
IJIT 278 | Perspective Based Aggregation Method for Evaluating the Credibility of Leading Sessions from Mobile Apps Authors:D. AMEER SUHEL, KUMBHA RAMESH |
1544-1546 |
Download |
IJIT 279 | Solving Integrity Verification in Cloud Storage Authors:G. LAVANYA, KUMBHA RAMESH |
1547-1549 |
Download |
IJIT 280 | A Rapid Technique to Type-Combination Queries for Colossal-Scale Ontologies in Big Data Environments Authors:ARUN KUMAR T, K. RAMESH, K.SWAPNA SUDHA |
1550-1554 |
Download |
IJIT 281 | Major Abilities Collection Making Use of Modeling and Analytical Structure for Sensing Program on Map Reduce Framework Authors:A.VINAY KUMAR, K. RAMESH, K.SWAPNA SUDHA |
1555-1564 |
Download |
IJIT 282 | Efficient and Privacy Aware Data Aggregation in Mobile Sensing Authors:RUBINA NEHA, SHAISTA NOUSHEEN, KHADARBI SHAIK |
1565-1570 |
Download |
IJIT 283 | Trustworthy Resource Scheduling in Cloud using Skewness Algorithm Authors:RENUKA N HUCHHE, GAYATRI M BHANDARI |
1571-1573 |
Download |
IJIT 284 | Dual Tree Complex Wave Transform using Bootstrap Method for Noise Reduction Authors:I. KULLAYAMMA, B. RAMADEVI |
1574-1580 |
Download |
IJIT 285 | Discovery of Neighborhood Location Query Based Spatial Networks Authors:T.VENKATA REDDY, KLNC.PRAKASH, A.SUBRAMANYAM |
1581-1584 |
Download |
IJIT 286 | Enabling Evidence of Recoverability in Cloud Storage with Source Managed Gadgets Authors:G.BHARGAVI, B.DHANA LAKSHMI |
1585-1588 |
Download |
IJIT 287 | Cloud Computing Platform using Data Sharing in the Secure Groups Authors:M. KEERTHI, B. BHARATH KUMAR |
1589-1595 |
Download |
IJIT 288 | Best Possible Matched Patterns for Record Modeling in Expertise Filtering Authors:D. J. SWETHA KIRAN, S. VENKATALAKSHMI |
1596-1602 |
Download |
IJIT 289 | Minimizing Consistent Querying in Mobile Cloud Expertise Authors:K.CHARITHAKEERTHI, C.SUDARSANA REDDY |
1603-1606 |
Download |
IJIT 290 | A Fuzzy Based Voltage Source Control of PV Inverting System in a CERTS Microgrid Authors:D. DASTAGIRI, M.VENKATA KISHORE, P. RESHMA |
1607-1612 |
Download |
IJIT 291 | Obtain Opinions from Online Reviews Based On the Trust Authors:M.SREENIVASULU, M.M.VENKATA CHALAPATHI, A.SUBRAMANYAM |
1613-1619 |
Download |
IJIT 292 | Mutual Access Control for Continuous Vicinity Based Services Authors:D.SURESH, K.UDAY KUMAR REDDY, A.SUBRAMANYAM |
1620-1624 |
Download |
IJIT 293 | Secure Data Communication using Token Generation Authors:K. B. RAMAMADDILETI, T. ADITYA SAI SRINIVAS |
1625-1627 |
Download |
IJIT 294 | A Novel Index for Image Quality Assessment Based on GMS Method Authors:K. RAMUDU, Y. SAMPATH KUMAR |
1628-1630 |
Download |
IJIT 295 | Discovery of Neighborhood Location Query Based Spatial Networks Authors:T. VENKATA REDDY, K. L. N. C. PRAKASH, A. SUBRAMANYAM |
1631-1634 |
Download |
IJIT 296 | DBR Controlled STATCOM to Improve Voltage Stability in Wind Power System Authors:T. SRIPAL REDDY, G. RAVI, K. VINOD KUMAR |
1635-1638 |
Download |
IJIT 297 | Fuzzy Controller Based Power Quality Improvement of UPQC Fed Grid Integration of PV System Authors:T. SRIPAL REDDY, G. RAVI, Y. HIMABINDU |
1639-1645 |
Download |