S.No | Title | Page No | Download |
IJIT 338 | Behavioral Malware Detection in DTNs Authors:K. HARISH KUMAR, T. PRAVEEN KUMAR |
1874-1878 |
Download |
IJIT 339 | Securing Smart Grid by using Machine Learning Methods Authors:MARYAM MOHAMMED JABRI, SARA ALI |
1879-1888 |
Download |
IJIT 340 | Civilizing Efficiency of Web Illustration Exploration Consequences Using Query Relative Classifier Authors:UROOJ UNNISA, MS.LALITHA |
1889-1895 |
Download |
IJIT 341 | Fuzzy Clustering Technique in Latent Semantics using Web Documents Authors:MOHAMMADI, SUMERA JABEEN |
1896-1900 |
Download |
IJIT 342 | A P2P Proximity-Aware Interest-Clustered File Sharing System Authors:UMAMA SAHER, M.LALITHA, G.VEERANJANEYULU |
1901-1905 |
Download |
IJIT 343 | Effective Resource Allocation for Cooperative Communication using Water Filling Algorithm in LTE Advanced Network Authors:MOHAMMED ABDUL KAREEM, NAZIA PARVEEN |
1906-1909 |
Download |
IJIT 344 | An Asymmetrical Six-Phase Induction Motor Drive Operation using Fuzzy Logic Controller Authors:C N NAGENDRA, V. MALLIKARJUNA REDDY, M. VENKATA KISHORE |
1910-1920 |
Download |
IJIT 345 | A Semantic-Based Adaptive Mobile Video Processing in Social Networks Authors:P. RAVI KUMAR, C.C. KALYAN SRINIVAS |
1921-1926 |
Download |
IJIT 346 | Organizational Innovation Denial of Service Strategy Attacks in Cloud Computing Authors:C.NIKHILA, KAMINENI B T SUNDARI, B.HARIKRISHNA |
1927-1931 |
Download |
IJIT 347 | Proportional Power Sharing in Hierarchical Droop Control with ANFIS Controller for Reactive Power Management in Islanded Micro Grids Authors:N. BRAHMAIAH, N. MANOJ KUMAR |
1932-1937 |
Download |
IJIT 348 | Energy Capable Secure Protocol Supporting for Unstructured Wireless Network Creation Authors:AGARALA JYOTHSNA, S. SIVARAMA KRISHNA |
1938-1942 |
Download |
IJIT 349 | Defeating Jamming with the Power of Silence: A Game-Theoretic Analysis Authors:G.MEGHANA, DR K. SRUJAN RAJU, P.V.SHALINI |
1943-1949 |
Download |
IJIT 350 | HYDRA: Social Identity Relation via Heterogeneous Behavior Modeling Authors:P.ESWARAIAH, PASUPULETI JHANSI |
1950-1956 |
Download |
IJIT 351 | Design-Based Matter for Paper Representation in Data Filtering Authors:ATIYA ANJUM, K SHILPA |
1957-1962 |
Download |
IJIT 352 | A Novel FIFO Design for Image/Video Processing Applications Authors:B. SUNEEL, M. APPARAO, CH. KANTHARAO |
1963-1966 |
Download |
IJIT 353 | Sec-DiDrip: A Distributed Data Dissemination Protocol with Security & Dissemination in WSNs Authors:GANDIKOTA ANUSHA, RACHA REVATHI, NITTALA SWAPNA SUHASINI |
1967-1971 |
Download |
IJIT 354 | Fast nearest Neighbor Browsing & Search with Keywords Authors:PILLI LAXMI PRANATHI, NITTALA SWAPNA SUHASINI |
1972-1976 |
Download |
IJIT 354 | Fast nearest Neighbor Browsing & Search with Keywords Authors:PILLI LAXMI PRANATHI, NITTALA SWAPNA SUHASINI |
1972-1976 |
Download |
IJIT 355 | Energy Efficient Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks with Power Optimization Authors:LAVUDIYA NAGARANI, RACHA REVATHI, NITTALA SWAPNA SUHASINI |
1977-1981 |
Download |
IJIT 356 | Using Multiple Data Stores in the Cloud: An Overview Authors:KOTTURU RAJANI1, BACHINA.VARSHA, NITTALA SWAPNA SUHASINI |
1982-1986 |
Download |