S.No | Title | Page No | Download |
IJIT 20 | IOT Based Substation Automation Authors:G. SIVA, CH. VAMSIKRISHNA, P. SAIKUMAR, SK. KHADAR VALLI, D. JOSEPH |
89-90 |
Download |
IJIT 21 | Design and Implementation of TerrorBot for Detect Terrorists and Soldiers Authors:G. GANESH REDDY, K. ASHOK REDDY |
92-95 |
Download |
IJIT 22 | Vehicle-To-Grid Technology in Microgrid using Fuzzy Logic Authors:S. PAVAN KUMAR, DR. A. PURNA CHANDRARAO |
96-99 |
Download |
IJIT 23 | Efficient of Multicast Wireless NOC Architecture by using Hammer Protocol Authors:S. WASIM AKRAM, G. JYOSHNA |
100-105 |
Download |
IJIT 24 | Towards Artificial Intelligence Multiple Cloud Framework Authors:R. SHILPA, P. R. RAJESH KUMAR |
106-110 |
Download |
IJIT 25 | Simulation of Variable Refrigerant Flow Air Conditioning System in Heating Mode Combined with Outdoor Air Processing Unit Authors:MD TARIQUE ANWAR, RAZA AHMED KHAN, MOHAMMAD ABRAR HUSSAIN |
111-116 |
Download |
IJIT 26 | Power Quality Control using D-Statcom in 33KV Distribution Systems Authors:J. DHANAPAL, S. SENTHIL |
117-121 |
Download |
IJIT 27 | Design And Analysis of A Novel Secure Cognitive Terrestrial Satellite Communication System using Joint Beamforming Approach Authors:SK. ASHRAF ALI, JABEENASHAIK |
122-125 |
Download |
IJIT 28 | Conserving Impact On Two Wheeler Helmet with Phase Change Substance Authors:MITTA MANIDEEP REDDY, A. HARSHA VARDHAN REDDY |
126-131 |
Download |
IJIT 29 | Inspect Free Cloud Storage Via Contradictable Trait Based Encryption Authors:D. MURALI, J. HARITHA |
132-137 |
Download |
IJIT 30 | Complex Wavelet Transform based Audio Steganography in Image Authors:J. SOMASEKHAR, M. CHENNAIAH, T. CHAKRAPANI, K. SUDHAKAR |
138-142 |
Download |
IJIT 31 | Integrate Approach Authority for Encrypted Between Data Owner And Cloud-Side in Cloud Storage Authors:D. MURALI, CH. SINDHU |
138-140 |
Download |