S.No | Title | Page No | Download |
IJIT 377 | Regulating of Meters Distantly using Zigbee and Unwired Products Authors:SURESH BALLALA, V. VARALAKSHMI, S.SREENU, DR. I. SATYANARAYANA |
2074-2076 |
Download |
IJIT 378 | Finding Malicious Facebook Applications: Using FRAppE Authors:ADAPALA SUNEETHA, P.KRISHNACHAITANYA |
2077-2080 |
Download |
IJIT 379 | A New Transformer less Closed Loop Control of a High Step-Down Conversion Ratio DC-DC Converter with Low Switch Voltage Stress Authors:K.BHARATHI, PRAVEEN |
2081-2086 |
Download |
IJIT 380 | Undesirable Communication from OSN Customers on Satisfied Distribution Websites Authors:P.SWATHI, S. SIVA RAMA KRISHNA |
2087-2092 |
Download |
IJIT 381 | Word Arrangement Model for Mining Estimation Objects and Estimation Expressions from Private Item Sets Authors:SUSHMA V, RAMA ARPITHA K |
2093-2097 |
Download |
IJIT 382 | Document Modeling in Information Filtering for Multi-Label Classification Authors:KALAVAKOLU MUNI SEKHAR, C. GOVARDHAN |
2098-2102 |
Download |
IJIT 383 | Finding of Ranking Fraud for Mobile Apps Authors:MOHD IRFAN, E. RAVI |
2103-2106 |
Download |
IJIT 384 | 3D Layout Extraction Based on Point-Cloud Method Authors:AVILELI ROJA, S. CHAKRI SREEDHAR |
2107-2110 |
Download |
IJIT 385 | Literature On A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces: Smart Crawler Authors:SHAIK KHADAR BASHA, T.KISHORE BABU |
2111-2114 |
Download |
IJIT 386 | Face Recognition using Local Ternary Pattern Authors:SYED ATHER HASSAN, AYESHA NAAZ |
2115-2120 |
Download |
IJIT 387 | Motion Sensing Based Intelligent Management System for Surveillance Authors:J. MONA, G. VINATHA |
2121-2125 |
Download |
IJIT 388 | Automotive Collision Avoidance System Using Controller Area Network Authors:CH. PALLAVI, K. NISHAKAR |
2126-2129 |
Download |
IJIT 389 | An Improvised Authentication Key Exchange Protocols Designed for PNFS Authors:MOHD AHSAN HUSSAIN, MD ATEEQ UR RAHMAN |
2130-2133 |
Download |
IJIT 390 | Secure Routing for Wireless Sensor Networks using Caser Protocol Authors:TAYYABA TAMKEEN, AMENA SAYEED |
2134-2140 |
Download |
IJIT 391 | A Review on Circuit Ciphertext-Policy Attribute-Based Hybrid Cryptography with Verifiable Delegation in Cloud Computing Authors:B.MURALIKRISHNA, SRAVANI S V K |
2141-2144 |
Download |
IJIT 392 | The Multiple-Key Cryptography-Based Distributed Certificate Authority in Mobile Adhoc Networks Authors:ZEBA FATIMA, K. SHILPA |
2145-2150 |
Download |
IJIT 393 | Capable Inquiry Services in the Cloud with Information Wireless Networks Authors:PAVAN KUMAR E.G, S.SWETHA |
2151-2155 |
Download |
IJIT 394 | Influence Factor Based Opinion Mining of Data using Supervised Learning Authors:SABIHA RAZZAK, SUMERA JABEEN |
2156-2160 |
Download |
IJIT 395 | Lossless and Reversible Data Hiding of Encrypted Images Authors:DR.M.RAMANA REEDY, A.RAMAKRISHNA |
2161-2164 |
Download |
IJIT 396 | Multi Data Sharing for Efficient Public Integrity in the Cloud Authors:AMEENA BEGUM, LALITHA, A.BAKIYA LAKSHMI |
2165-2171 |
Download |