• Home
  • About
  • Call for Paper
  • Guidelines
  • E-Board
  • Conference
  • Publication
  • Download
  • Contact

ISSUES

IJIT ISSUE 7
IJIT ISSUE 20
IJIT ISSUE 19
IJIT ISSUE 18
IJIT ISSUE 17
IJIT ISSUE 16
IJIT ISSUE 15
IJIT ISSUE 14
IJIT ISSUE 13
IJIT ISSUE 12
IJIT ISSUE 11
IJIT ISSUE 10
IJIT ISSUE 9
IJIT ISSUE 8
IJIT ISSUE 7
IJIT ISSUE 6
IJIT ISSUE 5
IJIT ISSUE 4
IJIT ISSUE 3
IJIT ISSUE 2
IJIT ISSUE 1

PUBLISHED ARTICLES

S.No Title Page No Download
IJIT 377

Regulating of Meters Distantly using Zigbee and Unwired Products

Authors:SURESH BALLALA, V. VARALAKSHMI, S.SREENU, DR. I. SATYANARAYANA

2074-2076

Download
       
IJIT 378

Finding Malicious Facebook Applications: Using FRAppE

Authors:ADAPALA SUNEETHA, P.KRISHNACHAITANYA

2077-2080

Download
       
IJIT 379

A New Transformer less Closed Loop Control of a High Step-Down Conversion Ratio DC-DC Converter with Low Switch Voltage Stress

Authors:K.BHARATHI, PRAVEEN

2081-2086

Download
       
IJIT 380

Undesirable Communication from OSN Customers on Satisfied Distribution Websites

Authors:P.SWATHI, S. SIVA RAMA KRISHNA

2087-2092

Download
       
IJIT 381

Word Arrangement Model for Mining Estimation Objects and Estimation Expressions from Private Item Sets

Authors:SUSHMA V, RAMA ARPITHA K

2093-2097

Download
       
IJIT 382

Document Modeling in Information Filtering for Multi-Label Classification

Authors:KALAVAKOLU MUNI SEKHAR, C. GOVARDHAN

2098-2102

Download
       
IJIT 383

Finding of Ranking Fraud for Mobile Apps

Authors:MOHD IRFAN, E. RAVI

2103-2106

Download
       
IJIT 384

3D Layout Extraction Based on Point-Cloud Method

Authors:AVILELI ROJA, S. CHAKRI SREEDHAR

2107-2110

Download
       
IJIT 385

Literature On A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces: Smart Crawler

Authors:SHAIK KHADAR BASHA, T.KISHORE BABU

2111-2114

Download
       
IJIT 386

Face Recognition using Local Ternary Pattern

Authors:SYED ATHER HASSAN, AYESHA NAAZ

2115-2120

Download
       
IJIT 387

Motion Sensing Based Intelligent Management System for Surveillance

Authors:J. MONA, G. VINATHA

2121-2125

Download
       
IJIT 388

Automotive Collision Avoidance System Using Controller Area Network

Authors:CH. PALLAVI, K. NISHAKAR

2126-2129

Download
       
IJIT 389

An Improvised Authentication Key Exchange Protocols Designed for PNFS

Authors:MOHD AHSAN HUSSAIN, MD ATEEQ UR RAHMAN

2130-2133

Download
       
IJIT 390

Secure Routing for Wireless Sensor Networks using Caser Protocol

Authors:TAYYABA TAMKEEN, AMENA SAYEED

2134-2140

Download
       
IJIT 391

A Review on Circuit Ciphertext-Policy Attribute-Based Hybrid Cryptography with Verifiable Delegation in Cloud Computing

Authors:B.MURALIKRISHNA, SRAVANI S V K

2141-2144

Download
       
IJIT 392

The Multiple-Key Cryptography-Based Distributed Certificate Authority in Mobile Adhoc Networks

Authors:ZEBA FATIMA, K. SHILPA

2145-2150

Download
       
IJIT 393

Capable Inquiry Services in the Cloud with Information Wireless Networks

Authors:PAVAN KUMAR E.G, S.SWETHA

2151-2155

Download
       
IJIT 394

Influence Factor Based Opinion Mining of Data using Supervised Learning

Authors:SABIHA RAZZAK, SUMERA JABEEN

2156-2160

Download
       
IJIT 395

Lossless and Reversible Data Hiding of Encrypted Images

Authors:DR.M.RAMANA REEDY, A.RAMAKRISHNA

2161-2164

Download
       
IJIT 396

Multi Data Sharing for Efficient Public Integrity in the Cloud

Authors:AMEENA BEGUM, LALITHA, A.BAKIYA LAKSHMI

2165-2171

Download
       

Prev
20 21 22 23 24 25 26 27 28 29
Next

© Copyrights @ IJITECH . All rights reserved.

Terms of Service | Privacy Policy