S.No | Title | Page No | Download |
IJIT 478 | Low Power Square and Cube Architectures using Vedic Sutras Authors:GAJJI LAVANYA, CH. VENKATESWARA RAO, RAJAIAH GABBETA |
2603-2606 |
Download |
IJIT 479 | Scan Test Bandwidth Management for Ultra Large Scale System-On-Chip Architectures Authors:M. SAI DEEPTHI, M.S. RAJESWARI, RAJAIAH GABBETA |
2607-2613 |
Download |
IJIT 480 | Shift Register using Pulsed Latches for Low-Power and Area-Efficient Authors:K.MAHESHBABU, RAJAIAH GABBETA |
2614-2618 |
Download |
IJIT 481 | Malign Dissemination in Large-Scale Patchwork Authors:SATEESH REDDY GUDURU, V.NARASIMHA, K.BHARATHI |
2619-2623 |
Download |
IJIT 482 | Dynamic Routing for Data Integrity and Delay Differentiated Services In Wireless Sensor Networks Authors:SRILATHA PUNNA, V.NARASIMHA, R.USHA |
2624-2633 |
Download |
IJIT 483 | Detection of Falling Objects using DPM Model Authors:SHAIK SAMEERA, SIVA SKANDHA |
2634-2637 |
Download |
IJIT 484 | Secured Failure Recovery System for Hybrid Wireless Sensor Network Authors:M. MRUDHULA, SMD. RASOOL |
2638-2644 |
Download |
IJIT 485 | Intelligent Automatic Voting System using Brain Technique and Fingerprint Sensor Authors:K.VINUSHA, V.RAMA KRISHNA |
2645-2648 |
Download |
IJIT 486 | Swindle Mobile Apps Pronouncement on Social Environment Sites Authors:THELLA HARISH, D. SREE LATHA |
2649-2652 |
Download |
IJIT 487 | Opportuneness Broadcast Admittance in Peer to Peer Transactions Authors:NAGARAJU VADRANAM, GNANADEEPTHI BITRA |
2653-2656 |
Download |
IJIT 488 | Cumulative Key for Preserve Computing On Clouds Authors:SK. MANDULA MAHAMMAD RAFI, CH. RAJU |
2657-2660 |
Download |
IJIT 489 | Sprinkling Data Prevention from Passive IP Attacks Authors:PULIVARTHI SARSWATHI, K. TIRUMULA REDDY |
2661-2664 |
Download |
IJIT 490 | Superlative Tailored Search on Association of Search Engines Authors:KAMMA SURYAPRAKASARAO, D. SREE LATHA |
2665-2669 |
Download |
IJIT 491 | Spotting Egocentric Nodes Detection with Cooperative Communiqué Based Networks Authors:NAKKA VENKATESH, GORANTLA SARATH BABU |
2670-2674 |
Download |
IJIT 492 | Content Based Filtering in P2P Lookup Service Authors:FAIZAN MD KHAN, MD ATEEQ UR RAHMAN |
2675-2677 |
Download |
IJIT 493 | A Hybrid Cloud Approach for Secure Authorized Deduplication Authors:SRAVANI AREPALLI, SUSHMA RATH |
2678-2681 |
Download |
IJIT 494 | Resilient Transformable Watermarking Approach Authors:ATIKA RAHMAN, M. LALITHA |
2682-2688 |
Download |
IJIT 495 | Secure Identity Based Scheme for Data Sharing in Images with Forward Security Authors:SAMEERA SULTANA, DR. MD. ATEEQ UR RAHMAN, SRIDHAR GUMMALLA |
2689-2692 |
Download |
IJIT 496 | Experimental Biomedical ECG Signal Transmission Using VLC Authors:KULLA SWETHA, M. NIKHIL SITHARAM, K. RAMBABU |
2693-2698 |
Download |
IJIT 497 | An Overview of Multi-Authority Attribute Based Encryption Techniques Authors:MOHAMMED NIZAM UDDIN, RAKSHANDA KAUKAB |
2699-2705 |
Download |