S.No | Title | Page No | Download |
IJIT 526 | Smart Phone Based Robotic Arm Control Using Raspberry Pi and Wifi Authors:GUDIPATI PRANGNYA, B.PAPACHARY, C. ASHOK KUMAR, DR. B.HARI KRISHNA |
2857-2859 |
Download |
IJIT 527 | DDGSA: A Data Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Authors:K. ANUSHA, DEEPTHI JANAGAMA |
2860-2864 |
Download |
IJIT 528 | A Scalable and Reliable Search for Content-Based Systems Authors:E. SREELATHA, I.DEEPIKA |
2865-2868 |
Download |
IJIT 529 | Preserve the Privacy of Public Audit for Regeneration Code Based Cloud Storage Authors:P. LAKSHMI PRASANNA, G. VISWANATH |
2869-2871 |
Download |
IJIT 530 | Summarizing the Evolutionary Tweet Streams with Timeline Generation Authors:P. SIVA PRASAD, M.V. JAYASREE |
2872-2875 |
Download |
IJIT 531 | An Integrated Photovoltaic system to a VSCs by Nonlinear Power Damping Controller with Self-Synchronization Capability Authors:C.ASHOK KUMAR, V.MALLIKARJUNA REDDY, B.LAKSHMI PRASANNA |
2876-2887 |
Download |
IJIT 532 | Nearest Communication in Interrupt-Built Network Efficiency Maximization Authors:K.S.DHARANIJA, M.K.SHAREEF |
2888-2894 |
Download |
IJIT 533 | Mutable Order Preserving Encoding for Secure Data Query Processing Authors:NYEMEESHA V, DR. C. KIRANMAI |
2895-2900 |
Download |
IJIT 534 | Detection and Rectification of Distorted Fingerprints Authors:P.MOUNIKA, S. RAJESHWAR |
2901-2907 |
Download |
IJIT 551 | Active Control for Power Quality Improvement in Hybrid Power Systems Authors:VINUTHAS, DHANA DEEPIKA. B, S. RAJESH |
3000-3006 |
Download |
IJIT 535 | A New Approach to Promote Telemedicine System Authors:P. SUSHMITHA, ADAVELLI RAMESH, VANAMGOPINATH |
2908-2912 |
Download |
IJIT 536 | An Efficient Co-Segmentation Algorithm for Videos Authors:KRISHNAIAH GOTHULA, P.RAJESH, A.RAJANI |
2913-2918 |
Download |
IJIT 537 | MSP430 Microcontroller Based Pollution Control and Automatic Vehicle Monitoring System Authors:J.V.PESHA, S.CHANDANA |
2919-2921 |
Download |
IJIT 538 | An Implementation of an Efficient Authentication System for Secure Internet Services That Provides Continuous and Transparent User Identity Verification using Biometric Traits Authors:NARENDRA NAIK, ADAVELLI RAMESH, VANAMGOPINATH |
2922-2926 |
Download |
IJIT 539 | Secure Data Sharing Scheme with Secure Key Distribution and Data Sharing for Dynamic Group Authors:GUMMADAVALLI SHYAM, M SRINIVAS, MADHIRA SRINIVAS |
2927-2930 |
Download |
IJIT 540 | Secure Data Transmission from the Adversary Nodes in the Wireless Sensor Network Authors:A. SRIVIDYA, ADAVELLI RAMESH, VANAMGOPINATH |
2931-2935 |
Download |
IJIT 541 | Framework MAS Reduce Development Time and Complexity of the Implementation of Software Agents Authors:L. SUDERSHAN1, ADAVELL RAMESH, MANCHUKONDA KISHORE |
2936-2941 |
Download |
IJIT 542 | Efficient and Distributed Service Integrity Attestation Framework for Large Scale Cloud Computing Authors:SUNIL REDDY, ADAVELLI RAMESH, SOMA PREETHI |
2942-2945 |
Download |
IJIT 543 | Detecting Malicious Facebook Applications Authors:PRASHANTH MADASU, V.NARASIMHA, K.BHARATHI |
2946-2954 |
Download |
IJIT 544 | Aging-Aware Reliable Multiplier Design with Adaptive Hold Logic Implements With 4x4 Vedic Multipliers Authors:CHINAPAKA RADHIKA, K. BINDU MADHAVI, K. ANIL KUMAR |
2954-2959 |
Download |