S.No | Title | Page No | Download |
IJIT 604 | Seclusion User-Uploaded Image Course of Action in OSN Authors:GARAPATI RAMANJANEYULU, BANBARUPALLI MOULESWARARAO |
3305-3309 |
Download |
IJIT 605 | Designing the Structure for Lowering the Dynamic Energy Consumption on SCN Authors:KATTEBOINA MALLESHWARI, P.V.VARA PRASAD RAO |
3310-3312 |
Download |
IJIT 606 | A Unique Hastening Communication-Bound Sparse Repeatable Solver Authors:KURMILLA CHANDRAKALA, G. SATYA PRABHA |
3313-3315 |
Download |
IJIT 607 | Algorithm Design for Approximation for Both Hardware and Software Level Authors:M. SATISH KUMAR, G.SATYA PRABHA |
3316-3318 |
Download |
IJIT 608 | Preparing Critical Arithmetic Functional Unit to Overcome the Negative Bias Authors:PASHAM SAIRAM REDDY, P.V.VARA PRASAD RAO |
3319-3323 |
Download |
IJIT 609 | Data Possession in Disorganized Networks with Protected Broadcast Encryption Authors:INTURI V PAVAN KUMAR, SESHU BHAVANI MALLAMPATI |
3324-3328 |
Download |
IJIT 610 | A Novel DVR – UCAP Arrangement for Improving Power Quality of Distribution System Authors:PALLE VENKATA SIVALAKSHMI PRASANNA, A. RAJABABU, M. DILIP KUMAR |
3329-3334 |
Download |
IJIT 611 | Sparse Representation-Based Greedy Search for Face Sketch Synthesis Authors:T.SYED AKHEEL, DR.V.USHA SHREE |
3335-3339 |
Download |
IJIT 612 | An Improved iUPQC Controller to Provide Additional Grid-Voltage Regulation as a STATCOM Authors:DANAM CHANDRASHEKAR, R. SATHEESH CHANDRA, P. SUNITHA |
3340-3348 |
Download |
IJIT 613 | Implementation of Hybrid Filter for 12-Pulse Thyristor Rectifier Supplying with Fuzzy Logic Based High-Current Variable-Voltage DC Load Authors:K. DHANA LAKSHMI, K. DILLI BABU |
3349-3353 |
Download |
IJIT 614 | Privacy Maintaining Entry Control in Cloud for Comfortable Knowledge Sharing Authors:K. SUKUMAR, K. NARAYANA, P. SUNEETHA |
3354-3357 |
Download |
IJIT 615 | Securing Cloud Services by Reputation Based Trust Management Authors:NARRA ANITHA, LAKSHMI JAMMULAMADAKA |
3358-3361 |
Download |
IJIT 616 | Hubness in Unsupervised Outlier Detection Techniques for High Dimensional Data –A Survey Authors:ANANGI ANUSHA SAI, B.JYOTHI |
3362-3366 |
Download |
IJIT 617 | Filter Particles Approach Video Prominently Faces Location Authors:PILLI VIJAY KUMAR, G. SATYA PRABHA |
3367-3369 |
Download |
IJIT 618 | Green Cloud: An Energy-Saving Application in Data Centers Through A Programmatic Approach Authors:ARSHI, FARHA SULTANA |
3370-3373 |
Download |
IJIT 626 | Effect of Different Dosages of Super Plasticizers on Mechanical and Durability Properties of Concrete Authors:SYED MUSHTAQ AHAMED, S.N.KRISHNAKANTH |
3400-3409 |
Download |
IJIT 627 | Secure Evaluate Detection for Fake Identities by using Face, IRIS and Biometric Authors:ABDULWASIM, MARLAPALLI KRISHNA, DEEPAK NEDUNURI, S MOHAN BABU CHOWDARY |
3410-3412 |
Download |
IJIT 628 | Proprietary Information in Haphazard Networks with Protected Broadcast Encryption Authors:S.RAMA KRISHNA, B.PADMAJA RANI, AVANTHI BOJJA |
3413-3417 |
Download |
IJIT 629 | Transcendent Tailored Search on Association of Search Engines Authors:VEERAVARAPU SURYA NARAYANA, KONDA SREENU, PRANAV VALLABHANENI, DONAVALLI VENKATA VIDYA DEEPTHI |
3418-3422 |
Download |
IJIT 630 | Perceive Malevolent Attacks by using Data Driven Semi Global Alignment Approach Authors:S.RAMA KRISHNA, B.PADMAJA RANI, SYED AZHAR |
3423-3426 |
Download |