S.No | Title | Page No | Download |
IJIT 685 | An OFRR Approach for Allocating Resources to File Replication in Manet Authors:CHINTAPALLI VINAYASHEEL, Y.AYYAPPA |
3707-3709 |
Download |
IJIT 686 | A Hierarchical Trust Management Protocol to Trust-Based Geographical Routing Authors:C. POORNIMA, MALYADRI |
3710-3713 |
Download |
IJIT 687 | Distributed Client Tracking System for Dynamic Topology Adaptation in Manet Authors:G. S. SRUTHI, MALYADRI |
3714-3716 |
Download |
IJIT 688 | A Survey on Facilitating Document Annotation using Content and Querying Value Authors:BATTULA NAGA SAI LALITHYA, SOMEPALLI UMAMAHESWARA RAO |
3717-3719 |
Download |
IJIT 689 | Face Detection Based Door Accessing System and Alert through SMS and Voice Authors:KOLLA GEETA SATYA PRASANNA, CH.RAJA SEKHAR |
3720-3723 |
Download |
IJIT 690 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing Authors:NALABOTHU SIVA RAMA KRISHNA, BELLAMKONADA ARUNA KUMARI |
3724-3726 |
Download |
IJIT 691 | Implementation of Accident Identification and Prevention System Authors:BORRA VEERA VENKATA SATYA SRAVANTHI, GANGA RAMESH JAKKAMSETTI |
3727-3729 |
Download |
IJIT 692 | Hybrid Power Systems Energy Controller with IC-MPPT for Smart Grid Integration Authors:SRIRANGAM SANTHOSHITHA, K.MAHESH |
3730-3734 |
Download |
IJIT 693 | Adaptive Privacy Policy Prediction for Users Data and Images over Social Media Authors:B.VENKATALAKSHMAMMA, B.VIDYULLATHA |
3735-3743 |
Download |
IJIT 694 | Secure Data Approach Authorization by using AnonyControl-F ABE in the Cloud Authors:DEVALARAJU YASWANTH, R.PRIYADARSHINI, DR.G.NAGA LAKSHMI |
3744-3747 |
Download |
IJIT 695 | Managing Encrypted Data with Resource-Confined Devices In Cloud Computing Authors:K. DEEPTHI, A. K. PUNEETH KUMAR |
3748-3752 |
Download |
IJIT 696 | FPGA Based Partial Reconfigurable One Dimensional Median Filter Design Authors:D. VAMSI KUMAR, P. HARISH, N. PUSHPALATHA |
3753-3756 |
Download |
IJIT 697 | Application of SFCL Module in IEEE-6 Bus System with Transient Fault Conditions Authors:A.BHANU PRAKASH GOUD, A.SAI SUBHADRA |
3757-3760 |
Download |
IJIT 698 | Analysis and Design of DM/OQAM Modulation Authors:P. ASUMOORTHY DILEEP KUMAR, M. GNANA PRASANNA |
3761-3764 |
Download |
IJIT 699 | Authentication of Gross Trickery in Application Distribution Authors:REEHANA SYED, G.MANTHRU NAIK, P.G.K.SIRISHA |
3765-3768 |
Download |
IJIT 700 | Finger Print Density Based on Sparse Interpretation Authors:D.B.S.SRAVANTHI, P.G.K.SIRISHA |
3769-3772 |
Download |
IJIT 701 | Network Enumerator to Scan the Vulnerabilities Authors:PRATHYUSHA SURVI, K. SRI LAKSHMI |
3773-3778 |
Download |
IJIT 702 | Software-Defined Networking with DDoS Attacks in Cloud Computing Authors:V. KRISHNA REDDY, D. SREENIVASULU |
3779-3783 |
Download |
IJIT 703 | .......................................... Authors:........................... |
.......... |
Download |
IJIT 704 | Joint Estimation Algorithm in Optimization Based on Channel Estimation Technique using OFDM/OQAM Authors:SHAIK IRFAN, K.ROJAMANI |
3788-3791 |
Download |