• Home
  • About
  • Call for Paper
  • Guidelines
  • E-Board
  • Conference
  • Publication
  • Download
  • Contact

ISSUES

IJIT ISSUE 7
IJIT ISSUE 20
IJIT ISSUE 19
IJIT ISSUE 18
IJIT ISSUE 17
IJIT ISSUE 16
IJIT ISSUE 15
IJIT ISSUE 14
IJIT ISSUE 13
IJIT ISSUE 12
IJIT ISSUE 11
IJIT ISSUE 10
IJIT ISSUE 9
IJIT ISSUE 8
IJIT ISSUE 7
IJIT ISSUE 6
IJIT ISSUE 5
IJIT ISSUE 4
IJIT ISSUE 3
IJIT ISSUE 2
IJIT ISSUE 1

PUBLISHED ARTICLES

S.No Title Page No Download
IJIT 382

Document Modeling in Information Filtering for Multi-Label Classification

Authors:KALAVAKOLU MUNI SEKHAR, C. GOVARDHAN

2098-2102

Download
       
IJIT 383

Finding of Ranking Fraud for Mobile Apps

Authors:MOHD IRFAN, E. RAVI

2103-2106

Download
       
IJIT 384

3D Layout Extraction Based on Point-Cloud Method

Authors:AVILELI ROJA, S. CHAKRI SREEDHAR

2107-2110

Download
       
IJIT 385

Literature On A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces: Smart Crawler

Authors:SHAIK KHADAR BASHA, T.KISHORE BABU

2111-2114

Download
       
IJIT 386

Face Recognition using Local Ternary Pattern

Authors:SYED ATHER HASSAN, AYESHA NAAZ

2115-2120

Download
       
IJIT 387

Motion Sensing Based Intelligent Management System for Surveillance

Authors:J. MONA, G. VINATHA

2121-2125

Download
       
IJIT 388

Automotive Collision Avoidance System Using Controller Area Network

Authors:CH. PALLAVI, K. NISHAKAR

2126-2129

Download
       
IJIT 389

An Improvised Authentication Key Exchange Protocols Designed for PNFS

Authors:MOHD AHSAN HUSSAIN, MD ATEEQ UR RAHMAN

2130-2133

Download
       
IJIT 390

Secure Routing for Wireless Sensor Networks using Caser Protocol

Authors:TAYYABA TAMKEEN, AMENA SAYEED

2134-2140

Download
       
IJIT 391

A Review on Circuit Ciphertext-Policy Attribute-Based Hybrid Cryptography with Verifiable Delegation in Cloud Computing

Authors:B.MURALIKRISHNA, SRAVANI S V K

2141-2144

Download
       
IJIT 392

The Multiple-Key Cryptography-Based Distributed Certificate Authority in Mobile Adhoc Networks

Authors:ZEBA FATIMA, K. SHILPA

2145-2150

Download
       
IJIT 393

Capable Inquiry Services in the Cloud with Information Wireless Networks

Authors:PAVAN KUMAR E.G, S.SWETHA

2151-2155

Download
       
IJIT 394

Influence Factor Based Opinion Mining of Data using Supervised Learning

Authors:SABIHA RAZZAK, SUMERA JABEEN

2156-2160

Download
       
IJIT 395

Lossless and Reversible Data Hiding of Encrypted Images

Authors:DR.M.RAMANA REEDY, A.RAMAKRISHNA

2161-2164

Download
       
IJIT 396

Multi Data Sharing for Efficient Public Integrity in the Cloud

Authors:AMEENA BEGUM, LALITHA, A.BAKIYA LAKSHMI

2165-2171

Download
       
IJIT 397

Attack Detection Using Machine Learning Methods

Authors:V.SOUNDARYA, MS.SWETA

2172-2180

Download
       
IJIT 398

Real Time Vehicle Monitoring System

Authors:K.SHOBHA RANI, A. BALA CHANDRA REDDY

2181-2183

Download
       
IJIT 399

Declining Reasoning Cost by using Numerous Analysis Strategy Approach

Authors:BOYELLA SURESH, B. DHANALAKSHMI

2184-2191

Download
       
IJIT 400

A Framework for Data Integrity, Auditing in Duplicated Files in Cloud Storage

Authors:DR.R.RAMACHANDRA, SG NAWAZ, Y. GAYEETRI

2192-2194

Download
       
IJIT 401

A New Approach to Discovery the Fraud Apps

Authors:DR.R.RAMACHANDRA, SG NAWAZ, V. SHIRISHA

2195-2197

Download
       

1 2 3
Next

© Copyrights @ IJITECH . All rights reserved.

Terms of Service | Privacy Policy