S.No | Title | Page No | Download |
IJIT 382 | Document Modeling in Information Filtering for Multi-Label Classification Authors:KALAVAKOLU MUNI SEKHAR, C. GOVARDHAN |
2098-2102 |
Download |
IJIT 383 | Finding of Ranking Fraud for Mobile Apps Authors:MOHD IRFAN, E. RAVI |
2103-2106 |
Download |
IJIT 384 | 3D Layout Extraction Based on Point-Cloud Method Authors:AVILELI ROJA, S. CHAKRI SREEDHAR |
2107-2110 |
Download |
IJIT 385 | Literature On A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces: Smart Crawler Authors:SHAIK KHADAR BASHA, T.KISHORE BABU |
2111-2114 |
Download |
IJIT 386 | Face Recognition using Local Ternary Pattern Authors:SYED ATHER HASSAN, AYESHA NAAZ |
2115-2120 |
Download |
IJIT 387 | Motion Sensing Based Intelligent Management System for Surveillance Authors:J. MONA, G. VINATHA |
2121-2125 |
Download |
IJIT 388 | Automotive Collision Avoidance System Using Controller Area Network Authors:CH. PALLAVI, K. NISHAKAR |
2126-2129 |
Download |
IJIT 389 | An Improvised Authentication Key Exchange Protocols Designed for PNFS Authors:MOHD AHSAN HUSSAIN, MD ATEEQ UR RAHMAN |
2130-2133 |
Download |
IJIT 390 | Secure Routing for Wireless Sensor Networks using Caser Protocol Authors:TAYYABA TAMKEEN, AMENA SAYEED |
2134-2140 |
Download |
IJIT 391 | A Review on Circuit Ciphertext-Policy Attribute-Based Hybrid Cryptography with Verifiable Delegation in Cloud Computing Authors:B.MURALIKRISHNA, SRAVANI S V K |
2141-2144 |
Download |
IJIT 392 | The Multiple-Key Cryptography-Based Distributed Certificate Authority in Mobile Adhoc Networks Authors:ZEBA FATIMA, K. SHILPA |
2145-2150 |
Download |
IJIT 393 | Capable Inquiry Services in the Cloud with Information Wireless Networks Authors:PAVAN KUMAR E.G, S.SWETHA |
2151-2155 |
Download |
IJIT 394 | Influence Factor Based Opinion Mining of Data using Supervised Learning Authors:SABIHA RAZZAK, SUMERA JABEEN |
2156-2160 |
Download |
IJIT 395 | Lossless and Reversible Data Hiding of Encrypted Images Authors:DR.M.RAMANA REEDY, A.RAMAKRISHNA |
2161-2164 |
Download |
IJIT 396 | Multi Data Sharing for Efficient Public Integrity in the Cloud Authors:AMEENA BEGUM, LALITHA, A.BAKIYA LAKSHMI |
2165-2171 |
Download |
IJIT 397 | Attack Detection Using Machine Learning Methods Authors:V.SOUNDARYA, MS.SWETA |
2172-2180 |
Download |
IJIT 398 | Real Time Vehicle Monitoring System Authors:K.SHOBHA RANI, A. BALA CHANDRA REDDY |
2181-2183 |
Download |
IJIT 399 | Declining Reasoning Cost by using Numerous Analysis Strategy Approach Authors:BOYELLA SURESH, B. DHANALAKSHMI |
2184-2191 |
Download |
IJIT 400 | A Framework for Data Integrity, Auditing in Duplicated Files in Cloud Storage Authors:DR.R.RAMACHANDRA, SG NAWAZ, Y. GAYEETRI |
2192-2194 |
Download |
IJIT 401 | A New Approach to Discovery the Fraud Apps Authors:DR.R.RAMACHANDRA, SG NAWAZ, V. SHIRISHA |
2195-2197 |
Download |