S.No | Title | Page No | Download |
IJIT 226 | Child Activity Recognition Based On Cooperative Fusion Model of A Triaxial Accelerometer and A Barometric Pressure Sensor Authors:CH. SUSHMA, DR. D. SUBBA RAO, N. SIVAKUMAR |
1262-1264 |
Download |
IJIT 227 | Automatic Ambulance Rescue System Authors:D. SPANDANA, DR. D. SUBBA RAO, M.PUSHPALATHA |
1265-1270 |
Download |
IJIT 228 | Enhancing Efficient Discovery of Variations under Distributed Data Authors:SANA TAZHYEEN, T. SAI KUMARI, SALEHA FARHA |
1271-1276 |
Download |
IJIT 229 | Power Quality Improvement by using Shunt Active Power Filter and Thyristor Controlled Reactor Authors:A.N.DIVYAVANI, JASMINE JABBARAJ |
1277-1282 |
Download |
IJIT 230 | ZCS Phase shift PWM Full-Bridge DC–DC Converter with Simple Auxiliary Circuits Authors:SURESH KUMAR, AMARNATH NAIDU |
1283-1288 |
Download |
IJIT 231 | Extracting Interesting Patterns for Large Volumes of Data Secured Verification Authors:MADHAVARAO BATTERI, HARISH PRAGADA |
1289-1293 |
Download |
IJIT 232 | Multi Authority Privacy Protection for Published Data Authors:R. LEELA PHANI KUMAR, S. RENUKA |
1294-1297 |
Download |
IJIT 233 | Analyzing Consumer Buying Behavior Authors:R. SARADA, T. A. JYOTHI |
1298-1303 |
Download |
IJIT 234 | Inferred Flow Based Method for Scrutiny of Contained Relationship of Wikipedia Authors:B. V. BALAJI, U. KASI ANNAPURNA |
1304-1311 |
Download |
IJIT 235 | Preventing Sensitive Information in Individualized Web Search Authors:SUREKHA VEERABATTULA, LEELAVATHI AREPALLI |
1312-1316 |
Download |
IJIT 236 | Dynamic Data Clustering using Transaction Sensitive Sliding Window Authors:KAVYA SRI VEGIREDDY, LEELAVATHI AREPALLI |
1317-1320 |
Download |
IJIT 237 | Mining High Utility Item Sets Authors:A. LEELAVATHI, YERRAGOGU DANA SURESH |
1321-1325 |
Download |
IJIT 238 | Extend-Founded Network Efficient Information Entry in Disruption Tolerant Networks Authors:G. SHANKAR RAO, T. RAMESH |
1226-1230 |
Download |
IJIT 239 | An Web of Everything Enabler Neighbor Search With Key Words Authors:R. RAMYA SREE, N. SWAPNA SUHASINI |
1231-1236 |
Download |
IJIT 240 | A Framework of Adaptive Cell Video Streaming Anonymous Profile Matching In Cellular Social Networks Authors:D. LAKSHMI THRIVENIE, R. REVATHI |
1237-1246 |
Download |
IJIT 241 | Providing Privacy for Location in an Internet of Everything Enabler Authors:SACHIN BANDI, R. REVATHI |
1247-1252 |
Download |
IJIT 242 | Providing Safety on Knowledge Sharing and Content Protecting in Public Clouds Authors:N. RAMESH, N. SWAPNA SUHASINI |
1253-1258 |
Download |
IJIT 243 | Denail of Service Attack Detection Structure Based on Multivariate Correlation Analysis Authors:M. PHANI KUMAR, S. RAVI KIRAN |
1259-1263 |
Download |
IJIT 244 | A Two Stage Deanonomization Attack against Anonomysized Social Networks Authors:P. SAMRAJYA LAKSHMI, R. REVATHI |
1264-1268 |
Download |
IJIT 245 | Unified Power Quality Conditioner Based on Fast Energy Storage Authors:PRADEEP KOPPULA, K.SRIDHAR |
1269-1275 |
Download |