S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJATIR 663 | A Novel Hop-by-Hop Routing system for Green Internet Authors:M.PALLAVI |
4203-4210 |
Download | |
IJATIR 664 | An Exclusive Faulty Node Detection in Mobile Wireless Network Authors:B.SAI MANOGNA |
4211-4217 |
Download | |
IJATIR 665 | A Dynamic Multi-Keyword Ranked Search using MRSE Over On Encrypted Cloud Data with Less Cost Authors:P.AMBEDKAR, V.VEERA PRASAD, Y.VENKATESWARLU |
4218-4221 |
Download | |
IJATIR 666 | ZVS and ZCS Based Power Converter for Renewable Energy Generation Applications Authors:P. DAVID LIVINGSTONE, B. PRUDVI KUMAR REDDY, M.DILIP KUMAR |
4222-4227 |
Download | |
IJATIR 667 | Cluter Specious Transformation Technique for Secracy Image Encryption and Compression Authors:ALLAMSETTY SAI PRASANNA, DEEPAK NEDUNURI, MARLAPALLI KRISHNA, K.VARADA RAJUKUMAR |
4228-4231 |
Download | |
IJATIR 668 | Perceive Spiteful Apps on OSNS with Cheerful Communication Authors:GANDI PRANITH, J S V GOPALA KRISHNA, P RATNA KUMAR, G.NIRMALA |
4232-4235 |
Download | |
IJATIR 669 | A Novel Approach of Face Recognition using Convolutional Neural Networks Authors:T.SYED AKHEEL, DR.S.A.K JILANI |
4236-4240 |
Download | |
IJATIR 670 | Data Possession in Disorganized Networks with Protected Communication Authors:KONAKALLA RAMA MOHANA RAO, MARLAPALLI KRISHNA, S MOHAN BABU CHOWDARY, SRI KRISHNA CHAITANYA RUDRARAJU |
4241-4245 |
Download | |
IJATIR 671 | Adaptive Planned Policy (APP) Technique to Help Users Compose Privacy Settings for Their Images Authors:G. V. SAI VAMSI, D. PRAMODH KRISHNA |
4246-4251 |
Download | |
IJATIR 672 | Swindle Proclamation on Large Mobile Adhoch Networks Authors:KORAPATI PRASANNA, G.NIRMALA, K.SRINIVAS, MADHAVARAO MANGANTI |
4252-4254 |
Download | |
Submission Open for 2021 |
Last Date of Submission : |
20th, October-2021 |
Acceptance Notification : |
After Peer Review |
Last Date of Publication : |
30th, October-2021 |