S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJATIR 21 | Method for Enhance the Security in Cloud Storage Using two Layer Encryption with Rijndael Algorithm Authors:SAMIKSHA GUPTA |
0134-0139 |
Download | |
IJATIR 22 | Adaptive Document Image Binarization for Degraded Document Images Authors:P.BHANU PRIYA, G.UMA MAHESWARA REDDY |
0140-0144 |
Download | |
IJATIR 23 | Reg Pending Status: Plagiarism Report Authors:.................................... |
........................ |
Download | |
IJATIR 24 | SQLI Attack: Attack Prevention Techniques for SQL Injection Authors:ZAHRA SHAFIEI |
0151-0156 |
Download | |
IJATIR 25 | A Cooperative Positioning Algorithm in Cellular Network to Reduce Hearability Problem Authors:MAMIDI TARUN, K.SATYAVATHI, DR.M.NARSING YADAV |
0157-0164 |
Download | |
IJATIR 26 | Joint Estimation of I/Q Imbalance, CFO and Channel Response for MIMO OFDM Systems Authors:R.SRIKANTH, K.JOGINAIDU, DR.M.NARSING YADAV |
0165-0170 |
Download | |
IJATIR 27 | Reliable Data Management using Module-Based Reference Data Management System Authors:B.SRINIVASULU, BATHYALA SANGAMITHRA, K.NARAYANA |
0171-0173 |
Download | |
IJATIR 28 | Reduction of Losses and Comparison of Sensor and Sensorless Control of Four-Switch Inverter Fed Permanent Magnet Brushless DC Motor for Low Cost Commercial Applications Authors:T.V.SUBBARAO, V.LOKESH |
0174-0179 |
Download | |
IJATIR 29 | Improvised Method for Intigrity in Cloud using Elliptic Curve Diffie Authors:PRATIKSHA KHANDELWAL, PRIYANKA PALOD |
0180-1083 |
Download | |
IJATIR 30 | Enhancing E-Transactional Security Considering Credit Card Deceit Authors:AVINASH PALAKURTHY, RAVI MATHEY |
0184-0187 |
Download | |
Submission Open for 2021 |
Last Date of Submission : |
20th, October-2021 |
Acceptance Notification : |
After Peer Review |
Last Date of Publication : |
30th, October-2021 |