×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of international-journal-of-innovatory-research-ijir-ijiret-ijirsm
IJIRET Sandeep MK Cloud Based Traffic Alerts System Using Smart Phone
41 views
IJIRET Nahar Dhruv Wireless Black Box with MEMS Accelerometer and GPS Tracking for Accidental Detection of Vehicle and Theft Control
22 views
IJIRET Anjana a Development of an Android Based Street Light Control and Complaint Raising Application
22 views
IJIRET Venugopal R Development of Eembedded System for Saving Energy in Air Conditioner
16 views
IJIRSM Ranpreet Kaur the Study of Dividend Policy a Review of Irrelevance Theory
167 views
IJIRET K Mukambika Touch Driven Interaction Using an NFC and Bluetooth Enabled Smartphone
24 views
IJIRSM Pallavi Joshi Time Embedded Reactive RTOS for Embedded Applications
9 views
IJIRSM SOUJANYA v Efficient Complaint Registration Using Mobile Interface
215 views
IJIRET Vivekanand S Reshmi Significance of HADOOP Distributed File System
227 views
IJIRSM Ahmed Hassan El Zihebi Analytic Study About Knowledge Application in Saudi Arabian for Ground Services
213 views
IJIRET Archana KV Increasing Memory Performance Using Cache Optimizations in Chip Multiprocessors
215 views
IJIRET Ashwini KC Deadlock Detection in Homogeneous Distributed Database Systems
217 views
IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing
213 views
IJIRSM Ashok Kumar PS Compulsiveness of RESTful Web Services
218 views
IJIRSM Choudhari Priyanka Backup and Restore in Smartphone Using Mobile Cloud Computing
213 views
IJIRSM Ashok Kumar H Problems and Solutions Infrastructure as Service Security in Cloud
215 views
IJIRSM Bhargavi KA Robust Distributed Security Using Stateful CSG Based Distributed Firewall
215 views
IJIRET Latha S Math a Dual Framework and Algorithms for Targeted Online Data Delivery
213 views
IJIRET Siri HP a Remote Phone Access for Smartphone Events
213 views
IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks
216 views
Next >