×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of international-journal-of-innovatory-research-ijir-ijiret-ijirsm
IJIRET Sandeep MK Cloud Based Traffic Alerts System Using Smart Phone
40 views
IJIRET Nahar Dhruv Wireless Black Box with MEMS Accelerometer and GPS Tracking for Accidental Detection of Vehicle and Theft Control
22 views
IJIRET Anjana a Development of an Android Based Street Light Control and Complaint Raising Application
21 views
IJIRET Venugopal R Development of Eembedded System for Saving Energy in Air Conditioner
13 views
IJIRSM Ranpreet Kaur the Study of Dividend Policy a Review of Irrelevance Theory
166 views
IJIRET K Mukambika Touch Driven Interaction Using an NFC and Bluetooth Enabled Smartphone
23 views
IJIRSM Pallavi Joshi Time Embedded Reactive RTOS for Embedded Applications
8 views
IJIRSM SOUJANYA v Efficient Complaint Registration Using Mobile Interface
214 views
IJIRET Vivekanand S Reshmi Significance of HADOOP Distributed File System
226 views
IJIRET Archana KV Increasing Memory Performance Using Cache Optimizations in Chip Multiprocessors
214 views
IJIRSM Ahmed Hassan El Zihebi Analytic Study About Knowledge Application in Saudi Arabian for Ground Services
212 views
IJIRET Ashwini KC Deadlock Detection in Homogeneous Distributed Database Systems
217 views
IJIRSM Ashok Kumar PS Compulsiveness of RESTful Web Services
217 views
IJIRSM Ashok Kumar H Problems and Solutions Infrastructure as Service Security in Cloud
214 views
IJIRSM Bhargavi KA Robust Distributed Security Using Stateful CSG Based Distributed Firewall
215 views
IJIRSM Poornima KM a Survey on Security Circumstances for Mobile Cloud Computing
212 views
IJIRSM Choudhari Priyanka Backup and Restore in Smartphone Using Mobile Cloud Computing
212 views
IJIRET Latha S Math a Dual Framework and Algorithms for Targeted Online Data Delivery
212 views
IJIRET Siri HP a Remote Phone Access for Smartphone Events
212 views
IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks
215 views
Next >