• Home
  • About
  • Call for Paper
  • Guidelines
  • E-Board
  • Conference
  • Publication
  • Download
  • Contact

ISSUES

IJIT ISSUE 7
IJIT ISSUE 20
IJIT ISSUE 19
IJIT ISSUE 18
IJIT ISSUE 17
IJIT ISSUE 16
IJIT ISSUE 15
IJIT ISSUE 14
IJIT ISSUE 13
IJIT ISSUE 12
IJIT ISSUE 11
IJIT ISSUE 10
IJIT ISSUE 9
IJIT ISSUE 8
IJIT ISSUE 7
IJIT ISSUE 6
IJIT ISSUE 5
IJIT ISSUE 4
IJIT ISSUE 3
IJIT ISSUE 2
IJIT ISSUE 1

PUBLISHED ARTICLES

S.No Title Page No Download
IJIT 239

Protection Evaluation Model with Proof of Retrievability in Cloud Computing

Authors:C.LEKHYA, C.K.HEMANTHA RAMA

1346-1351

Download
       
IJIT 240

Design of High Performance Binary Image Processing Technique on FPGA using Soft-core Processor Architecture

Authors:T. KRISHNA VENI, C. MD. ASLAM

1352-1357

Download
       
IJIT 241

Performance Analysis for OFDM System using Fourier Transform and Wavelet Transform with Different Modulation Techniques

Authors:MOHMMED FASIUDDIN, M.C.RAJU

1358-1362

Download
       
IJIT 242

A Cloud Safety Process of Knowledge Integrity in Cloud Storage

Authors:NASINA MALLIKARJUNA, G. LAKSHMIKANTH

1363-1364

Download
       
IJIT 243

A Secure Effective Green Mechanism for Budget Decline in Cloud

Authors:PULIPUTHURU RUPA, SRINUVASULU G

1365-1372

Download
       
IJIT 244

MAC Using Compressor Based Multiplier and Carry Save Adder

Authors:NAGAMANOHAR TENALI, MUKESH GANGALA

1373-1376

Download
       
IJIT 245

A Novel Approach for Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, VIJAY PASUNURI

1377-1379

Download
       
IJIT 246

Detection of Malicious Packet Dropping Attacks in Wireless Sensor Networks

Authors:RAJINI SANDHIREDDY, M.HARATHI, S.G NAWAZ

1380-1383

Download
       
IJIT 247

Truthful Recourse Scheduling in Cloud Environment

Authors:RENUKA N HUCHHE, GAYATRI M BHANDARI

1384-1387

Download
       
IJIT 248

CWC: A Distributed Computing Infrastructure using Smart Phones

Authors:A. RAGHAVENDRA PRAVEEN KUMAR, D. JAYANARAYANA REDDY

1388-1394

Download
       
IJIT 249

Energy Aware Load Balancing and Application Scaling for Cloud Ecosystem

Authors:C. PRAVEEN KUMAR, G. SOMASEKHAR, DR. S. PREM KUMAR

1395-1400

Download
       
IJIT 250

Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

Authors:DR. M. JAGADEESHWAR, DR. SUMAN KUMAR SHRIRAMOJU, DR. ADLOORI RAMESH BABU

1401-1405

Download
       
IJIT 251

A Secure and Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data

Authors:K. S. HARIKA HAMPI, K. LAKSHMI, DR. S. PREM KUMAR

1406-1411

Download
       
IJIT 252

VulHunter: Toward Discovering Vulnerabilities in Android Applications

Authors:K. MANOHAR, U. VEERESH, DR. S. PREM KUMAR

1412-1415

Download
       
IJIT 253

A Survey on a Hybrid Cloud Approach for Secure Authorized Deduplication

Authors:A.VENKATA RAMANA, P.SATHISH REDDY, BHUKYA RADHA

1416-1418

Download
       
IJIT 254

Portability-Aiding Confined Protocol for Spontaneous Wi-Fi Networks

Authors:M.PRAVEEN REDDY, A.K.PUNEETH KUMAR

1419-1424

Download
       
IJIT 255

Control Area Network (CAN) based Intelligent Vehicle System for Driver Assistance using Advanced RISC Machines (ARM)

Authors:P. PRIYATHAM, A.M. GUNA SEKHAR

1425-1427

Download
       
IJIT 256

Authentic and Anonymous Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Authors:I.LALASA, N. JAYAKRISHNA

1428-1433

Download
       
IJIT 257

Provable Multi Copy Dynamic Records Control in Cloud Computing Systems using Soft-core Processor Architecture

Authors:R.MRUDULA, P.SATHISH REDDY, DANDA SWATHI

1434-1438

Download
       
IJIT 258

Confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, DONURU SWATHI

1439-1444

Download
       

Prev
13 14 15 16 17 18 19 20 21 22
Next

© Copyrights @ IJITECH . All rights reserved.

Terms of Service | Privacy Policy