S.No | Title | Page No | Download |
IJIT 239 | Protection Evaluation Model with Proof of Retrievability in Cloud Computing Authors:C.LEKHYA, C.K.HEMANTHA RAMA |
1346-1351 |
Download |
IJIT 240 | Design of High Performance Binary Image Processing Technique on FPGA using Soft-core Processor Architecture Authors:T. KRISHNA VENI, C. MD. ASLAM |
1352-1357 |
Download |
IJIT 241 | Performance Analysis for OFDM System using Fourier Transform and Wavelet Transform with Different Modulation Techniques Authors:MOHMMED FASIUDDIN, M.C.RAJU |
1358-1362 |
Download |
IJIT 242 | A Cloud Safety Process of Knowledge Integrity in Cloud Storage Authors:NASINA MALLIKARJUNA, G. LAKSHMIKANTH |
1363-1364 |
Download |
IJIT 243 | A Secure Effective Green Mechanism for Budget Decline in Cloud Authors:PULIPUTHURU RUPA, SRINUVASULU G |
1365-1372 |
Download |
IJIT 244 | MAC Using Compressor Based Multiplier and Carry Save Adder Authors:NAGAMANOHAR TENALI, MUKESH GANGALA |
1373-1376 |
Download |
IJIT 245 | A Novel Approach for Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, VIJAY PASUNURI |
1377-1379 |
Download |
IJIT 246 | Detection of Malicious Packet Dropping Attacks in Wireless Sensor Networks Authors:RAJINI SANDHIREDDY, M.HARATHI, S.G NAWAZ |
1380-1383 |
Download |
IJIT 247 | Truthful Recourse Scheduling in Cloud Environment Authors:RENUKA N HUCHHE, GAYATRI M BHANDARI |
1384-1387 |
Download |
IJIT 248 | CWC: A Distributed Computing Infrastructure using Smart Phones Authors:A. RAGHAVENDRA PRAVEEN KUMAR, D. JAYANARAYANA REDDY |
1388-1394 |
Download |
IJIT 249 | Energy Aware Load Balancing and Application Scaling for Cloud Ecosystem Authors:C. PRAVEEN KUMAR, G. SOMASEKHAR, DR. S. PREM KUMAR |
1395-1400 |
Download |
IJIT 250 | Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Authors:DR. M. JAGADEESHWAR, DR. SUMAN KUMAR SHRIRAMOJU, DR. ADLOORI RAMESH BABU |
1401-1405 |
Download |
IJIT 251 | A Secure and Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data Authors:K. S. HARIKA HAMPI, K. LAKSHMI, DR. S. PREM KUMAR |
1406-1411 |
Download |
IJIT 252 | VulHunter: Toward Discovering Vulnerabilities in Android Applications Authors:K. MANOHAR, U. VEERESH, DR. S. PREM KUMAR |
1412-1415 |
Download |
IJIT 253 | A Survey on a Hybrid Cloud Approach for Secure Authorized Deduplication Authors:A.VENKATA RAMANA, P.SATHISH REDDY, BHUKYA RADHA |
1416-1418 |
Download |
IJIT 254 | Portability-Aiding Confined Protocol for Spontaneous Wi-Fi Networks Authors:M.PRAVEEN REDDY, A.K.PUNEETH KUMAR |
1419-1424 |
Download |
IJIT 255 | Control Area Network (CAN) based Intelligent Vehicle System for Driver Assistance using Advanced RISC Machines (ARM) Authors:P. PRIYATHAM, A.M. GUNA SEKHAR |
1425-1427 |
Download |
IJIT 256 | Authentic and Anonymous Multi-Owner Data Sharing for Dynamic Groups in the Cloud Authors:I.LALASA, N. JAYAKRISHNA |
1428-1433 |
Download |
IJIT 257 | Provable Multi Copy Dynamic Records Control in Cloud Computing Systems using Soft-core Processor Architecture Authors:R.MRUDULA, P.SATHISH REDDY, DANDA SWATHI |
1434-1438 |
Download |
IJIT 258 | Confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, DONURU SWATHI |
1439-1444 |
Download |