S.No | Title | Page No | Download |
IJIT 144 | Secure Mining using Associated Rules using Distributed Databases Authors:PAVAN KUMAR BANDARI, K. SHRUTHI |
0788-0791 |
Download |
IJIT 145 | Target Tracking for Mobile Sensor Networks Authors:S. MAMATHA, T. ANUSHA |
0792-0795 |
Download |
IJIT 146 | Efficient Authentication Communication in Mobile Network Authors:K. VINAY KUMAR, M. SHASHIDHAR |
0796-0800 |
Download |
IJIT 147 | Cost-Effective Way for Resource Distribution of Overspread Routing Broadcasting Nodes Authors:TEJAVATH JAGADISH NAIK, U. SIVAJI |
0801-0805 |
Download |
IJIT 148 | A Novel Algorithm for Address Generation Circuitry of the Wimax Channel Interleaver and Deinterleaver Authors:E.PRIYANKA, SK.SUBAN, D.VENKATARAMI REDDY |
0806-0810 |
Download |
IJIT 149 | Arduino Based Energy Conservation using Zigbee and GSM Technology Authors:M. GAYATRI LAKSHMI, S. SRIVANI |
0811-0816 |
Download |
IJIT 150 | Protection Evaluation of Model Authorities Below Attack Authors:B. SUNIL KUMAR, K.L.N.C.PRAKASH |
0817-0822 |
Download |
IJIT 151 | Privacy-Preserved Authentication Protocol Based on Shared Authority in Cloud Computing Authors:ALI ABDULBAQI ABDUL AZEEZ, SHAIK TANVEER AHMED |
0823-0826 |
Download |
IJIT 152 | Scalable Data Sharing in Cloud Storage by using Key-Aggregate Cryptosystem Authors:MOHAMED MOHAMOUD HASSAN, S. SRAVANTHI |
0827-0834 |
Download |
IJIT 153 | Data Search for Fast High-Dimensional in Incomplete Databases Authors:SHAYMAA TAHA AHMED, T. RAMDAS NAIK |
0835-0844 |
Download |
IJIT 154 | Public Auditing for Common Information in Located on Partitioning for the Cloud Authors:A. ARUNA KUMARI, B. VEERA PRATHAP |
0845-0850 |
Download |
IJIT 155 | Human Health Behavior Detection using Bio Sensors and Classification by Wearable Tags in Smart Spaces Authors:KAGU SRAVANI, P. SURESH KUMAR |
0851-0856 |
Download |
IJIT 156 | Prediction-Based Security and Attribute-Based Information Sharing Authors:A. RAVI KUMAR, B. VEERA PRATHAP |
0857-0861 |
Download |
IJIT 157 | Ensuring Responsibility for Information Prediction for Cloud Services Authors:V. JHANSI, B. VEERA PRATHAP |
0862-0865 |
Download |
IJIT 158 | Homomorphic Linear Authentication with Proxy Resignature for Shared Data in the Cloud Authors:CH. ROHINI, KALYANA CHAKRAVARTHY |
0866-0872 |
Download |
IJIT 159 | Providing Security by Expending Labels in Online Social Networks Authors:E. CHANDANA, R. REVATHI |
0873-0877 |
Download |
IJIT 160 | Simulation of DC-DC Converter with High Voltage Ratio for Micro Grid Application Authors:JYOTHI AKARAPU, D. LANGA |
0878-0881 |
Download |
IJIT 161 | An Efficient Single Phase Stand Alone Wind Based Energy Generation System Authors:BHANOTHU NAGENDAR, D. LANGA |
0882-0886 |
Download |
IJIT 162 | Design of Solar Power Optimizer for DC Distribution System Authors:UPENDER RAO K, K. P. PARAMESH |
0887-0890 |
Download |
IJIT 163 | Design and Implementation of Efficient Single Switch Resonant Power Converter for Energy Resource Authors:ARIF AHMAD MAHMAD, SRINU BOILLA |
0891-0894 |
Download |