S.No | Title | Page No | Download |
IJIT 141 | Privacy Protection through Public Auditing for Cloud Data Regeneration Authors:SYED MOHAMMED SHAFI, H. ATEEQ AHMED |
0806-0811 |
Download |
IJIT 142 | Implementation of Fixed-Point LMS Adaptive Filter Authors:RAMAYANAPU VAMSI GOPALA KRISHNA, N. VENKATA SATISH |
0812-0817 |
Download |
IJIT 143 | Design and Development Automatic Irrigation System using Wireless Sensor Network and Raspberry Pi Authors:AHMED ABDULLAH ALI SHAREEF, S. MANASSEH |
0818-0822 |
Download |
IJIT 144 | DWT and YUV Based Video Steganography Authors:ERNEST FRANK, S. VARADARAJAN, B. SHOBAN BABU |
0823-0828 |
Download |
IJIT 145 | Bug Triage with Software Data Reduction Technique Authors:N. MOUNIKA, C. LAKSHMI |
0829-0831 |
Download |
IJIT 146 | Design and Performance Analysis of LCL Filter for Grid-Interconnected Systems Authors:AHMED ABDUL BARI, AHMED ABDUL AZIZ, WAHEEDA BEGUM |
0832-0838 |
Download |
IJIT 147 | Avoiding Isolated Information Inference Attacks on Social Networks Authors:A. VENKATA NARAYANA, SUBBAREDDY MERUVA, M. AMRESHWARA KUMAR |
0839-0843 |
Download |
IJIT 148 | Ensure Assign Responsibility for Scalable inside the Cloud Authors:KOTERU ANUSHA, N.SWAPNASUHASINI |
0844-0849 |
Download |
IJIT 149 | Using Data Aggregation Technique Detecting Collusion Attacks in Sensor Networks Authors:NARAYANA RAO SESHAGIRI, N.SWAPNASUHASINI |
0850-0854 |
Download |
IJIT 150 | An Incentive Carry for Network Effectiveness Maximization Authors:P. NAVEEN KUMAR, N.SWAPNASUHASINI |
0855-0860 |
Download |
IJIT 151 | Micro Strip Patch Antenna using Coaxial Probe Feeding Technique to Operate in MICS-Band Authors:MEDIKONDA ASHOK KUMAR, G. S. N. RAJU, DR. S. MISRA |
0861-0865 |
Download |
IJIT 152 | Discovery of Unreliable Attacks in Wireless Sensor Networks Authors:M. SRAVYA, G. THEJASWI, N. SENDHIL KUMAR |
0866-0877 |
Download |
IJIT 153 | Enabling Distributed Accountability for Accessible within the Cloud Computing Authors:R. HAMSA VENI, P. NIKHIL, P. SEKHAR |
0878-0882 |
Download |
IJIT 154 | An Efficient Survey on Privacy-Preserving Access Control Framework for Relational Data Authors:SHAIK MUJALUDDIN, CH. SUBBARAO, SYED ABDUL HAQ |
0882-0888 |
Download |
IJIT 155 | Environmental Parameters Monitoring by WSN and Raspberry Pi Authors:GADELA SREENIVASA RAO |
0889-0893 |
Download |
IJIT 156 | Secure Multi Owner Data Sharing for Cloud Computing Platforms with Dynamics Groups Authors:ETAKOTI MANASA, MAHAMMAD SHAREEF, KARAMAKA SURESH |
0894-0901 |
Download |
IJIT 157 | Enabling Proof of Retrievability in Cloud Computing with Resource Constrained Devices Authors:MADDIPATLA SAILAJA, VARAPRASAD GAJJALA, KARAMALA SURESH |
0902-0907 |
Download |
IJIT 158 | A Survey on Audit Free Cloud Storing Through Deniable ABE Authors:R. SAMPURNA, P. SRINIVASULU |
0908-0911 |
Download |
IJIT 159 | Secure Data Retrieval in WSN using CP-ABE Authors:BHAVANA S G, AMARESHWAR |
0912-0915 |
Download |
IJIT 160 | Comparative Analysis of Grid side Converters for Leakage Current Reduction Authors:B. TULASI, P. SUNEEL KUMAR |
0916-0921 |
Download |