• Home
  • About
  • Call for Paper
  • Guidelines
  • E-Board
  • Conference
  • Publication
  • Download
  • Contact

ISSUES

IJIT ISSUE 7
IJIT ISSUE 20
IJIT ISSUE 19
IJIT ISSUE 18
IJIT ISSUE 17
IJIT ISSUE 16
IJIT ISSUE 15
IJIT ISSUE 14
IJIT ISSUE 13
IJIT ISSUE 12
IJIT ISSUE 11
IJIT ISSUE 10
IJIT ISSUE 9
IJIT ISSUE 8
IJIT ISSUE 7
IJIT ISSUE 6
IJIT ISSUE 5
IJIT ISSUE 4
IJIT ISSUE 3
IJIT ISSUE 2
IJIT ISSUE 1

PUBLISHED ARTICLES

S.No Title Page No Download
IJIT 141

Privacy Protection through Public Auditing for Cloud Data Regeneration

Authors:SYED MOHAMMED SHAFI, H. ATEEQ AHMED

0806-0811

Download
       
IJIT 142

Implementation of Fixed-Point LMS Adaptive Filter

Authors:RAMAYANAPU VAMSI GOPALA KRISHNA, N. VENKATA SATISH

0812-0817

Download
       
IJIT 143

Design and Development Automatic Irrigation System using Wireless Sensor Network and Raspberry Pi

Authors:AHMED ABDULLAH ALI SHAREEF, S. MANASSEH

0818-0822

Download
       
IJIT 144

DWT and YUV Based Video Steganography

Authors:ERNEST FRANK, S. VARADARAJAN, B. SHOBAN BABU

0823-0828

Download
       
IJIT 145

Bug Triage with Software Data Reduction Technique

Authors:N. MOUNIKA, C. LAKSHMI

0829-0831

Download
       
IJIT 146

Design and Performance Analysis of LCL Filter for Grid-Interconnected Systems

Authors:AHMED ABDUL BARI, AHMED ABDUL AZIZ, WAHEEDA BEGUM

0832-0838

Download
       
IJIT 147

Avoiding Isolated Information Inference Attacks on Social Networks

Authors:A. VENKATA NARAYANA, SUBBAREDDY MERUVA, M. AMRESHWARA KUMAR

0839-0843

Download
       
IJIT 148

Ensure Assign Responsibility for Scalable inside the Cloud

Authors:KOTERU ANUSHA, N.SWAPNASUHASINI

0844-0849

Download
       
IJIT 149

Using Data Aggregation Technique Detecting Collusion Attacks in Sensor Networks

Authors:NARAYANA RAO SESHAGIRI, N.SWAPNASUHASINI

0850-0854

Download
       
IJIT 150

An Incentive Carry for Network Effectiveness Maximization

Authors:P. NAVEEN KUMAR, N.SWAPNASUHASINI

0855-0860

Download
       
IJIT 151

Micro Strip Patch Antenna using Coaxial Probe Feeding Technique to Operate in MICS-Band

Authors:MEDIKONDA ASHOK KUMAR, G. S. N. RAJU, DR. S. MISRA

0861-0865

Download
       
IJIT 152

Discovery of Unreliable Attacks in Wireless Sensor Networks

Authors:M. SRAVYA, G. THEJASWI, N. SENDHIL KUMAR

0866-0877

Download
       
IJIT 153

Enabling Distributed Accountability for Accessible within the Cloud Computing

Authors:R. HAMSA VENI, P. NIKHIL, P. SEKHAR

0878-0882

Download
       
IJIT 154

An Efficient Survey on Privacy-Preserving Access Control Framework for Relational Data

Authors:SHAIK MUJALUDDIN, CH. SUBBARAO, SYED ABDUL HAQ

0882-0888

Download
       
IJIT 155

Environmental Parameters Monitoring by WSN and Raspberry Pi

Authors:GADELA SREENIVASA RAO

0889-0893

Download
       
IJIT 156

Secure Multi Owner Data Sharing for Cloud Computing Platforms with Dynamics Groups

Authors:ETAKOTI MANASA, MAHAMMAD SHAREEF, KARAMAKA SURESH

0894-0901

Download
       
IJIT 157

Enabling Proof of Retrievability in Cloud Computing with Resource Constrained Devices

Authors:MADDIPATLA SAILAJA, VARAPRASAD GAJJALA, KARAMALA SURESH

0902-0907

Download
       
IJIT 158

A Survey on Audit Free Cloud Storing Through Deniable ABE

Authors:R. SAMPURNA, P. SRINIVASULU

0908-0911

Download
       
IJIT 159

Secure Data Retrieval in WSN using CP-ABE

Authors:BHAVANA S G, AMARESHWAR

0912-0915

Download
       
IJIT 160

Comparative Analysis of Grid side Converters for Leakage Current Reduction

Authors:B. TULASI, P. SUNEEL KUMAR

0916-0921

Download
       

Prev
8 9 10 11 12 13 14 15 16 17
Next

© Copyrights @ IJITECH . All rights reserved.

Terms of Service | Privacy Policy