S.No | Title | Page No | Download |
IJIT 342 | A P2P Proximity-Aware Interest-Clustered File Sharing System Authors:UMAMA SAHER, M.LALITHA, G.VEERANJANEYULU |
1901-1905 |
Download |
IJIT 343 | Effective Resource Allocation for Cooperative Communication using Water Filling Algorithm in LTE Advanced Network Authors:MOHAMMED ABDUL KAREEM, NAZIA PARVEEN |
1906-1909 |
Download |
IJIT 344 | An Asymmetrical Six-Phase Induction Motor Drive Operation using Fuzzy Logic Controller Authors:C N NAGENDRA, V. MALLIKARJUNA REDDY, M. VENKATA KISHORE |
1910-1920 |
Download |
IJIT 345 | A Semantic-Based Adaptive Mobile Video Processing in Social Networks Authors:P. RAVI KUMAR, C.C. KALYAN SRINIVAS |
1921-1926 |
Download |
IJIT 346 | Organizational Innovation Denial of Service Strategy Attacks in Cloud Computing Authors:C.NIKHILA, KAMINENI B T SUNDARI, B.HARIKRISHNA |
1927-1931 |
Download |
IJIT 347 | Proportional Power Sharing in Hierarchical Droop Control with ANFIS Controller for Reactive Power Management in Islanded Micro Grids Authors:N. BRAHMAIAH, N. MANOJ KUMAR |
1932-1937 |
Download |
IJIT 348 | Energy Capable Secure Protocol Supporting for Unstructured Wireless Network Creation Authors:AGARALA JYOTHSNA, S. SIVARAMA KRISHNA |
1938-1942 |
Download |
IJIT 349 | Defeating Jamming with the Power of Silence: A Game-Theoretic Analysis Authors:G.MEGHANA, DR K. SRUJAN RAJU, P.V.SHALINI |
1943-1949 |
Download |
IJIT 350 | HYDRA: Social Identity Relation via Heterogeneous Behavior Modeling Authors:P.ESWARAIAH, PASUPULETI JHANSI |
1950-1956 |
Download |
IJIT 351 | Design-Based Matter for Paper Representation in Data Filtering Authors:ATIYA ANJUM, K SHILPA |
1957-1962 |
Download |
IJIT 352 | A Novel FIFO Design for Image/Video Processing Applications Authors:B. SUNEEL, M. APPARAO, CH. KANTHARAO |
1963-1966 |
Download |
IJIT 353 | Sec-DiDrip: A Distributed Data Dissemination Protocol with Security & Dissemination in WSNs Authors:GANDIKOTA ANUSHA, RACHA REVATHI, NITTALA SWAPNA SUHASINI |
1967-1971 |
Download |
IJIT 354 | Fast nearest Neighbor Browsing & Search with Keywords Authors:PILLI LAXMI PRANATHI, NITTALA SWAPNA SUHASINI |
1972-1976 |
Download |
IJIT 355 | Energy Efficient Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks with Power Optimization Authors:LAVUDIYA NAGARANI, RACHA REVATHI, NITTALA SWAPNA SUHASINI |
1977-1981 |
Download |
IJIT 356 | Using Multiple Data Stores in the Cloud: An Overview Authors:KOTTURU RAJANI1, BACHINA.VARSHA, NITTALA SWAPNA SUHASINI |
1982-1986 |
Download |
IJIT 357 | Hybrid Cloud Approach for Efficient Secure Authorized Deduplication Authors:SHAIK RAHAMATHUNNISA BEGAM, BACHINA VARSHA, NITTALA SWAPNA SUHASINI |
1987-1992 |
Download |
IJIT 358 | Believe Situated Rank Comparison Search Model Dropping the Dependence Authors:M.MANJULA, S.SIVA RAMA KRISHNA |
1993-1996 |
Download |
IJIT 359 | Safeguard Protection of Internet Banking by Utilizing Finger Print Recognition Approach Authors:BODAGALA LAKSHMI KANTHA, A.M.GUNA SEKHAR |
1997-1999 |
Download |
IJIT 360 | My Confidentiality My Selection: Shared Entry Control on Online Social Networks Authors:A.VENKATESH, P.SURESH |
2000-2003 |
Download |
IJIT 361 | Scalable Cryptosystem for Cloud Storage in Key-Aggregate Searchable Encryption Authors:HAJEERA BEGUM, K. SHILPA |
2004-2010 |
Download |