S.No | Title | Page No | Download |
IJIT 129 | Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication Authors:C. S. KIRAN, C. SRINIVASA MURTHY |
0737-0741 |
Download |
IJIT 130 | Dynamic Secure Data Sharing in Cloud Storage with Key-Aggregate Cryptosystem Authors:CH. RAMA ISWARYA, N. ANURAGAMAYI |
0742-0745 |
Download |
IJIT 131 | Utilizing Process Mining to Gain from Process Changes in Developmental Frameworks Authors:BHUKYA MERI NAYAK, J. RAJAKALA |
0746-0751 |
Download |
IJIT 132 | A Survey Report on Privacy-Enhanced Web Service Composition Authors:SUGUNA RAJU MEESALA, J. RAJAKALA |
0752-0756 |
Download |
IJIT 133 | Providing Security for Anonymised Social Networks Authors:P. BHUVANESWAR REDDY, N. LAVANYA, R. HAMSAVENI |
0757-0762 |
Download |
IJIT 134 | A Novel Approach for Cloud Service in IOT Environment Authors:M. S. SARANYA, A. M. RANGARAJ |
0763-0769 |
Download |
IJIT 135 | Green Manipulate Algorithm in Cloud Computing for Time Optimization Authors:V. UMA, M. NANDA KISHORE |
0770-0777 |
Download |
IJIT 136 | Automatic GPS Receiver Testing Authors:M. VINDYA, A. PRASANNA KUMAR |
0778-0782 |
Download |
IJIT 137 | Individual Cloud Storage Benchmarks and Assessment Authors:K.ROJA, A.M.RANGARAJ |
0783-0789 |
Download |
IJIT 138 | A Clustering Approach for Data and Structural Anonymity in Social Network Authors:P.SARASWATHI, M.NANDA KISHORE |
0790-0795 |
Download |
IJIT 139 | Improved Distributed Deduplication Systems with Enhanced Reliability Authors:SHAIK ARSHAD HUSSAIN, C. MD. GULZAR |
0796-0801 |
Download |
IJIT 140 | Replication for Efficient File Allocation in MANET’s to Maximize Availability of P2P File Access Authors:A. ALEKYA, H. ATEEQ AHMED |
0802-0805 |
Download |
IJIT 141 | Privacy Protection through Public Auditing for Cloud Data Regeneration Authors:SYED MOHAMMED SHAFI, H. ATEEQ AHMED |
0806-0811 |
Download |
IJIT 142 | Implementation of Fixed-Point LMS Adaptive Filter Authors:RAMAYANAPU VAMSI GOPALA KRISHNA, N. VENKATA SATISH |
0812-0817 |
Download |
IJIT 143 | Design and Development Automatic Irrigation System using Wireless Sensor Network and Raspberry Pi Authors:AHMED ABDULLAH ALI SHAREEF, S. MANASSEH |
0818-0822 |
Download |
IJIT 144 | DWT and YUV Based Video Steganography Authors:ERNEST FRANK, S. VARADARAJAN, B. SHOBAN BABU |
0823-0828 |
Download |
IJIT 145 | Bug Triage with Software Data Reduction Technique Authors:N. MOUNIKA, C. LAKSHMI |
0829-0831 |
Download |
IJIT 146 | Design and Performance Analysis of LCL Filter for Grid-Interconnected Systems Authors:AHMED ABDUL BARI, AHMED ABDUL AZIZ, WAHEEDA BEGUM |
0832-0838 |
Download |
IJIT 147 | Avoiding Isolated Information Inference Attacks on Social Networks Authors:A. VENKATA NARAYANA, SUBBAREDDY MERUVA, M. AMRESHWARA KUMAR |
0839-0843 |
Download |
IJIT 148 | Ensure Assign Responsibility for Scalable inside the Cloud Authors:KOTERU ANUSHA, N.SWAPNASUHASINI |
0844-0849 |
Download |