S.No | Title | Page No | Download |
IJIT 149 | Using Data Aggregation Technique Detecting Collusion Attacks in Sensor Networks Authors:NARAYANA RAO SESHAGIRI, N.SWAPNASUHASINI |
0850-0854 |
Download |
IJIT 150 | An Incentive Carry for Network Effectiveness Maximization Authors:P. NAVEEN KUMAR, N.SWAPNASUHASINI |
0855-0860 |
Download |
IJIT 151 | Micro Strip Patch Antenna using Coaxial Probe Feeding Technique to Operate in MICS-Band Authors:MEDIKONDA ASHOK KUMAR, G. S. N. RAJU, DR. S. MISRA |
0861-0865 |
Download |
IJIT 152 | Discovery of Unreliable Attacks in Wireless Sensor Networks Authors:M. SRAVYA, G. THEJASWI, N. SENDHIL KUMAR |
0866-0877 |
Download |
IJIT 153 | Enabling Distributed Accountability for Accessible within the Cloud Computing Authors:R. HAMSA VENI, P. NIKHIL, P. SEKHAR |
0878-0882 |
Download |
IJIT 154 | An Efficient Survey on Privacy-Preserving Access Control Framework for Relational Data Authors:SHAIK MUJALUDDIN, CH. SUBBARAO, SYED ABDUL HAQ |
0882-0888 |
Download |
IJIT 155 | Environmental Parameters Monitoring by WSN and Raspberry Pi Authors:GADELA SREENIVASA RAO |
0889-0893 |
Download |
IJIT 156 | Secure Multi Owner Data Sharing for Cloud Computing Platforms with Dynamics Groups Authors:ETAKOTI MANASA, MAHAMMAD SHAREEF, KARAMAKA SURESH |
0894-0901 |
Download |
IJIT 157 | Enabling Proof of Retrievability in Cloud Computing with Resource Constrained Devices Authors:MADDIPATLA SAILAJA, VARAPRASAD GAJJALA, KARAMALA SURESH |
0902-0907 |
Download |
IJIT 158 | A Survey on Audit Free Cloud Storing Through Deniable ABE Authors:R. SAMPURNA, P. SRINIVASULU |
0908-0911 |
Download |
IJIT 159 | Secure Data Retrieval in WSN using CP-ABE Authors:BHAVANA S G, AMARESHWAR |
0912-0915 |
Download |
IJIT 160 | Comparative Analysis of Grid side Converters for Leakage Current Reduction Authors:B. TULASI, P. SUNEEL KUMAR |
0916-0921 |
Download |
IJIT 161 | Cloud-Based Multimedia Content Protection System Authors:AYAD HASAN ADHAB, T. RAMDAS NAIK |
0922-0927 |
Download |
IJIT 162 | A Survey on Identity Based Integrity Verification Mistreatment PDP in Multi Cloud Storage Authors:BOMMINI VASAVI, J. SIVA REDDY |
0928-0930 |
Download |
IJIT 163 | Design of Logic Sequential Circuits in the Application of Multiple Value Logic Authors:D. MADHAVI, ASHWINI KUMAR PANDEY |
0931-0935 |
Download |
IJIT 164 | Enhanced Decimal Matrix Code for Discovery and Correction of Cell Upsets in SRAM Authors:K. SREE DIVYA, M. MASTHANAIAH |
0936-0940 |
Download |
IJIT 165 | Aging-Aware Reliable Multiplier Factor Style with Adjustive Hold Logic Authors:G. VENKATA KRISHNA, M. MASTHANAIAH |
0941-0946 |
Download |
IJIT 166 | Energy-Aware Load Balancing and Software Scaling for the Cloud Ecosystem Authors:SAJA SADIQ KADIM, T. RAMDAS NAIK |
0946-0949 |
Download |