S.No | Title | Page No | Download |
IJIT 250 | Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Authors:DR. M. JAGADEESHWAR, DR. SUMAN KUMAR SHRIRAMOJU, DR. ADLOORI RAMESH BABU |
1401-1405 |
Download |
IJIT 251 | A Secure and Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data Authors:K. S. HARIKA HAMPI, K. LAKSHMI, DR. S. PREM KUMAR |
1406-1411 |
Download |
IJIT 252 | VulHunter: Toward Discovering Vulnerabilities in Android Applications Authors:K. MANOHAR, U. VEERESH, DR. S. PREM KUMAR |
1412-1415 |
Download |
IJIT 253 | A Survey on a Hybrid Cloud Approach for Secure Authorized Deduplication Authors:A.VENKATA RAMANA, P.SATHISH REDDY, BHUKYA RADHA |
1416-1418 |
Download |
IJIT 254 | Portability-Aiding Confined Protocol for Spontaneous Wi-Fi Networks Authors:M.PRAVEEN REDDY, A.K.PUNEETH KUMAR |
1419-1424 |
Download |
IJIT 255 | Control Area Network (CAN) based Intelligent Vehicle System for Driver Assistance using Advanced RISC Machines (ARM) Authors:P. PRIYATHAM, A.M. GUNA SEKHAR |
1425-1427 |
Download |
IJIT 256 | Authentic and Anonymous Multi-Owner Data Sharing for Dynamic Groups in the Cloud Authors:I.LALASA, N. JAYAKRISHNA |
1428-1433 |
Download |
IJIT 257 | Provable Multi Copy Dynamic Records Control in Cloud Computing Systems using Soft-core Processor Architecture Authors:R.MRUDULA, P.SATHISH REDDY, DANDA SWATHI |
1434-1438 |
Download |
IJIT 258 | Confidentiality-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, DONURU SWATHI |
1439-1444 |
Download |
IJIT 259 | A Novel Multilevel Based STATCOM for High Power Application in a Deregulated Power System Authors:R. ANUSHA, DR. V. C. VEERA REDDY |
1445-1450 |
Download |
IJIT 260 | Integration of Solar PV & Battery Storage System of a Three–Level NPC Inverter using FLC Authors:P. PRASANNA SARASWATHI, K. SUMA LATHA |
1451-1459 |
Download |
IJIT 261 | Design and Implementation of Reverse Converter using Parallel Prefix Adders Authors:J. KEERTHI PRIYA, M. VAMSI KRISHNA |
1460-1464 |
Download |
IJIT 262 | Bandwidth Optimized Everlasting Querying and Cozy Storage Choices In Disbursed Clouds Authors:MANDALA LAKSHMI PREETHI, G. LAKSHMIKANTH |
1465-1469 |
Download |
IJIT 263 | An Effectiveness Maximizing Algorithm for Best Diffusion in Interruption Based Wireless Networks Authors:M. JAHNAVI, N. JAYAKRISHNA |
1470-1473 |
Download |
IJIT 264 | Correspondence Search for Falling the Dimensional Trust Authors:U. GOPIDEVI, N. JAYAKRISHNA |
1474-1478 |
Download |
IJIT 265 | A Literature Survey On A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces: Smart Crawler Authors:E.ESASWINI, V. NAVEEN KUMAR |
1479-1482 |
Download |
IJIT 266 | A Literature Survey On Mobile App Recommendation And Ranking Fraud Detection On Rating Review & Ranking Authors:I. ASHA, P. NANDA KISHORE |
1483-1486 |
Download |
IJIT 267 | Authenticated Key Exchange Protocols for Parallel Network File Systems Authors:GANJAI LUCY, K. LAKSHMI, ANIL KUMAR |
1487-1491 |
Download |
IJIT 268 | Solar PV and Battery Storage Integration using a New Configuration of a Three-Level NPC Inverter with Advanced Control Strategy Authors:N. RAGHU CHANDANA, P. SARALA |
1492-1497 |
Download |
IJIT 269 | An Effective Hiding of Consolidated and Shared Network through Steady Array Authors:SHAIK HASAN BASHA, P. D. CHIDHAMBARA RAO |
1498-1503 |
Download |