S.No | Title | Page No | Download |
IJIT 230 | Experimental Evaluation of the Heat Exchangers Authors:SETTEM LAKSHMI NITHEESHA, MD.ZUBAIR |
1293-1302 |
Download |
IJIT 231 | Cloud Computing Protection for Outsourced Record in Cloud Computing Authors:P. RAMADEVI, N. SIDDAIAH |
1303-1306 |
Download |
IJIT 232 | Privacy Grid System for Continues Detecting Errors Data on Cloud Authors:EMPARALA HARISH, N. SIDDAIAH |
1307-1311 |
Download |
IJIT 233 | Collaborative Data Publishing for Telemedicine File Management System Authors:P. NIRANJAN BABU, N. SIDDAIAH |
1312-1316 |
Download |
IJIT 234 | .......................................... Authors:........................... |
.......... |
Download |
IJIT 235 | Unidentified Friend Proposition System for Mobile Social Networks Authors:C.RAMANI, B.BHARATH KUMAR |
1325-1330 |
Download |
IJIT 236 | Quality Information Maintaining Shared Data in Cloud Systems Authors:S. BINDU MADHAVI, N. SIDDAIAH |
1331-1334 |
Download |
IJIT 237 | A Voltage Controlled D-STATCOM Used In Three Phase Four Wire System for Power Quality Improvement Authors:J.RAGHAVENDRA, C.SREENIVASULU, DR.G.MADHUSUDHANARAO |
1334-1341 |
Download |
IJIT 238 | Improved Pre-Failure Healing System for Movable Sensor Networks Authors:G. MAHENDER, P. UPENDER |
1342-1345 |
Download |
IJIT 239 | Protection Evaluation Model with Proof of Retrievability in Cloud Computing Authors:C.LEKHYA, C.K.HEMANTHA RAMA |
1346-1351 |
Download |
IJIT 240 | Design of High Performance Binary Image Processing Technique on FPGA using Soft-core Processor Architecture Authors:T. KRISHNA VENI, C. MD. ASLAM |
1352-1357 |
Download |
IJIT 241 | Performance Analysis for OFDM System using Fourier Transform and Wavelet Transform with Different Modulation Techniques Authors:MOHMMED FASIUDDIN, M.C.RAJU |
1358-1362 |
Download |
IJIT 242 | A Cloud Safety Process of Knowledge Integrity in Cloud Storage Authors:NASINA MALLIKARJUNA, G. LAKSHMIKANTH |
1363-1364 |
Download |
IJIT 243 | A Secure Effective Green Mechanism for Budget Decline in Cloud Authors:PULIPUTHURU RUPA, SRINUVASULU G |
1365-1372 |
Download |
IJIT 244 | MAC Using Compressor Based Multiplier and Carry Save Adder Authors:NAGAMANOHAR TENALI, MUKESH GANGALA |
1373-1376 |
Download |
IJIT 245 | A Novel Approach for Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Authors:VENKATESH GUGULOTH, P.SATHISH REDDY, VIJAY PASUNURI |
1377-1379 |
Download |
IJIT 246 | Detection of Malicious Packet Dropping Attacks in Wireless Sensor Networks Authors:RAJINI SANDHIREDDY, M.HARATHI, S.G NAWAZ |
1380-1383 |
Download |
IJIT 247 | Truthful Recourse Scheduling in Cloud Environment Authors:RENUKA N HUCHHE, GAYATRI M BHANDARI |
1384-1387 |
Download |
IJIT 248 | CWC: A Distributed Computing Infrastructure using Smart Phones Authors:A. RAGHAVENDRA PRAVEEN KUMAR, D. JAYANARAYANA REDDY |
1388-1394 |
Download |
IJIT 249 | Energy Aware Load Balancing and Application Scaling for Cloud Ecosystem Authors:C. PRAVEEN KUMAR, G. SOMASEKHAR, DR. S. PREM KUMAR |
1395-1400 |
Download |