S.No | Title | Page No | Download |
IJIT 271 | Secure Auditing and Deduplicating Data in Cloud Authors:N. SHALINI, P. D. CHIDHAMBARA RAO |
1511-1514 |
Download |
IJIT 272 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Authors:G. SUREKHA, P. D. CHIDHAMBARA RAO |
1515-1520 |
Download |
IJIT 273 | Protecting Data with Accessible Constant Facilities for Cloud Storage System Authors:K. SASI, G. LAKSHMIKANTH |
1521-1524 |
Download |
IJIT 274 | Characteristics-Established Encryption with Redistribute Abrogation in Cloud Computing Authors:BHARGAVI. B, K. SWAPNA SUDHA |
1525-1531 |
Download |
IJIT 275 | Human Body Segmentation Based on Mean Shift Algorithm in Video Sequences Authors:D. GEETHANJALI, K. YOGITHA BALI, P. GIRI BABU |
1532-1534 |
Download |
IJIT 276 | Engineering College Laboratory Automation and Security System through Email using Raspberry Pi Processor Authors:BIRASALAPATI DORASWAMY |
1535-1539 |
Download |
IJIT 277 | Supporting Privacy Protection in Personalized Web Search Authors:SATISH .THOTA, S.M. ROY CHOUDRI |
1540-1543 |
Download |
IJIT 278 | Perspective Based Aggregation Method for Evaluating the Credibility of Leading Sessions from Mobile Apps Authors:D. AMEER SUHEL, KUMBHA RAMESH |
1544-1546 |
Download |
IJIT 279 | Solving Integrity Verification in Cloud Storage Authors:G. LAVANYA, KUMBHA RAMESH |
1547-1549 |
Download |
IJIT 280 | A Rapid Technique to Type-Combination Queries for Colossal-Scale Ontologies in Big Data Environments Authors:ARUN KUMAR T, K. RAMESH, K.SWAPNA SUDHA |
1550-1554 |
Download |
IJIT 281 | Major Abilities Collection Making Use of Modeling and Analytical Structure for Sensing Program on Map Reduce Framework Authors:A.VINAY KUMAR, K. RAMESH, K.SWAPNA SUDHA |
1555-1564 |
Download |
IJIT 282 | Efficient and Privacy Aware Data Aggregation in Mobile Sensing Authors:RUBINA NEHA, SHAISTA NOUSHEEN, KHADARBI SHAIK |
1565-1570 |
Download |
IJIT 283 | Trustworthy Resource Scheduling in Cloud using Skewness Algorithm Authors:RENUKA N HUCHHE, GAYATRI M BHANDARI |
1571-1573 |
Download |
IJIT 284 | Dual Tree Complex Wave Transform using Bootstrap Method for Noise Reduction Authors:I. KULLAYAMMA, B. RAMADEVI |
1574-1580 |
Download |
IJIT 285 | Discovery of Neighborhood Location Query Based Spatial Networks Authors:T.VENKATA REDDY, KLNC.PRAKASH, A.SUBRAMANYAM |
1581-1584 |
Download |
IJIT 286 | Enabling Evidence of Recoverability in Cloud Storage with Source Managed Gadgets Authors:G.BHARGAVI, B.DHANA LAKSHMI |
1585-1588 |
Download |
IJIT 287 | Cloud Computing Platform using Data Sharing in the Secure Groups Authors:M. KEERTHI, B. BHARATH KUMAR |
1589-1595 |
Download |
IJIT 288 | Best Possible Matched Patterns for Record Modeling in Expertise Filtering Authors:D. J. SWETHA KIRAN, S. VENKATALAKSHMI |
1596-1602 |
Download |
IJIT 289 | Minimizing Consistent Querying in Mobile Cloud Expertise Authors:K.CHARITHAKEERTHI, C.SUDARSANA REDDY |
1603-1606 |
Download |
IJIT 290 | A Fuzzy Based Voltage Source Control of PV Inverting System in a CERTS Microgrid Authors:D. DASTAGIRI, M.VENKATA KISHORE, P. RESHMA |
1607-1612 |
Download |