S.No | Title | Page No | Download |
IJIT 423 | Energy-Aware Load Balancing and Application Scaling for the Cloud Ecosystem Authors:A.SINDHUJA, RAMESH BABU VARUGU |
2304-2309 |
Download |
IJIT 424 | Iterative Receiver for Flip-OFDM in Optical Wireless Communication Authors:K. VIJAYA, ASHOK KUMAR KONDURU, SHESHI REKHA |
2310-2313 |
Download |
IJIT 425 | .......................................... Authors:........................... |
.......... |
Download |
IJIT 426 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints Authors:JAHNAVI PARVATHANENI, RAMESH BABU VARUGU, A.NAGA SRI |
2317-2322 |
Download |
IJIT 427 | Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data Authors:G.SANDHYA RANI, RAMESH BABU VARUGU, V.VEDASAHITHI |
2323-2329 |
Download |
IJIT 428 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Authors:ANAGANTI SUDHA, MR.RAMESH BABU VARUGU, A.NAGA SRI |
2330-2334 |
Download |
IJIT 429 | CLOUD ARMOR: Supporting Reputation-Based Trust Management for Cloud Services Authors:DASARI SWAPNA, J. RAMESH BABU VARUGU, B.RAVINDER REDDY |
2335-2340 |
Download |
IJIT 430 | SELCSP: A Framework to Facilitate Selection of Cloud Service Providers Authors:L.NEERAJA, J.DEEPTHI, K.PAVAN KUMAR |
2341-2346 |
Download |
IJIT 431 | A Model for Data Sharing for Dynamic Groups Authors:VYJAYANTHI CHADA, P. SRAVANTHI, DEEPTHI JANAGAMA |
2347-2351 |
Download |
IJIT 432 | Design and Implementation of Blood Bank using Rapberry Pi Authors:A. REVATHI, K. MANJUNATH |
2352-2353 |
Download |
IJIT 433 | Intelligent Vehicle Monitoring System Based On Control Area Network Authors:ADDELA BHAVITHA, JILLELLA VENKATESHWARA RAO |
2354-2359 |
Download |
IJIT 434 | An Efficient BER using Secure Turbo Encoder Authors:CHIDDANA MADHU, M.RAJANI DEVI |
2360-2367 |
Download |
IJIT 435 | Telemetry Receiver (Decoding Techniques) Authors:A.YAMINI, G.KRISHNA, DR.D.VENKAT REDDY |
2368-2371 |
Download |
IJIT 436 | Compact Threshold Implementation of AES Encryption Authors:M.SRAVANTH KUMAR, K.HARI, V.TEJU |
2372-2377 |
Download |
IJIT 437 | Integration Disease Diagnosis using Machine Learning & Best Drug Identification using Big Data Authors:P. SARITHA, SIRAJ. P |
2378-2383 |
Download |
IJIT 483 | A System P2P File Sharing grouped Proximity-Aware Authors:S.RUBEENA, I.DEEPIKA |
2384-2385 |
Download |
IJIT 439 | Encryption and Auditing of Data using Deniable Attributes Authors:S.PRATHYUSHA, G. VISWANATH |
2386-2387 |
Download |
IJIT 440 | Privacy Preserving of Multiple Data Owners in Cloud Authors:P. SURESH KUMAR YADAV, P.C. PRABHU KUMAR |
2388-2391 |
Download |
IJIT 441 | User Identity Verification of Internet Services using OTP Authors:D. SUSEELA, M.V. JAYASREE |
2392-2397 |
Download |
IJIT 442 | Device Position Estimation Based on Acoustic Energy Distribution And Clustering Technique Authors:ADDANKI DIVYASRI, P.MALLIKARJUNA |
2398-2401 |
Download |