International Journal of Science and Research (IJSR)
Information Technology
Downloads: 135 | Views: 416
Information Technology, India, Volume 5 Issue 12, December 2016
Pages: 675 - 679AES Enabled Private Information Retrieval Scheme for Location Based Queries
Lothe Ashwini Bhaskar | Apare Ravindra S
Downloads: 135 | Views: 442
Information Technology, Kenya, Volume 5 Issue 12, December 2016
Pages: 806 - 816Evaluation of Physiological and Yield Parameters for Improving Water Use Efficiency and Drought Tolerance in (Phaseolus vulgaris L.)
Alharbi Najeeb | Alsamadany Hameed | Erskine William | Clements Jonathan
Downloads: 135 | Views: 445
Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017
Pages: 582 - 585Predict Academic Performance of Students using an K Nearest Neighbour Algorithm Case Study: MATLAB Course
Noha Hassan Osman Ragab | Dr Saif Eldin Fattoh
Downloads: 135 | Views: 547
Information Technology, Saudi Arabia, Volume 7 Issue 1, January 2018
Pages: 1372 - 1380The Online Examination Standards Requirements Framework and its Security Management's System Techniques
Dr. Suzan Atia Mostafa Alsaid
Downloads: 135 | Views: 655
Information Technology, India, Volume 7 Issue 2, February 2018
Pages: 324 - 326Flood Prediction and Disaster Management (FloodAlert)
Siddheshwari Raut | Pranjali Vaidya | Pranav Gupta | Prof. Rohit Barve
Downloads: 135 | Views: 664
Information Technology, Congo, Volume 7 Issue 10, October 2018
Pages: 1682 - 1686Opinion of the Population of the City of LIKASI on National Computer Education Program in DRC
Ngoie Kantumoya Gaston
Downloads: 135 | Views: 739
Information Technology, Philippines, Volume 8 Issue 6, June 2019
Pages: 1826 - 1830Human Resource Information Management System
Emmanuel Carlos Navarro
Downloads: 135 | Views: 704
Computer Science and Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 1888 - 1891Analysis of Distributed Object Technologies
Dr. Sanjay E. Yedey
Downloads: 134 | Views: 687
Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri | Haroon Shoukat Ali | Jamaludin Bin Ibrahim
Downloads: 134 | Views: 706
Information Technology, India, Volume 3 Issue 2, February 2014
Pages: 397 - 401Encryption of Text Using Fingerprints
Abhishek Sharma | Narendra Kumar