International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Information Technology: Page 22: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Information Technology

Downloads: 128 | Views: 576

Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 347 - 353

A Fuzzy C ? Means Clustering Based on Density Sensitive Distance Metric with a Novel Penalty Term

S. Omprakash | T. Senthamarai | M. Hemalatha

Downloads: 128 | Views: 439

Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 523 - 525

Enhancing Security in Cloud by Self Destruction Mechanism

Kshama D. Bothra | Sudipta Giri

Downloads: 128 | Views: 545

Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 745 - 746

Importance of Section 66A in Information Technology Act 2000

Dr. D. S. Selvakumar

Downloads: 128 | Views: 531

Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 774 - 776

Data Loss Prevention: Secure Important Data & Prevent By Threats

Akash Deep Gangwar | J. Godwin Ponsam

Downloads: 128 | Views: 598

Information Technology, Kenya, Volume 5 Issue 10, October 2016

Pages: 376 - 381

A Review of Mobile Social Software Awareness and Utilization

Masese.Nelson | Samwuel Mbugua | Geoffrey Muchiri Muketha

Downloads: 128 | Views: 481

Information Technology, Kenya, Volume 5 Issue 12, December 2016

Pages: 479 - 483

A Theoretical Review of Integration of Managed Equipment Services and Delivery of Healthcare Services

Iloka Kenneth Malongo | Dr. David M. Nzuki

Downloads: 128 | Views: 581

Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 1796 - 1799

Session Authentication Using Color Schemes and Images

Manjula Devi B | Rinny Mamachan

Downloads: 128 | Views: 504

Information Technology, Kenya, Volume 8 Issue 9, September 2019

Pages: 1014 - 1023

To Investigate the Strength of Existing Information Security Policies among SACCOS in Kenya

Jerotich Sirma | Silvance O. Abeka | Benard Okelo

Downloads: 128 | Views: 448

Information Technology, India, Volume 8 Issue 9, September 2019

Pages: 1512 - 1513

Computer Architecture and Characteristics of Software Cloud Computing

K. Srinivas | A. Appa Rao

Downloads: 128 | Views: 651

Information Technology, Philippines, Volume 8 Issue 10, October 2019

Pages: 1816 - 1821

Information Communication Technology: Examining the Digital Divide in JRMSU System

Leonardo D. Cainta | Pretty Abegail C. Pacilan

Top