International Journal of Science and Research (IJSR)
Information Technology
Downloads: 127 | Views: 695
Information Technology, Nigeria, Volume 2 Issue 11, November 2013
Pages: 154 - 158Ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations
Mosud Y. Olumoye
Downloads: 127 | Views: 624
Information Technology, India, Volume 3 Issue 8, August 2014
Pages: 91 - 94A Framework for Parallel Data Processing in Cloud Systems
Shripad S. Lokhande | Manoj Limchand Bangare
Downloads: 127 | Views: 486
Information Technology, Iraq, Volume 4 Issue 1, January 2015
Pages: 389 - 393Investigating the Adoption of Telemedicine in Health Care System in Iraq
Ammar Wisam Abdulzhraa Altaher
Downloads: 127 | Views: 625
Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2301 - 2303Diagnosis of Heart Disease Using Data Mining Technique
Shinde S. B. | Amrit Priyadarshi
Downloads: 127 | Views: 588
Information Technology, Kenya, Volume 4 Issue 3, March 2015
Pages: 275 - 282Scaling up the Prevention, Treatment, and Control of Sexually Transmitted Diseases (STDs) through use of Information and Communication Technologies (ICTs) in the Provision of Information to Undergraduate Students at Moi University College of Health Sciences, Kenya
Serah Odini
Downloads: 127 | Views: 617
Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 325 - 330Result of Medical Diagnosis System Using Ripplet Transform
Hagote Kiran Kedarnath | B. S. Borkar
Downloads: 127 | Views: 485
Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 707 - 711An Efficient Failover Enabling Mechanism in OpenStack
S. Ramakrishnan
Downloads: 127 | Views: 544
Information Technology, Lebanon, Volume 4 Issue 12, December 2015
Pages: 156 - 159Concept of Graphical Interface of a Medical Information System (CheBHosp)
Mohamad Ali Cheaito | Marwan Cheaito
Downloads: 127 | Views: 669
Information Technology, India, Volume 5 Issue 1, January 2016
Pages: 88 - 93A Three Level Graphical Password Scheme for Providing High Degree of Security
Pranita H. Mokal | R. N. Denikar
Downloads: 127 | Views: 566
Information Technology, India, Volume 5 Issue 1, January 2016
Pages: 337 - 344Bootstrapping in Text Mining Applications
C. K. Chandrasekhar | M. R. Srinivasan | B. Ramesh Babu