International Journal of Science and Research (IJSR)
Information Technology
Downloads: 126 | Views: 608
Information Technology, India, Volume 2 Issue 1, January 2013
Pages: 212 - 216Survey on Security Challenge for Data forwarding in Cloud
Tushar A. Rane | Shrishail T. Patil | Anita H. Khade
Downloads: 126 | Views: 681
Information Technology, Kenya, Volume 2 Issue 3, March 2013
Pages: 65 - 70Subjective Norms and Information Systems Implementation: A Case of Higher Education Institutions in a developing country
Wambugu G. Mariga | Wausi A. Nduku
Downloads: 126 | Views: 648
Information Technology, Nigeria, Volume 2 Issue 3, March 2013
Pages: 518 - 524A Hybrid Security Model for Mobile Agents in Distributed Systems
Ini J. Umoeka | Imo J. Eyoh
Downloads: 126 | Views: 502
Information Technology, Sri Lanka, Volume 2 Issue 7, July 2013
Pages: 181 - 186A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography
V. Senthooran | L. Ranathunga | KokSheik Wong
Downloads: 126 | Views: 670
Information Technology, India, Volume 2 Issue 11, November 2013
Pages: 66 - 70Enhancing Recommendation on Customizable E-Commerce System with Association & Ranking
S. Saravanakumar | S. Diviya
Downloads: 126 | Views: 602
Information Technology, Malaysia, Volume 2 Issue 11, November 2013
Pages: 264 - 269The Effectiveness of Administration and Co-curriculum in Sport to the Involvement of Students in Vocational College in Malaysia
Melati Binti Yaacob | Hairul Nurasyikin Binti Haron
Downloads: 126 | Views: 763
Information Technology, India, Volume 3 Issue 1, January 2014
Pages: 371 - 374Edutainment based Mobile Phone Games for Health Communication in India
Anjali Singh | Aparna Khanna
Downloads: 126 | Views: 635
Information Technology, India, Volume 3 Issue 2, February 2014
Pages: 88 - 90WSN: Various Attacks and IDS in WSN
Amol N. Rindhe | Sanjay V. Dhopte
Downloads: 126 | Views: 566
Information Technology, Nigeria, Volume 3 Issue 8, August 2014
Pages: 318 - 320Assessment of Availability and Use of Information and Communication Technology (ICT) Resources in Energy Research Centre, University of Nigeria Nsukka: An Empirical Study
Jonathan N. Chimah | Chukwubuisi H. Chikwelu
Downloads: 126 | Views: 435
Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 1142 - 1145Intrusion Detection Using Data Mining Approach
Kamble Jayshree R. | Rangdale S.P.