International Journal of Science and Research (IJSR)
Information Technology
Downloads: 117 | Views: 504
Information Technology, Egypt, Volume 3 Issue 5, May 2014
Pages: 654 - 664Bat Swarm Algorithm for Wireless Sensor Networks Lifetime Optimization
Marwa Sharawi | E. Emary | Imane Aly Saroit | Hesham El-Mahdy
Downloads: 117 | Views: 486
Information Technology, Sri Lanka, Volume 3 Issue 10, October 2014
Pages: 838 - 841Mobile Web Volet
V. Senthooran | K. H. M. S. P. Kasthurisinghe
Downloads: 117 | Views: 554
Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 461 - 465Data Hiding Using Steganography: A Review
Nishigandha P. Mangle | Prof. Sanjay S. Dhopte
Downloads: 117 | Views: 523
Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1241 - 1243Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Prateek Shivhare | Savaridassan.P
Downloads: 117 | Views: 552
Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1998 - 2001Survey Paper on Phishing Detection: Identification of Malicious URL Using Bayesian Classification on Social Network Sites
Vaibhav V. Satane | Arindam Dasgupta
Downloads: 117 | Views: 595
Information Technology, Kenya, Volume 4 Issue 6, June 2015
Pages: 1061 - 1067ICT Infrastructural Factors That Influence the Adoption of E-Learning in Public Secondary Schools in Kenya
Munyi Felister Wanyaga | John W. Kamau | Dr. Joyce Gikandi
Downloads: 117 | Views: 660
Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 302 - 305Review: Parsing Clothes by Giving Weak Supervision using Pose Estimation in Fashion Photographs
Mayuri P. Waghmode | Umesh B. Chavan
Downloads: 117 | Views: 604
Information Technology, India, Volume 5 Issue 5, May 2016
Pages: 2114 - 2117Knowledge Management Approaches for Customer Care Effectiveness
A. V. Murali
Downloads: 117 | Views: 510
Information Technology, India, Volume 5 Issue 6, June 2016
Pages: 2111 - 2116Performance Evaluation of Weighted Time-Parameterized Edit?Distance based Trajectory Clustering in RFID Environment
Sagar V. Mahajan | R. H. Borhade
Downloads: 117 | Views: 527
Information Technology, Kenya, Volume 6 Issue 4, April 2017
Pages: 1676 - 1681A Novel Approach for Combating Cyber-Security Issues in Cloud Based E-Learning in Kenyan Universities
Judith Chepkemoi Boit | Watson Musyoki Kanuku