International Journal of Science and Research (IJSR)
Information Technology
Downloads: 103 | Views: 551
Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 2493 - 2496An Effective Up-Growth Algorithm for Discovering High Utility Itemset Mining
Anuja Palhade | Rashmi Deshpande
Downloads: 103 | Views: 489
Information Technology, India, Volume 4 Issue 8, August 2015
Pages: 1437 - 1440Comparative Analysis of Various Denoising Techniques for MRI Images
Priya C. Nair | G. Suganthi
Downloads: 103 | Views: 375
Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak | R. S. Apare
Downloads: 103 | Views: 452
Information Technology, Kenya, Volume 5 Issue 2, February 2016
Pages: 1723 - 1725An E-Government-Integration Framework for County Governments in Kenya
Florence K. Maweu | Josphat Karani
Downloads: 103 | Views: 592
Information Technology, India, Volume 5 Issue 7, July 2016
Pages: 1920 - 1924Improving Stability, Smoothing and Diversifying of Recommender Systems
Sagar Sontakke | Pratibha Chavan
Downloads: 103 | Views: 445
Information Technology, Iraq, Volume 5 Issue 9, September 2016
Pages: 1134 - 1137A View to Criterion for Organizes and Manages Unstructured Data
Yasir Ali Mmutni Alanbaky
Downloads: 103 | Views: 501
Information Technology, India, Volume 6 Issue 3, March 2017
Pages: 1403 - 1405Inverse Problem with Solution Using Data Mining
Ashmikumari Shah | Pooja Jardosh
Downloads: 103 | Views: 530
Information Technology, Zimbabwe, Volume 7 Issue 9, September 2018
Pages: 290 - 296Exploring the Pros and Cons of Social Media Use: Is It Time for Organisations to Consider Appointing Social Media Officers
Beauty Mugoniwa | Samuel Musungwini | Samuel Simbarashe Furusa
Downloads: 103 | Views: 543
Information Technology, Saudi Arabia, Volume 9 Issue 12, December 2020
Pages: 276 - 284Business Process Intelligence: A Case Study of Request a Ride
Zelal Shearah | Somayah Aljohi | Salma Althebiani | Nedaa Almuallim | Salma Alhag
Downloads: 102 | Views: 620
Information Technology, Nigeria, Volume 3 Issue 4, April 2014
Pages: 528 - 535Document Security within Institutions Using Image Steganography Technique
Ahaiwe J.