Role of Information Communication Technologies Adoption in SMES: Evidence from Botswana H Ongori Research Journal of Information Technology 1 (2), 79-85, 2009 | 128 | 2009 |
Higher Institutions Lecturers’ Attitude Towards Integration of ICT into Teaching and Research in Nigeria SA Onasanya, RA Shehu, RO Oduwaiye, LA Shehu Research Journal of Information Technology 2 (1), 1-10, 2010 | 121 | 2010 |
Factors Affecting e-Commerce Adoption in SMEs in the GCC: An Empirical study of Kuwait AI Al-Alawi, FM Al-Ali Research Journal of Information Technology 7 (1), 1-21, 2015 | 105 | 2015 |
Critical Factors of Implementing Knowledge Management in School Environment: A Qualitative Study in Hong Kong CH Leung Research Journal of Information Technology 2 (2), 66-80, 2010 | 89 | 2010 |
Steganography-Time to Time: A Review R Amirtharajan, JBB Rayappan Research Journal of Information Technology 5 (2), 53-66, 2013 | 70 | 2013 |
OFDM+CDMA+Stego = Secure Communication: A Review K Thenmozhi, P Praveenkumar, R Amirtharajan, V Prithiviraj, ... Research Journal of Information Technology 4 (2), 31-46, 2012 | 64 | 2012 |
Firmware for Data Security: A Review S Janakiraman, R Amirtharajan, K Thenmozhi, JBB Rayappan Research Journal of Information Technology 4 (3), 61-72, 2012 | 51 | 2012 |
Performance Analyzing of High Resolution Pan-sharpening Techniques: Increasing Image Quality for Classification using Supervised Kernel Support Vector Machine JT Sumantyo, HK Yuhendra Research Journal of Information Technology 3 (1), 12-23, 2011 | 49 | 2011 |
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego R Amirtharajan, JBB Rayappan Research Journal of Information Technology 4 (4), 124-139, 2012 | 47 | 2012 |
Distinguishing Employment of Stream Control Transmission Protocol over LTE-Advanced Networks GA Abed, M Ismail, K Jumari Research Journal of Information Technology 3 (4), 207-214, 2011 | 47 | 2011 |
Hybrid Algorithm of Cuckoo Search and Particle Swarm Optimization for Natural Terrain Feature Extraction H Kundra, H Sadawarti Research Journal of Information Technology 7 (1), 58-69, 2015 | 46 | 2015 |
Indoor Child Tracking in Wireless Sensor Network using Fuzzy Logic Technique A Rozyyev, H Hasbullah, F Subhan Research Journal of Information Technology 3 (2), 81-92, 2011 | 45 | 2011 |
A Robust Watermark Embedding in Smooth Areas AM Zeki, AA Manaf, AA Ibrahim, M Zamani Research Journal of Information Technology 3 (2), 123-131, 2011 | 40 | 2011 |
Why Image Encryption for Better Steganography R Amirtharajan, P Archana, JBB Rayappan Research Journal of Information Technology 5 (3), 341-351, 2013 | 39 | 2013 |
Fast and Accurate Template Matching Algorithm Based on Image Pyramid and Sum of Absolute Difference Similarity Measure F Alsaade Research Journal of Information Technology 4 (4), 204-211, 2012 | 37 | 2012 |
A Review on Multimedia Communications Cryptography AAZBBZ Yasser Salem, Mohamed Abomhara, Othman O. Khalifa Research Journal of Information Technology 3 (3), 146-152, 2011 | 36 | 2011 |
A Robust Tamperproof Watermarking for Data Integrity in Relational Databases V Prasannakumari Research Journal of Information Technology 1 (3), 115-121, 2009 | 35 | 2009 |
Kubera Kolam: A Way for Random Image Steganography R Amirtharajan, K Karthikeyan, M Malleswaran, JBB Rayappan Research Journal of Information Technology 5 (3), 304-316, 2013 | 32* | 2013 |
Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network A Rozyyev, H Hasbullah, F Subhan Research Journal of Information Technology 4 (4), 155-165, 2012 | 32 | 2012 |
Rubik’s Cube Blend with Logistic Map on RGB: A Way for Image Encryption P Praveenkumar, G Ashwin, SPK Agarwal, SN Bharathi, ... Research Journal of Information Technology 6 (3), 207-215, 2014 | 31 | 2014 |