Volume 3 Issue 6, June 2014: Page 300
Downloads: 95 | Views: 515
Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti
Downloads: 113 | Views: 371
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1483 - 1487A 2.4 GHz Reference-Less Receiver for QPSK Demodulation
Devnandan K R, Dr. M N Sreerangaraju
Downloads: 111 | Views: 388
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1488 - 1491A Survey on: Email Security for Targeted Malicious Attacks
Jagdish R. Yadav, Dr. A. K. Srivastava
Downloads: 113 | Views: 494
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1492 - 1499Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique
Vinay Rana, Rani, Ravi
Downloads: 91 | Views: 375
Systematic Science, India, Volume 3 Issue 6, June 2014
Pages: 1500 - 1504Consumer Protection under Competition Law; 2002
Sweta Rao
Downloads: 105 | Views: 494
Chemistry, Nigeria, Volume 3 Issue 6, June 2014
Pages: 1505 - 1508Determination of Ascorbic Acid Levels in Hibiscus Sabdariffa (Zobo Rod) and Other Tropical Leaves
Nworie, F. S, Jedidiah, J
Downloads: 107 | Views: 428
Biology, India, Volume 3 Issue 6, June 2014
Pages: 1509 - 1512Peptide Mass Printing of Hemocyanin Protein of Spider; Hippasa Agelenoides From South India Using Maldi-TOF MS
Deepa B M, Jayaprakash, Ganesh Dama
Downloads: 134 | Views: 472
Management, Indonesia, Volume 3 Issue 6, June 2014
Pages: 1513 - 1518Strategy and Performance Evaluation Analysis of PT Nippon Indosari Corpindo
Made Citra Yuniastuti, Suci Fika Widyana, Feni Heryani
Downloads: 117 | Views: 364
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1519 - 1524Location Aided Optimized SPIN in Wireless Sensor Network
Anu Tanwar, Amit Rathee, Anjali
Downloads: 101 | Views: 539
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar