Volume 3 Issue 6, June 2014: Page 300
Downloads: 95 | Views: 558
Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti
Downloads: 113 | Views: 403
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1483 - 1487A 2.4 GHz Reference-Less Receiver for QPSK Demodulation
Devnandan K R, Dr. M N Sreerangaraju
Downloads: 111 | Views: 416
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1488 - 1491A Survey on: Email Security for Targeted Malicious Attacks
Jagdish R. Yadav, Dr. A. K. Srivastava
Downloads: 113 | Views: 532
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1492 - 1499Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique
Vinay Rana, Rani, Ravi
Downloads: 91 | Views: 412
Systematic Science, India, Volume 3 Issue 6, June 2014
Pages: 1500 - 1504Consumer Protection under Competition Law; 2002
Sweta Rao
Downloads: 106 | Views: 544
Chemistry, Nigeria, Volume 3 Issue 6, June 2014
Pages: 1505 - 1508Determination of Ascorbic Acid Levels in Hibiscus Sabdariffa (Zobo Rod) and Other Tropical Leaves
Nworie, F. S, Jedidiah, J
Downloads: 107 | Views: 461
Biology, India, Volume 3 Issue 6, June 2014
Pages: 1509 - 1512Peptide Mass Printing of Hemocyanin Protein of Spider; Hippasa Agelenoides From South India Using Maldi-TOF MS
Deepa B M, Jayaprakash, Ganesh Dama
Downloads: 134 | Views: 516
Management, Indonesia, Volume 3 Issue 6, June 2014
Pages: 1513 - 1518Strategy and Performance Evaluation Analysis of PT Nippon Indosari Corpindo
Made Citra Yuniastuti, Suci Fika Widyana, Feni Heryani
Downloads: 117 | Views: 392
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1519 - 1524Location Aided Optimized SPIN in Wireless Sensor Network
Anu Tanwar, Amit Rathee, Anjali
Downloads: 101 | Views: 571
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar