Volume 3 Issue 6, June 2014: Page 380
Downloads: 1 | Views: 466
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1884 - 1886Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din
Downloads: 107 | Views: 384
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Downloads: 81 | Views: 715
Biology, India, Volume 3 Issue 6, June 2014
Pages: 1992 - 1994Mangiferaindica: Ethnopharmacology of Mangiferin from its Leaf Extract
Sheetal Sharma
Downloads: 114 | Views: 424
Medicine Science, India, Volume 3 Issue 6, June 2014
Pages: 1995 - 2000Effectiveness of Nursing Interventions on Pain Associated with Intramuscular Injection
Gitanjali Zore, Ragina Dias
Downloads: 115 | Views: 437
Electrical Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2001 - 2003Implementation of Maximum Power Point Tracking On High Boost Ratio Hybrid Transformer Based DC-DC Converter
Sudin.S.K, Sujith S
Downloads: 121 | Views: 390
Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014
Pages: 2004 - 2009Image Encryption Based on Pixel Shuffling with 3D Chaotic System
Asia Mahdi Naser Alzubaidi
Downloads: 104 | Views: 499
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2010 - 2013Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet
Amita Jaiswal, Arun Kumar Shukla
Downloads: 93 | Views: 371
Engineering Science, India, Volume 3 Issue 6, June 2014
Pages: 2014 - 2020Design and Implementation of Saliency Detection Model in H.264 Standard
Sheeba Shabnam, H.N. Latha
Downloads: 112 | Views: 338
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2021 - 2024An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs
Mohan Babu G, S Balaji
Downloads: 106 | Views: 473
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi