Article of the Month
Downloads: 353 | Views: 559 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Volume 3 Issue 6, June 2014: Page 2
Downloads: 107 | Views: 183 | Rating: 6.4 / 10
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh | Savita Shiwani
Downloads: 81 | Views: 238 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.7 / 10
Biology, India, Volume 3 Issue 6, June 2014
Pages: 1992 - 1994Mangiferaindica: Ethnopharmacology of Mangiferin from its Leaf Extract
Downloads: 110 | Views: 197 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 7.3 / 10
Medicine Science, India, Volume 3 Issue 6, June 2014
Pages: 1995 - 2000Effectiveness of Nursing Interventions on Pain Associated with Intramuscular Injection
Gitanjali Zore | Ragina Dias
Downloads: 114 | Views: 208 | Rating: 6.8 / 10
Electrical Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2001 - 2003Implementation of Maximum Power Point Tracking On High Boost Ratio Hybrid Transformer Based DC-DC Converter
Sudin.S.K | Sujith S [2]
Downloads: 121 | Views: 194 | Rating: 7 / 10
Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014
Pages: 2004 - 2009Image Encryption Based on Pixel Shuffling with 3D Chaotic System
Asia Mahdi Naser Alzubaidi [3]
Downloads: 104 | Views: 233 | Rating: 6.4 / 10
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2010 - 2013Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet
Amita Jaiswal [2] | Arun Kumar Shukla [4]
Downloads: 93 | Views: 168 | Rating: 7 / 10
Engineering Science, India, Volume 3 Issue 6, June 2014
Pages: 2014 - 2020Design and Implementation of Saliency Detection Model in H.264 Standard
Sheeba Shabnam | H.N. Latha
Downloads: 112 | Views: 169 | Rating: 6.3 / 10
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2021 - 2024An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs
Mohan Babu G | S Balaji
Downloads: 106 | Views: 195 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.6 / 10
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Downloads: 108 | Views: 185 | Monthly Hits: ⮙1 | Rating: 6.8 / 10
Hematology, India, Volume 3 Issue 6, June 2014
Pages: 2030 - 2033Red Cells Morphological Changes on Peripheral Blood Smear Hematological Finding in HIV Infection
Sharma S [5] | Panchonia A