Article of the Month
Downloads: 163 | Views: 180 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 425 - 430Search Engine Optimization to Increase Website Visibility
Vignesh. J, Deepa. V
Volume 3 Issue 2, February 2014: Page 2
Downloads: 122 | Views: 137 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 51 - 56Geospatial Discriminative Patterns with Principle Direction for Effective Crime Detection
R. Saradha [2] | S. Deepika [3]
Downloads: 131 | Views: 150 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 57 - 60A Proposed Android Based Mobile Application to Monitor Works at Remote Sites
S. Sivasubramanian | S. Sivasankaran [7] | S. Thiru Nirai Senthil
Downloads: 128 | Views: 144 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Statistics, India, Volume 3 Issue 2, February 2014
Pages: 61 - 63Travelling Viewed Statistically
Nileema Bhalerao
Downloads: 141 | Views: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Mechanical Engineering, India, Volume 3 Issue 2, February 2014
Pages: 64 - 65Actuating and Sensing Using Piezoelectric Cantilever
R S Bindu | Kushal M Potdar
Downloads: 127 | Views: 145 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Agronomy, Ethiopia, Volume 3 Issue 2, February 2014
Pages: 66 - 72Feed Resource Assessment and Utilization in Baresa Watershed, Ethiopia
Mergia Abera [2] | Adugna Tolera | Getnet Assefa
Downloads: 121 | Views: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 73 - 75Defensive Security Mechanisms for Cloud Computing Security Risks- A Review
Geethu Krishna [2] | Jyothis T. S
Downloads: 115 | Views: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Bio Mechanics Engineering, India, Volume 3 Issue 2, February 2014
Pages: 76 - 78Finite Element Analysis of External Ilizarov Ring and Hybrid Fixators
D. Bubesh Kumar | K. G. Muthurajan
Downloads: 124 | Views: 136 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 79 - 82Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography
D. Pradeepa | S. Rani Lakshmi
Downloads: 137 | Views: 153 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 2, February 2014
Pages: 83 - 87Exploring Mutational Pathways of HIV Using Genetic Algorithm
K. M. Monica
Downloads: 126 | Views: 137 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Information Technology, India, Volume 3 Issue 2, February 2014
Pages: 88 - 90WSN: Various Attacks and IDS in WSN
Amol N. Rindhe | Sanjay V. Dhopte