Article of the Month
Downloads: 352 | Views: 547 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Volume 3 Issue 6, June 2014: Page 30
Downloads: 112 | Views: 164
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1454 - 1457Performance Analysis of Hierarchical Routing Protocols of Wireless Sensor Network: A Survey
Sunny Chaudhary
Downloads: 120 | Views: 195
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1458 - 1460An Efficient VLSI Implementation of Lossless ECG Encoder Design
Vijay Kumar K C | H. S. Veena
Downloads: 108 | Views: 163
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1461 - 1465Improvement of Carrier to Interference plus Noise Ratio in WiMAX Networks Using Femtocell Base Station Concept
Pruthviraja C B | Lata S H
Downloads: 112 | Views: 202
Financial Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1466 - 1469Digital Currency: The Emergence of Bitcoins
Thabiso Peter Mpofu [6] | Budwell Masaiti [2] | Macdonald Mukosera [4]
Downloads: 112 | Views: 189
Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1470 - 1473The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
Thabiso Peter Mpofu [6] | Noe Elisa | Nicholaus Gati
Downloads: 112 | Views: 189
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1474 - 1478An Efficient High Speed Convolution Encoder and Viterbi Decoder
Chandan Nagraj | S Muralinarasimham
Downloads: 95 | Views: 207
Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera [4] | Thabiso Peter Mpofu [6] | Budwell Masaiti [2]
Downloads: 112 | Views: 180
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1483 - 1487A 2.4 GHz Reference-Less Receiver for QPSK Demodulation
Devnandan K R | Dr. M N Sreerangaraju
Downloads: 111 | Views: 172 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1488 - 1491A Survey on: Email Security for Targeted Malicious Attacks
Jagdish R. Yadav | Dr. A. K. Srivastava
Downloads: 113 | Views: 187
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1492 - 1499Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique
Vinay Rana | Rani [593] | Ravi [634]