Article of the Month
Downloads: 352 | Views: 543 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Volume 3 Issue 6, June 2014: Page 1
Downloads: 112 | Views: 179
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1483 - 1487A 2.4 GHz Reference-Less Receiver for QPSK Demodulation
Devnandan K R | Dr. M N Sreerangaraju
Downloads: 111 | Views: 172 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1488 - 1491A Survey on: Email Security for Targeted Malicious Attacks
Jagdish R. Yadav | Dr. A. K. Srivastava
Downloads: 113 | Views: 185
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1492 - 1499Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique
Vinay Rana | Rani [592] | Ravi [634]
Downloads: 90 | Views: 160
Systematic Science, India, Volume 3 Issue 6, June 2014
Pages: 1500 - 1504Consumer Protection under Competition Law; 2002
Sweta Rao
Downloads: 103 | Views: 166
Chemistry, Nigeria, Volume 3 Issue 6, June 2014
Pages: 1505 - 1508Determination of Ascorbic Acid Levels in Hibiscus Sabdariffa (Zobo Rod) and Other Tropical Leaves
Nworie | F. S [91] | Jedidiah | J [17434]
Downloads: 107 | Views: 195
Biology, India, Volume 3 Issue 6, June 2014
Pages: 1509 - 1512Peptide Mass Printing of Hemocyanin Protein of Spider; Hippasa Agelenoides From South India Using Maldi-TOF MS
Deepa B M | Jayaprakash [17] | Ganesh Dama
Downloads: 133 | Views: 204 | Today Hits: ⮙1 | Monthly Hits: ⮙1
Management, Indonesia, Volume 3 Issue 6, June 2014
Pages: 1513 - 1518Strategy and Performance Evaluation Analysis of PT Nippon Indosari Corpindo
Made Citra Yuniastuti | Suci Fika Widyana | Feni Heryani
Downloads: 117 | Views: 184
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1519 - 1524Location Aided Optimized SPIN in Wireless Sensor Network
Anu Tanwar | Amit Rathee | Anjali [222]
Downloads: 101 | Views: 203
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari | Neha Parmar
Downloads: 112 | Views: 197
Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1533 - 1536Robust Reversible Watermarking via Invariant Image Classification and DHS
Mahadevi R. D | Chandrappa D. N