International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Article of the Month

Downloads: 353 | Views: 663 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this article

Volume 3 Issue 6, June 2014: Page 1

Downloads: 112 | Views: 199 | Popularity: 6.1 / 10

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1454 - 1457

Performance Analysis of Hierarchical Routing Protocols of Wireless Sensor Network: A Survey

Sunny Chaudhary

Share this article

Downloads: 120 | Views: 255 | Popularity: 6.2 / 10

Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1458 - 1460

An Efficient VLSI Implementation of Lossless ECG Encoder Design

Vijay Kumar K C, H. S. Veena

Share this article

Downloads: 108 | Views: 229 | Popularity: 6.4 / 10

Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1461 - 1465

Improvement of Carrier to Interference plus Noise Ratio in WiMAX Networks Using Femtocell Base Station Concept

Pruthviraja C B, Lata S H

Share this article

Downloads: 112 | Views: 275 | Popularity: 6.4 / 10

Financial Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1466 - 1469

Digital Currency: The Emergence of Bitcoins

Thabiso Peter Mpofu, Budwell Masaiti, Macdonald Mukosera

Share this article

Downloads: 112 | Views: 289 | Popularity: 6.9 / 10

Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this article

Downloads: 112 | Views: 241 | Popularity: 6.8 / 10

Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1474 - 1478

An Efficient High Speed Convolution Encoder and Viterbi Decoder

Chandan Nagraj, S Muralinarasimham

Share this article

Downloads: 95 | Views: 273 | Popularity: 6.9 / 10

Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this article

Downloads: 112 | Views: 233 | Popularity: 6.3 / 10

Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1483 - 1487

A 2.4 GHz Reference-Less Receiver for QPSK Demodulation

Devnandan K R, Dr. M N Sreerangaraju

Share this article

Downloads: 111 | Views: 240 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Popularity: 6.8 / 10

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this article

Downloads: 113 | Views: 260 | Popularity: 6.7 / 10

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1492 - 1499

Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique

Vinay Rana, Rani, Ravi

Share this article
Top