A Novel Routing Efficient Algorithm Based on Clustering in WSNs |
Fakhrosadat Fanian, Marjan Kuchaki Rafsanjani |
DOI:10.17485/ijst/2013/v6i12/43606
,
Vol 6, No 12 (2013), Pagination: 5542–5545
|
ABSTRACT |
PDF
|
|
Abstract Views: 541 |
PDF Views: 0
|
Synthesis and Characterization of Carbon Nanotubes Reinforced Hydroxyapatite Composite |
P. Khalid, M. A. Hussain, P. D. Rekha, A. B. Arun |
DOI:10.17485/ijst/2013/v6i12/43609
,
Vol 6, No 12 (2013), Pagination: 5546–5551
|
ABSTRACT |
PDF
|
|
Abstract Views: 902 |
PDF Views: 0
|
Manufacture and Characterization of Dy2o3 Nanoparticles via X-ray Diffraction, TEM and Photoluminescence |
Amir Zelati, Ahmad Amirabadizadeh, Ahmad Kompany, Hadi Salamati, Jeff Sonier |
DOI:10.17485/ijst/2013/v6i12/43611
,
Vol 6, No 12 (2013), Pagination: 5552–5558
|
ABSTRACT |
PDF
|
|
Abstract Views: 1365 |
PDF Views: 0
|
Effect of Drying on the Volatile Oil Yield of Patchouli |
Dawn C. P. Ambrose, S. J. K. Annamalai, Ravindra Naik |
DOI:10.17485/ijst/2013/v6i12/43613
,
Vol 6, No 12 (2013), Pagination: 5559–5562
|
ABSTRACT |
PDF
|
|
Abstract Views: 431 |
PDF Views: 0
|
Effect of Elevated Temperature on Development Time of Rice Yellow Stem Borer |
N. Manikandan manilakshmi_144@yahoo.com, J. S. Kennedy, V. Geethalakshmi |
DOI:10.17485/ijst/2013/v6i12/43615
,
Vol 6, No 12 (2013), Pagination: 5563–5566
|
ABSTRACT |
PDF
|
|
Abstract Views: 470 |
PDF Views: 0
|
An Experimental Study of SSH Attacks by using Honeypot Decoys |
Esmaeil Kheirkhah, Sayyed Mehdi Poustchi Amin, Hediyeh AmirJahanshahi Sistani, Haridas Acharya |
DOI:10.17485/ijst/2013/v6i12/43618
,
Vol 6, No 12 (2013), Pagination: 5567–5578
|
ABSTRACT |
PDF
|
|
Abstract Views: 441 |
PDF Views: 0
|
Phylogenetic Analysis of Thermocyclops decipiens with Reference to 18S rDNA |
K. Sivakumar, R. Anandan, P. Muthupriya, M. Gopikrishna, K. Altaff |
DOI:10.17485/ijst/2013/v6i12/43622
,
Vol 6, No 12 (2013), Pagination: 5585–5592
|
ABSTRACT |
PDF
|
|
Abstract Views: 450 |
PDF Views: 0
|
New Approach to Peak Load Forecasting based on EMD and ANFIS |
Victor Akpevwe Okolobah, Zuhaimy Ismail |
DOI:10.17485/ijst/2013/v6i12/43624
,
Vol 6, No 12 (2013), Pagination: 5600–5606
|
ABSTRACT |
PDF
|
|
Abstract Views: 345 |
PDF Views: 0
|
Cryptography: a Mathematical Approach |
P. M. Durai Raj Vincent, Syed Amber Iqbal, Karan Bhagat, Kamal Kant Kushwaha |
DOI:10.17485/ijst/2013/v6i12/43626
,
Vol 6, No 12 (2013), Pagination: 5607–5611
|
ABSTRACT |
PDF
|
|
Abstract Views: 520 |
PDF Views: 0
|