This paper deals with comparative study of the Carry Look-Ahead Adder (CLAA) based 64-bit unsigned integer multiplier and Carry Select Adder (CSLA) based 64-bit unsigned integer multiplier. Multiplication is a fundamenta...
Social media offers ample of opportunities for learning and interactivity for college students. If we spend a moment to think about it, it’s very difficult to see how students benefit from using social media. As younger...
This study reveals the changes in nitrite toxicity in the MCH value of fish Cirrhinus mrigala exposed to sublethal concentration of nitrite for 35 days (7, 14, 21, 28, 35 days) was presented in the Table 17 and Fig. 16....
In this paper, combination of PSO and DE is proposed for quickly finding the global optimization solutions. The mutli-benchmark functions are used to test the performance of the proposed method. Empirical studies show th...
In today’s technology, new attacks are emerging day by day which makes the systems insecure even the system wrapped with number of security measures. Intrusion Detection System (IDS) is used to detect the intrusion. Intr...
Design and Implementation of 64-Bit Multiplier Using CLAA and CSLA
This paper deals with comparative study of the Carry Look-Ahead Adder (CLAA) based 64-bit unsigned integer multiplier and Carry Select Adder (CSLA) based 64-bit unsigned integer multiplier. Multiplication is a fundamenta...
A Study on Effects of Social Networking Sites as an Educational Tool on College Students
Social media offers ample of opportunities for learning and interactivity for college students. If we spend a moment to think about it, it’s very difficult to see how students benefit from using social media. As younger...
Erythrocyte Indices of Nitrite Toxicity in Mean Cell Hemoglobin (MCH) and Mean Cell Hemoglobin Concentration (MCHC) to Freshwater Fish Cirrhinus mrigala
This study reveals the changes in nitrite toxicity in the MCH value of fish Cirrhinus mrigala exposed to sublethal concentration of nitrite for 35 days (7, 14, 21, 28, 35 days) was presented in the Table 17 and Fig. 16....
Optimization Approach for Computational Intelligence based on Hybrid PSO and DE
In this paper, combination of PSO and DE is proposed for quickly finding the global optimization solutions. The mutli-benchmark functions are used to test the performance of the proposed method. Empirical studies show th...
Host Based Intrusion Detection System
In today’s technology, new attacks are emerging day by day which makes the systems insecure even the system wrapped with number of security measures. Intrusion Detection System (IDS) is used to detect the intrusion. Intr...